Detecting Network Anomalies and Intrusions in Communication Networks

被引:0
作者
Rios, Ana Laura Gonzalez [1 ]
Li, Zhida [1 ]
Xu, Guangyu [1 ]
Alonso, Alfonso Diaz [1 ]
Trajkovic, Ljiljana [1 ]
机构
[1] Simon Fraser Univ, Vancouver, BC, Canada
来源
2019 IEEE 23RD INTERNATIONAL CONFERENCE ON INTELLIGENT ENGINEERING SYSTEMS (INES 2019) | 2019年
基金
加拿大自然科学与工程研究理事会;
关键词
Machine learning; support vector machine; broad learning system; anomaly and intrusion detection;
D O I
10.1109/ines46365.2019.9109448
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting anomalies and intrusions in communication networks is of great interest in cyber security. In this paper, we use Support Vector Machine (SVM) and Broad Learning System (BLS) supervised machine learning approaches to detect anomalies and intrusions in datasets collected from packet data networks. The developed models are trained and tested using data from the Internet routing tables, a simulated air force base network, and an experimental testbed. These datasets contain records of both intrusions and regular traffic data. We compare the two machine learning algorithms based on accuracy, F-Score, and training time.
引用
收藏
页码:29 / 34
页数:6
相关论文
共 25 条
  • [1] BGP Anomaly Detection Techniques: A Survey
    Al-Musawi, Bahaa
    Branch, Philip
    Armitage, Grenville
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01): : 377 - 396
  • [2] Responding to the challenges presented by global megatrends
    Batt, P. J.
    [J]. INTERNATIONAL SYMPOSIA ON TROPICAL AND TEMPERATE HORTICULTURE - ISTTH2016, 2018, 1205 : 1 - 12
  • [3] Ben-Hur A., 2016, DATA MINING TECHNIQU, V1415, P223
  • [4] Anomaly Detection: A Survey
    Chandola, Varun
    Banerjee, Arindam
    Kumar, Vipin
    [J]. ACM COMPUTING SURVEYS, 2009, 41 (03)
  • [5] Broad Learning System: An Effective and Efficient Incremental Learning System Without the Need for Deep Architecture
    Chen, C. L. Philip
    Liu, Zhulin
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (01) : 10 - 24
  • [6] Smartphone addiction: psychological and social factors predict the use and abuse of a social mobile application
    Chen, Chi-Ying
    [J]. INFORMATION COMMUNICATION & SOCIETY, 2020, 23 (03) : 454 - 467
  • [7] Cho Kyunghyun, 2014, C EMPIRICAL METHODS, P1724
  • [8] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
  • [9] Ding QY, 2018, ADV INFORM SECUR, V70, P47, DOI 10.1007/978-3-319-73951-9_3
  • [10] Ding QY, 2016, IEEE SYS MAN CYBERN, P3352, DOI 10.1109/SMC.2016.7844751