Interactive three-dimensional visualization of network intrusion detection data for machine learning

被引:44
作者
Zong, Wei [1 ]
Chow, Yang-Wai [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 102卷
关键词
Cybersecurity; Network intrusion detection; Machine learning; Visualization; SECURITY; SYSTEMS;
D O I
10.1016/j.future.2019.07.045
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The threat of cyber-attacks is on the rise in the digital world today. As such, effective cybersecurity solutions are becoming increasingly important for detecting and combating cyber-attacks. The use of machine learning techniques for network intrusion detection is a growing area of research, as these techniques can potentially provide a means for automating the detection of attacks and abnormal traffic patterns in real-time. However, misclassification is a common problem in machine learning for intrusion detection, and the improvement of machine learning models is hindered by a lack of insight into the reasons behind such misclassification. This paper presents an interactive method of visualizing network intrusion detection data in three-dimensions. The objective is to facilitate the understanding of network intrusion detection data using a visual representation to reflect the geometric relationship between various categories of network traffic. This interactive visual representation can potentially provide useful insight to aid the understanding of machine learning results. To demonstrate the usefulness of the proposed visualization approach, this paper presents results of experiments on commonly used network intrusion detection datasets. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:292 / 306
页数:15
相关论文
共 35 条
[1]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[2]  
Angelini M, 2015, IEEE SYM VIS CYB SEC
[3]  
[Anonymous], ACM T GRAPH
[4]  
[Anonymous], EVAL REV
[5]  
Ball R., 2004, IEEE S VIS CYB SEC, P55, DOI DOI 10.1145/1029208.1029217
[6]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[7]   PCA-based multivariate statistical network monitoring for anomaly detection [J].
Camacho, Jose ;
Perez-Villegas, Alejandro ;
Garcia-Teodoro, Pedro ;
Macia-Fernandez, Gabriel .
COMPUTERS & SECURITY, 2016, 59 :118-137
[8]   Neural visualization of network traffic data for intrusion detection [J].
Corchado, Emilio ;
Herrero, Alvaro .
APPLIED SOFT COMPUTING, 2011, 11 (02) :2042-2056
[9]   PCA filtering and probabilistic SOM for network intrusion detection [J].
De la Hoz, Eduardo ;
De La Hoz, Emiro ;
Ortiz, Andres ;
Ortega, Julio ;
Prieto, Beatriz .
NEUROCOMPUTING, 2015, 164 :71-81
[10]   Preserving the big picture: Visual network traffic analysis with TNV [J].
Goodall, JR ;
Lutters, WG ;
Rheingans, P ;
Komlodi, A .
IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, :47-54