• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种用于下一代网络的基于两阶段流的入侵检测模型。

A two-stage flow-based intrusion detection model for next-generation networks.

作者信息

Umer Muhammad Fahad, Sher Muhammad, Bi Yaxin

机构信息

Department of Computer Science and Software Engineering, International Islamic University, Islamabad, Pakistan.

School of Computing, Faculty of Computing, Engineering and the Built Environment, Ulster University, Jordanstown Campus, Antrim, United Kingdom.

出版信息

PLoS One. 2018 Jan 12;13(1):e0180945. doi: 10.1371/journal.pone.0180945. eCollection 2018.

DOI:10.1371/journal.pone.0180945
PMID:29329294
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5766127/
Abstract

The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

摘要

下一代网络通过融合的移动和固定网络提供最先进的接入无关服务。融合网络环境中的安全性是一项重大挑战。由于吞吐量低、准确性差以及无法检查加密的有效载荷,传统的基于数据包和协议的入侵检测技术不能用于下一代网络。保护下一代网络的一种替代解决方案是使用网络流记录来检测网络流量中的恶意活动。网络流记录独立于接入网络和用户应用程序。在本文中,我们提出了一种用于下一代网络的基于流的两阶段入侵检测系统。第一阶段使用增强的无监督单类支持向量机,将恶意流与正常网络流量分离。第二阶段使用自组织映射,自动将恶意流分组到不同的警报集群中。我们在两个基于流的数据集上验证了所提出的方法,并取得了有希望的结果。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/1d6b88c09c76/pone.0180945.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/e1690b019d9f/pone.0180945.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/4db6e132f173/pone.0180945.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/f932ab3f91ee/pone.0180945.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/c1ea9f963c1e/pone.0180945.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/e07cbbb2e83b/pone.0180945.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/a511836fed99/pone.0180945.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/b2fa28b19436/pone.0180945.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/1d6b88c09c76/pone.0180945.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/e1690b019d9f/pone.0180945.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/4db6e132f173/pone.0180945.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/f932ab3f91ee/pone.0180945.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/c1ea9f963c1e/pone.0180945.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/e07cbbb2e83b/pone.0180945.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/a511836fed99/pone.0180945.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/b2fa28b19436/pone.0180945.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e8b3/5766127/1d6b88c09c76/pone.0180945.g008.jpg

相似文献

1
A two-stage flow-based intrusion detection model for next-generation networks.一种用于下一代网络的基于两阶段流的入侵检测模型。
PLoS One. 2018 Jan 12;13(1):e0180945. doi: 10.1371/journal.pone.0180945. eCollection 2018.
2
FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.FSM-F:用于移动自组网中拒绝服务和入侵检测的基于有限状态机的框架。
PLoS One. 2016 Jun 10;11(6):e0156885. doi: 10.1371/journal.pone.0156885. eCollection 2016.
3
A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks.一种用于传感器网络入侵检测的混合谱聚类与深度神经网络集成算法
Sensors (Basel). 2016 Oct 13;16(10):1701. doi: 10.3390/s16101701.
4
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.用于车载网络安全的基于深度神经网络的入侵检测系统
PLoS One. 2016 Jun 7;11(6):e0155781. doi: 10.1371/journal.pone.0155781. eCollection 2016.
5
Intelligent agent-based intrusion detection system using enhanced multiclass SVM.基于智能代理的增强型多类支持向量机入侵检测系统。
Comput Intell Neurosci. 2012;2012:850259. doi: 10.1155/2012/850259. Epub 2012 Sep 27.
6
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware.利用异构硬件加速加密网络流量中的入侵检测
Sensors (Basel). 2021 Feb 6;21(4):1140. doi: 10.3390/s21041140.
7
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection.基于 PSOGWO-优化 BP 神经网络和基于 GA 的特征选择的新型异常入侵检测模型。
Sensors (Basel). 2022 Nov 30;22(23):9318. doi: 10.3390/s22239318.
8
Detection of slow port scans in flow-based network traffic.基于流量的网络流量中慢速端口扫描的检测。
PLoS One. 2018 Sep 25;13(9):e0204507. doi: 10.1371/journal.pone.0204507. eCollection 2018.
9
Traffic Management in IoT Backbone Networks Using GNN and MAB with SDN Orchestration.基于软件定义网络编排的图神经网络和多智能体强化学习在物联网骨干网中的流量管理
Sensors (Basel). 2023 Aug 10;23(16):7091. doi: 10.3390/s23167091.
10
Game-theoretic approach for improving cooperation in wireless multihop networks.用于改善无线多跳网络中协作的博弈论方法。
IEEE Trans Syst Man Cybern B Cybern. 2010 Jun;40(3):559-74. doi: 10.1109/TSMCB.2010.2042593. Epub 2010 Mar 4.

引用本文的文献

1
An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.基于归一化割谱聚类的传感器网络入侵检测算法。
PLoS One. 2019 Oct 4;14(10):e0221920. doi: 10.1371/journal.pone.0221920. eCollection 2019.

本文引用的文献

1
Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks.学位异质性对相依网络攻击脆弱性的影响。
Sci Rep. 2016 Sep 9;6:32983. doi: 10.1038/srep32983.
2
Estimating the support of a high-dimensional distribution.估计高维分布的支撑集。
Neural Comput. 2001 Jul;13(7):1443-71. doi: 10.1162/089976601750264965.