• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于深度神经网络和关联分析的恶意网络流量检测。

Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis.

机构信息

China NARI Group Corporation (State Grid Electronic Power Research Institute), Nanjing 211106, China.

Beijing Kedong Electric Power Control System Co.,Ltd., Beijing 100192, China.

出版信息

Sensors (Basel). 2020 Mar 6;20(5):1452. doi: 10.3390/s20051452.

DOI:10.3390/s20051452
PMID:32155834
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7085765/
Abstract

Anomaly detection systems can accurately identify malicious network traffic, providing network security. With the development of internet technology, network attacks are becoming more and more sourced and complicated, making it difficult for traditional anomaly detection systems to effectively analyze and identify abnormal traffic. At present, deep neural network (DNN) technology achieved great results in terms of anomaly detection, and it can achieve automatic detection. However, there still exists misclassified traffic in the prediction results of deep neural networks, resulting in redundant alarm information. This paper designs a two-level anomaly detection system based on deep neural network and association analysis. We made a comprehensive evaluation of experiments using DNNs and other neural networks based on publicly available datasets. Through the experiments, we chose DNN-4 as an important part of our system, which has high precision and accuracy in identifying malicious traffic. The Apriori algorithm can mine rules between various discretized features and normal labels, which can be used to filter the classified traffic and reduce the false positive rate. Finally, we designed an intrusion detection system based on DNN-4 and association rules. We conducted experiments on the public training set NSL-KDD, which is considered as a modified dataset for the KDDCup 1999. The results show that our detection system has great precision in malicious traffic detection, and it achieves the effect of reducing the number of false alarms.

摘要

异常检测系统可以准确识别恶意网络流量,为网络安全提供保障。随着互联网技术的发展,网络攻击的来源和方式变得越来越复杂,传统的异常检测系统难以有效分析和识别异常流量。目前,深度神经网络(DNN)技术在异常检测方面取得了显著成果,可以实现自动检测。然而,深度神经网络的预测结果中仍然存在误分类的流量,导致冗余的报警信息。本文设计了一种基于深度神经网络和关联分析的两级异常检测系统。我们使用公开数据集对 DNN 及其他神经网络进行了全面的实验评估。通过实验,我们选择了 DNN-4 作为系统的重要组成部分,它在识别恶意流量方面具有较高的精度和准确性。Apriori 算法可以挖掘各种离散化特征与正常标签之间的规则,用于过滤分类流量,降低误报率。最后,我们设计了一个基于 DNN-4 和关联规则的入侵检测系统。我们在公共训练集 NSL-KDD 上进行了实验,该数据集被认为是 KDDCup 1999 的修改数据集。实验结果表明,我们的检测系统在恶意流量检测方面具有很高的精度,达到了减少误报数量的效果。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd58/7085765/ddb5ab3b2bf0/sensors-20-01452-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd58/7085765/5db688445b2d/sensors-20-01452-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd58/7085765/ddb5ab3b2bf0/sensors-20-01452-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd58/7085765/5db688445b2d/sensors-20-01452-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd58/7085765/ddb5ab3b2bf0/sensors-20-01452-g002.jpg

相似文献

1
Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis.基于深度神经网络和关联分析的恶意网络流量检测。
Sensors (Basel). 2020 Mar 6;20(5):1452. doi: 10.3390/s20051452.
2
GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks.GSOOA-1DDRSN:基于深度残差收缩网络的网络流量异常检测
Heliyon. 2024 May 29;10(11):e32087. doi: 10.1016/j.heliyon.2024.e32087. eCollection 2024 Jun 15.
3
A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks.一种用于传感器网络入侵检测的混合谱聚类与深度神经网络集成算法
Sensors (Basel). 2016 Oct 13;16(10):1701. doi: 10.3390/s16101701.
4
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
5
Network Anomaly Intrusion Detection Based on Deep Learning Approach.基于深度学习方法的网络异常入侵检测。
Sensors (Basel). 2023 Feb 15;23(4):2171. doi: 10.3390/s23042171.
6
A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection.基于 PSOGWO-优化 BP 神经网络和基于 GA 的特征选择的新型异常入侵检测模型。
Sensors (Basel). 2022 Nov 30;22(23):9318. doi: 10.3390/s22239318.
7
Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT).基于焦点损失变分自动编码器的物联网(IoT)有效入侵检测模型。
Sensors (Basel). 2022 Aug 4;22(15):5822. doi: 10.3390/s22155822.
8
Efficient Detection of Malicious Traffic Using a Decision Tree-Based Proximal Policy Optimisation Algorithm: A Deep Reinforcement Learning Malicious Traffic Detection Model Incorporating Entropy.使用基于决策树的近端策略优化算法高效检测恶意流量:一种结合熵的深度强化学习恶意流量检测模型
Entropy (Basel). 2024 Jul 30;26(8):648. doi: 10.3390/e26080648.
9
Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network.开发机器学习入侵检测系统并使用生成对抗网络测试其性能。
Sensors (Basel). 2023 Jan 24;23(3):1315. doi: 10.3390/s23031315.
10
Research on Anomaly Network Detection Based on Self-Attention Mechanism.基于自注意力机制的异常网络检测研究。
Sensors (Basel). 2023 May 25;23(11):5059. doi: 10.3390/s23115059.

引用本文的文献

1
ADFCNN-BiLSTM: A Deep Neural Network Based on Attention and Deformable Convolution for Network Intrusion Detection.ADFCNN-BiLSTM:一种基于注意力和可变形卷积的深度神经网络用于网络入侵检测。
Sensors (Basel). 2025 Feb 24;25(5):1382. doi: 10.3390/s25051382.
2
A multi-information fusion anomaly detection model based on convolutional neural networks and AutoEncoder.一种基于卷积神经网络和自动编码器的多信息融合异常检测模型。
Sci Rep. 2024 Jul 12;14(1):16147. doi: 10.1038/s41598-024-66760-0.
3
GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks.

本文引用的文献

1
Data Discovery and Anomaly Detection Using Atypicality for Real-Valued Data.使用非典型性对实值数据进行数据发现与异常检测。
Entropy (Basel). 2019 Feb 26;21(3):219. doi: 10.3390/e21030219.
2
A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection.基于机器学习的自动化区块链交易签名方法,包括个性化异常检测。
Sensors (Basel). 2019 Dec 25;20(1):147. doi: 10.3390/s20010147.
3
Deep Learning in Microscopy Image Analysis: A Survey.深度学习在显微镜图像分析中的应用:综述。
GSOOA-1DDRSN:基于深度残差收缩网络的网络流量异常检测
Heliyon. 2024 May 29;10(11):e32087. doi: 10.1016/j.heliyon.2024.e32087. eCollection 2024 Jun 15.
IEEE Trans Neural Netw Learn Syst. 2018 Oct;29(10):4550-4568. doi: 10.1109/TNNLS.2017.2766168. Epub 2017 Nov 22.
4
Fully Convolutional Networks for Semantic Segmentation.全卷积网络用于语义分割。
IEEE Trans Pattern Anal Mach Intell. 2017 Apr;39(4):640-651. doi: 10.1109/TPAMI.2016.2572683. Epub 2016 May 24.
5
AdaBoost-based algorithm for network intrusion detection.基于AdaBoost的网络入侵检测算法。
IEEE Trans Syst Man Cybern B Cybern. 2008 Apr;38(2):577-83. doi: 10.1109/TSMCB.2007.914695.