• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

入侵检测特征评估措施的综合分析与建议

Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection.

作者信息

Binbusayyis Adel, Vaiyapuri Thavavel

机构信息

College of Computer Science and Engineering, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia.

出版信息

Heliyon. 2020 Jul 9;6(7):e04262. doi: 10.1016/j.heliyon.2020.e04262. eCollection 2020 Jul.

DOI:10.1016/j.heliyon.2020.e04262
PMID:32685709
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7355994/
Abstract

The revolutionary advances in network technologies have spearheaded the design of advanced cyberattacks to surpass traditional security defense with dreadful consequences. Recently, Intrusion Detection System (IDS) is considered as a pivotal element in network security infrastructures to achieve solid line of protection against cyberattacks. The prime challenges presented to IDS are curse of high dimensionality and class imbalance that tends to increase the detection time and degrade the efficiency of IDS. As a result, feature selection plays an important role in enabling to identify the most significant features for intrusion detection. Although, several feature evaluation measures are being proposed for feature selection in literature, there is no consensus on which measures are best for intrusion detection. Therein, this work aims at recommending the most appropriate feature evaluation measure for building an efficient IDS. In this direction, four filter-based feature evaluation measures that stem from different theories such as Consistency, Correlation, Information and Distance are investigated for their potential implications in enhancing the detection ability of IDS model for different classes of attacks. Along with this, the influence of the selected features on classification accuracy of an IDS model is analyzed using four different categories of classifiers namely, K-nearest neighbors (KNN), Random Forest (RF), Support Vector Machine (SVM) and Deep Belief Network (DBN). Finally, a two-step statistical significance test is conducted on the experimental results to determine which feature evaluation measure contributes statistically significant difference in IDS performance. All the experimental comparisons are performed on two benchmark intrusion detection datasets, NSL-KDD and UNSW-NB15. In these experiments, consistency measure has best influenced the IDS model in improving the detection ability with regard to detection rate (DR), false alarm rate (FAR), kappa statistics (KS) and identifying the most significant features for intrusion detection. Also, from the analysis results, it is revealed that RF is the ideal classifier to be used in conjunction with any of these four feature evaluation measures to achieve better detection accuracy than others. From the statistical results, we recommend the use of consistency measure for designing an efficient IDS in terms of DR and FAR.

摘要

网络技术的革命性进展引领了先进网络攻击的设计,这些攻击超越了传统安全防御,带来了可怕的后果。最近,入侵检测系统(IDS)被视为网络安全基础设施中的关键要素,以实现针对网络攻击的坚实防线。IDS面临的主要挑战是高维度诅咒和类不平衡,这往往会增加检测时间并降低IDS的效率。因此,特征选择在识别用于入侵检测的最重要特征方面起着重要作用。尽管文献中提出了几种用于特征选择的特征评估方法,但对于哪种方法最适合入侵检测尚无共识。在此,这项工作旨在推荐用于构建高效IDS的最合适特征评估方法。在这个方向上,研究了四种基于过滤器的特征评估方法,它们源于不同的理论,如一致性、相关性、信息和距离,以探讨它们对提高IDS模型针对不同类型攻击的检测能力的潜在影响。与此同时,使用四种不同类型的分类器,即K近邻(KNN)、随机森林(RF)、支持向量机(SVM)和深度信念网络(DBN),分析所选特征对IDS模型分类准确率的影响。最后,对实验结果进行两步统计显著性检验,以确定哪种特征评估方法在IDS性能上产生统计显著差异。所有实验比较均在两个基准入侵检测数据集NSL-KDD和UNSW-NB15上进行。在这些实验中,一致性度量在提高检测率(DR)、误报率(FAR)、kappa统计量(KS)方面对IDS模型的检测能力有最佳影响,并能识别用于入侵检测的最重要特征。此外,从分析结果可知,RF是与这四种特征评估方法中的任何一种结合使用以实现比其他方法更好检测准确率的理想分类器。从统计结果来看,就DR和FAR而言,我们建议使用一致性度量来设计高效的IDS。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/e77e64242335/gr012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/679ba16ca215/gr001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/fbed11260aa3/gr002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/b37b5229a8ed/gr003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/e1191e7e3b14/gr004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/599d259faf01/gr005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/222dd6152f40/gr006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/0318e454f655/gr007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/81d4a7dc4e4a/gr008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/53e3554436d5/gr009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/30e19a142d4c/gr010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/7ad7f3af4f7c/gr011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/e77e64242335/gr012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/679ba16ca215/gr001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/fbed11260aa3/gr002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/b37b5229a8ed/gr003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/e1191e7e3b14/gr004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/599d259faf01/gr005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/222dd6152f40/gr006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/0318e454f655/gr007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/81d4a7dc4e4a/gr008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/53e3554436d5/gr009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/30e19a142d4c/gr010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/7ad7f3af4f7c/gr011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7993/7355994/e77e64242335/gr012.jpg

相似文献

1
Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection.入侵检测特征评估措施的综合分析与建议
Heliyon. 2020 Jul 9;6(7):e04262. doi: 10.1016/j.heliyon.2020.e04262. eCollection 2020 Jul.
2
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
3
An efficient intrusion detection system for IoT security using CNN decision forest.一种基于卷积神经网络决策森林的高效物联网安全入侵检测系统。
PeerJ Comput Sci. 2024 Sep 9;10:e2290. doi: 10.7717/peerj-cs.2290. eCollection 2024.
4
A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data.一种用于高维不平衡数据的新型多模块集成入侵检测系统。
Appl Intell (Dordr). 2023;53(1):272-288. doi: 10.1007/s10489-022-03361-2. Epub 2022 Apr 14.
5
Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset.提升基于机器学习的网络入侵检测系统在UNSW-NB15数据集上的性能。
Comput Intell Neurosci. 2021 Jun 15;2021:5557577. doi: 10.1155/2021/5557577. eCollection 2021.
6
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
7
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques.使用平衡类分布、特征选择和集成机器学习技术优化物联网入侵检测
Sensors (Basel). 2024 Jul 1;24(13):4293. doi: 10.3390/s24134293.
8
Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles.用于车联网入侵检测系统的多分类与基于树的集成网络
Sensors (Basel). 2023 Oct 28;23(21):8788. doi: 10.3390/s23218788.
9
Classification model for accuracy and intrusion detection using machine learning approach.使用机器学习方法的用于准确性和入侵检测的分类模型。
PeerJ Comput Sci. 2021 Apr 7;7:e437. doi: 10.7717/peerj-cs.437. eCollection 2021.
10
The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.使用集成模型进行多类和二类分类,以改进入侵检测系统。
Sensors (Basel). 2020 Apr 30;20(9):2559. doi: 10.3390/s20092559.

引用本文的文献

1
An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms.基于深度学习算法的高密度物联网无线通信网络异常入侵检测
Sensors (Basel). 2022 Dec 25;23(1):206. doi: 10.3390/s23010206.
2
New recommender system evaluation approaches based on user selections factor.基于用户选择因素的新型推荐系统评估方法。
Heliyon. 2021 Jun 27;7(7):e07397. doi: 10.1016/j.heliyon.2021.e07397. eCollection 2021 Jul.
3
Application of deep autoencoder as an one-class classifier for unsupervised network intrusion detection: a comparative evaluation.
深度自动编码器作为无监督网络入侵检测的单类分类器的应用:一项比较评估。
PeerJ Comput Sci. 2020 Dec 7;6:e327. doi: 10.7717/peerj-cs.327. eCollection 2020.