• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

网络空间中的自适应异常检测框架模型对象

Adaptive Anomaly Detection Framework Model Objects in Cyberspace.

作者信息

Alkahtani Hasan, Aldhyani Theyazn H H, Al-Yaari Mohammed

机构信息

College of Computer Science and Information Technology, King Faisal University, P.O. Box 4000, Al-Ahsa 31982, Saudi Arabia.

Community College of Abqaiq, King Faisal University, P.O. Box 4000, Al-Ahsa 31982, Saudi Arabia.

出版信息

Appl Bionics Biomech. 2020 Dec 9;2020:6660489. doi: 10.1155/2020/6660489. eCollection 2020.

DOI:10.1155/2020/6660489
PMID:33376505
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7746470/
Abstract

Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monitoring of computers and networks is too complicated for network administrators. Hence, network security represents one of the biggest serious challenges that can be faced by network security communities. Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. The purpose of this research is to propose a methodology that will lead to a high level and sustainable protection against cyberattacks. In particular, an adaptive anomaly detection framework model was developed using deep and machine learning algorithms to manage automatically-configured application-level firewalls. The standard network datasets were used to evaluate the proposed model which is designed for improving the cybersecurity system. The deep learning based on Long-Short Term Memory Recurrent Neural Network (LSTM-RNN) and machine learning algorithms namely Support Vector Machine (SVM), K-Nearest Neighbor (K-NN) algorithms were implemented to classify the Denial-of-Service attack (DoS) and Distributed Denial-of-Service (DDoS) attacks. The information gain method was applied to select the relevant features from the network dataset. These network features were significant to improve the classification algorithm. The system was used to classify DoS and DDoS attacks in four stand datasets namely KDD cup 199, NSL-KDD, ISCX, and ICI-ID2017. The empirical results indicate that the deep learning based on the LSTM-RNN algorithm has obtained the highest accuracy. The proposed system based on the LSTM-RNN algorithm produced the highest testing accuracy rate of 99.51% and 99.91% with respect to KDD Cup'99, NSL-KDD, ISCX, and ICI-Id2017 datasets, respectively. A comparative result analysis between the machine learning algorithms, namely SVM and KNN, and the deep learning algorithms based on the LSTM-RNN model is presented. Finally, it is concluded that the LSTM-RNN model is efficient and effective to improve the cybersecurity system for detecting anomaly-based cybersecurity.

摘要

在过去十年中,电信业取得了强劲且快速的发展。相应地,对于网络管理员而言,计算机和网络的监控变得过于复杂。因此,网络安全成为了网络安全社区可能面临的最大严峻挑战之一。考虑到电子银行、电子商务和商业数据将在计算机网络上共享,这些数据可能面临入侵威胁。本研究的目的是提出一种方法,以实现对网络攻击的高水平和可持续保护。具体而言,使用深度学习和机器学习算法开发了一种自适应异常检测框架模型,用于管理自动配置的应用层防火墙。使用标准网络数据集来评估所提出的旨在改进网络安全系统的模型。基于长短期记忆循环神经网络(LSTM-RNN)的深度学习以及机器学习算法,即支持向量机(SVM)、K近邻(K-NN)算法,被用于对拒绝服务攻击(DoS)和分布式拒绝服务(DDoS)攻击进行分类。应用信息增益方法从网络数据集中选择相关特征。这些网络特征对于改进分类算法具有重要意义。该系统用于在四个标准数据集,即KDD cup 199、NSL-KDD、ISCX和ICI-ID2017中对DoS和DDoS攻击进行分类。实证结果表明,基于LSTM-RNN算法的深度学习取得了最高的准确率。所提出的基于LSTM-RNN算法的系统在KDD Cup'99、NSL-KDD、ISCX和ICI-Id2017数据集上分别产生了99.51%和99.91%的最高测试准确率。给出了机器学习算法SVM和KNN与基于LSTM-RNN模型的深度学习算法之间的比较结果分析。最后得出结论,LSTM-RNN模型对于改进基于异常检测的网络安全系统是高效且有效的。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/2db749e7fa7d/ABB2020-6660489.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/07be6da5254a/ABB2020-6660489.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/43111329fc37/ABB2020-6660489.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/f91c7a1d8fb4/ABB2020-6660489.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/cba8b4a3b401/ABB2020-6660489.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/0df91cc516de/ABB2020-6660489.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/509fe66e4287/ABB2020-6660489.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/145577f88ffd/ABB2020-6660489.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/edbe2e11237e/ABB2020-6660489.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/2db749e7fa7d/ABB2020-6660489.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/07be6da5254a/ABB2020-6660489.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/43111329fc37/ABB2020-6660489.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/f91c7a1d8fb4/ABB2020-6660489.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/cba8b4a3b401/ABB2020-6660489.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/0df91cc516de/ABB2020-6660489.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/509fe66e4287/ABB2020-6660489.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/145577f88ffd/ABB2020-6660489.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/edbe2e11237e/ABB2020-6660489.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/182e/7746470/2db749e7fa7d/ABB2020-6660489.009.jpg

相似文献

1
Adaptive Anomaly Detection Framework Model Objects in Cyberspace.网络空间中的自适应异常检测框架模型对象
Appl Bionics Biomech. 2020 Dec 9;2020:6660489. doi: 10.1155/2020/6660489. eCollection 2020.
2
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.基于深度学习算法的网络流量分布式拒绝服务攻击检测
Sensors (Basel). 2023 Oct 23;23(20):8642. doi: 10.3390/s23208642.
3
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
4
Network Anomaly Intrusion Detection Based on Deep Learning Approach.基于深度学习方法的网络异常入侵检测。
Sensors (Basel). 2023 Feb 15;23(4):2171. doi: 10.3390/s23042171.
5
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
6
An improved long short term memory network for intrusion detection.改进的长短时记忆网络入侵检测。
PLoS One. 2023 Aug 1;18(8):e0284795. doi: 10.1371/journal.pone.0284795. eCollection 2023.
7
Computational Intelligence Approaches in Developing Cyberattack Detection System.计算智能方法在开发网络攻击检测系统中的应用。
Comput Intell Neurosci. 2022 Mar 18;2022:4705325. doi: 10.1155/2022/4705325. eCollection 2022.
8
Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.基于人工智能算法的经济可持续性否认攻击检测系统:云计算环境。
Sensors (Basel). 2022 Jun 21;22(13):4685. doi: 10.3390/s22134685.
9
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
10
The proposed hybrid deep learning intrusion prediction IoT (HDLIP-IoT) framework.所提出的混合深度学习入侵预测物联网 (HDLIP-IoT) 框架。
PLoS One. 2022 Jul 29;17(7):e0271436. doi: 10.1371/journal.pone.0271436. eCollection 2022.

引用本文的文献

1
Retracted: Adaptive Anomaly Detection Framework Model Objects in Cyberspace.撤回:网络空间中的自适应异常检测框架模型对象。
Appl Bionics Biomech. 2023 Aug 16;2023:9819236. doi: 10.1155/2023/9819236. eCollection 2023.
2
Computational Intelligence Based Recurrent Neural Network for Identification Deceptive Review in the E-Commerce Domain.基于计算智能的递归神经网络在电子商务领域识别虚假评论。
Comput Intell Neurosci. 2022 Nov 18;2022:4656846. doi: 10.1155/2022/4656846. eCollection 2022.
3
Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.
基于人工智能算法的经济可持续性否认攻击检测系统:云计算环境。
Sensors (Basel). 2022 Jun 21;22(13):4685. doi: 10.3390/s22134685.
4
Computational Intelligence Approaches in Developing Cyberattack Detection System.计算智能方法在开发网络攻击检测系统中的应用。
Comput Intell Neurosci. 2022 Mar 18;2022:4705325. doi: 10.1155/2022/4705325. eCollection 2022.
5
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
6
Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity.自动驾驶汽车攻击:网络安全的深度学习算法。
Sensors (Basel). 2022 Jan 4;22(1):360. doi: 10.3390/s22010360.
7
Development of Integrated Neural Network Model for Identification of Fake Reviews in E-Commerce Using Multidomain Datasets.使用多领域数据集开发用于识别电子商务中虚假评论的集成神经网络模型。
Appl Bionics Biomech. 2021 Apr 14;2021:5522574. doi: 10.1155/2021/5522574. eCollection 2021.