• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于网络异常检测的多分辨率树突状细胞算法。

Multiresolution dendritic cell algorithm for network anomaly detection.

作者信息

Limon-Cantu David, Alarcon-Aquino Vicente

机构信息

Department of Computing, Electronics and Mechatronics, Universidad de las Americas Puebla, San Andres Cholula, Puebla, Mexico.

出版信息

PeerJ Comput Sci. 2021 Oct 19;7:e749. doi: 10.7717/peerj-cs.749. eCollection 2021.

DOI:10.7717/peerj-cs.749
PMID:34805504
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8576553/
Abstract

Anomaly detection in computer networks is a complex task that requires the distinction of normality and anomaly. Network attack detection in information systems is a constant challenge in computer security research, as information systems provide essential services for enterprises and individuals. The consequences of these attacks could be the access, disclosure, or modification of information, as well as denial of computer services and resources. Intrusion Detection Systems (IDS) are developed as solutions to detect anomalous behavior, such as denial of service, and backdoors. The proposed model was inspired by the behavior of dendritic cells and their interactions with the human immune system, known as Dendritic Cell Algorithm (DCA), and combines the use of Multiresolution Analysis (MRA) Maximal Overlap Discrete Wavelet Transform (MODWT), as well as the segmented deterministic DCA approach (S-dDCA). The proposed approach is a binary classifier that aims to analyze a time-frequency representation of time-series data obtained from high-level network features, in order to classify data as normal or anomalous. The MODWT was used to extract the approximations of two input signal categories at different levels of decomposition, and are used as processing elements for the multi resolution DCA. The model was evaluated using the NSL-KDD, UNSW-NB15, CIC-IDS2017 and CSE-CIC-IDS2018 datasets, containing contemporary network traffic and attacks. The proposed MRA S-dDCA model achieved an accuracy of 97.37%, 99.97%, 99.56%, and 99.75% for the tested datasets, respectively. Comparisons with the DCA and state-of-the-art approaches for network anomaly detection are presented. The proposed approach was able to surpass state-of-the-art approaches with UNSW-NB15 and CSECIC-IDS2018 datasets, whereas the results obtained with the NSL-KDD and CIC-IDS2017 datasets are competitive with machine learning approaches.

摘要

计算机网络中的异常检测是一项复杂的任务,需要区分正常和异常情况。信息系统中的网络攻击检测是计算机安全研究中持续面临的挑战,因为信息系统为企业和个人提供重要服务。这些攻击的后果可能是信息的访问、泄露或修改,以及计算机服务和资源的拒绝服务。入侵检测系统(IDS)被开发出来作为检测异常行为(如拒绝服务和后门)的解决方案。所提出的模型受到树突状细胞的行为及其与人类免疫系统相互作用的启发,即树突状细胞算法(DCA),并结合了多分辨率分析(MRA)最大重叠离散小波变换(MODWT)以及分段确定性DCA方法(S-dDCA)。所提出的方法是一种二分类器,旨在分析从高级网络特征获得的时间序列数据的时频表示,以便将数据分类为正常或异常。MODWT用于在不同分解级别提取两个输入信号类别的近似值,并用作多分辨率DCA的处理元素。该模型使用包含当代网络流量和攻击的NSL-KDD、UNSW-NB15、CIC-IDS2017和CSE-CIC-IDS2018数据集进行评估。所提出的MRA S-dDCA模型在测试数据集上分别达到了97.37%、99.97%、99.56%和99.75%的准确率。文中还给出了与DCA和网络异常检测的最新方法的比较。所提出的方法在UNSW-NB15和CSECIC-IDS2018数据集上能够超越最新方法,而在NSL-KDD和CIC-IDS2017数据集上获得的结果与机器学习方法具有竞争力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/00b4247b7ecb/peerj-cs-07-749-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/60b5a5478a8c/peerj-cs-07-749-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/bc816e8794ee/peerj-cs-07-749-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/454c55c32eed/peerj-cs-07-749-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/3247d8871e56/peerj-cs-07-749-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/00b4247b7ecb/peerj-cs-07-749-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/60b5a5478a8c/peerj-cs-07-749-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/bc816e8794ee/peerj-cs-07-749-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/454c55c32eed/peerj-cs-07-749-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/3247d8871e56/peerj-cs-07-749-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f8d6/8576553/00b4247b7ecb/peerj-cs-07-749-g005.jpg

相似文献

1
Multiresolution dendritic cell algorithm for network anomaly detection.用于网络异常检测的多分辨率树突状细胞算法。
PeerJ Comput Sci. 2021 Oct 19;7:e749. doi: 10.7717/peerj-cs.749. eCollection 2021.
2
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
3
Enhancing Network Intrusion Detection Using an Ensemble Voting Classifier for Internet of Things.使用集成投票分类器增强物联网网络入侵检测
Sensors (Basel). 2023 Dec 26;24(1):127. doi: 10.3390/s24010127.
4
Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems.使用混合集成模型优化安全系统入侵检测系统的预测性能。
PeerJ Comput Sci. 2023 Sep 4;9:e1552. doi: 10.7717/peerj-cs.1552. eCollection 2023.
5
Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection.在入侵检测中,研究数据受限监督机器学习模型在新颖相关样本上的泛化性能。
Sensors (Basel). 2023 Feb 7;23(4):1846. doi: 10.3390/s23041846.
6
A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection.基于卷积神经网络的改进型异常网络入侵检测。
Big Data. 2021 Jun;9(3):233-252. doi: 10.1089/big.2020.0263.
7
GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks.GSOOA-1DDRSN:基于深度残差收缩网络的网络流量异常检测
Heliyon. 2024 May 29;10(11):e32087. doi: 10.1016/j.heliyon.2024.e32087. eCollection 2024 Jun 15.
8
Network Anomaly Intrusion Detection Based on Deep Learning Approach.基于深度学习方法的网络异常入侵检测。
Sensors (Basel). 2023 Feb 15;23(4):2171. doi: 10.3390/s23042171.
9
An improved equilibrium optimization algorithm for feature selection problem in network intrusion detection.一种用于网络入侵检测中特征选择问题的改进平衡优化算法。
Sci Rep. 2024 Aug 12;14(1):18696. doi: 10.1038/s41598-024-67488-7.
10
Adaptive Anomaly Detection Framework Model Objects in Cyberspace.网络空间中的自适应异常检测框架模型对象
Appl Bionics Biomech. 2020 Dec 9;2020:6660489. doi: 10.1155/2020/6660489. eCollection 2020.

本文引用的文献

1
The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.使用集成模型进行多类和二类分类,以改进入侵检测系统。
Sensors (Basel). 2020 Apr 30;20(9):2559. doi: 10.3390/s20092559.
2
Theoretical formulation and analysis of the deterministic dendritic cell algorithm.确定性树突状细胞算法的理论公式化与分析
Biosystems. 2013 Feb;111(2):127-35. doi: 10.1016/j.biosystems.2013.01.001. Epub 2013 Jan 18.
3
How do we evaluate artificial immune systems?我们如何评估人工免疫系统?
Evol Comput. 2005 Summer;13(2):145-77. doi: 10.1162/1063656054088512.
4
Tolerance, danger, and the extended family.耐受性、危险性与大家庭。
Annu Rev Immunol. 1994;12:991-1045. doi: 10.1146/annurev.iy.12.040194.005015.