• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

多层过滤框架,利用机器学习高效检测网络攻击。

Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning.

机构信息

Critical Infrastructure Protection and Malware Analysis Lab, Department of Computer and Information Sciences, Pakistan Institute of Engineering and Applied Sciences, Islamabad 44000, Pakistan.

Shenzhen Institute of Information Technology, Shenzhen 518109, China.

出版信息

Sensors (Basel). 2023 Jun 22;23(13):5829. doi: 10.3390/s23135829.

DOI:10.3390/s23135829
PMID:37447678
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10346815/
Abstract

The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security. With the increase in connectivity among devices and networks, maintaining the information security of an asset has now become essential for an organization. Intrusion detection systems (IDS) are widely used in networks for protection against different network attacks. Several machine-learning-based techniques have been used among researchers for the implementation of anomaly-based IDS (AIDS). In the past, the focus primarily remained on the improvement of the accuracy of the system. Efficiency with respect to time is an important aspect of an IDS, which most of the research has thus far somewhat overlooked. For this purpose, we propose a multi-layered filtration framework (MLFF) for feature reduction using a statistical approach. The proposed framework helps reduce the detection time without affecting the accuracy. We use the CIC-IDS2017 dataset for experiments. The proposed framework contains three filters and is connected in sequential order. The accuracy, precision, recall and F1 score are calculated against the selected machine learning models. In addition, the training time and the detection time are also calculated because these parameters are considered important in measuring the performance of a detection system. Generally, decision tree models, random forest methods, and artificial neural networks show better results in the detection of network attacks with minimum detection time.

摘要

数字数据的进步和依赖需要依赖信息技术。越来越多的数字数据及其在互联网上的可用性引发了信息安全问题。随着设备和网络之间的连接性增加,维护资产的信息安全现在对组织来说至关重要。入侵检测系统(IDS)广泛用于网络中以防止各种网络攻击。研究人员在实现基于异常的 IDS(AIDS)时使用了几种基于机器学习的技术。过去,重点主要集中在提高系统的准确性上。时间效率是 IDS 的一个重要方面,而迄今为止,大多数研究在某种程度上都忽略了这一点。为此,我们提出了一种使用统计方法进行特征减少的多层过滤框架(MLFF)。该框架有助于在不影响准确性的情况下减少检测时间。我们使用 CIC-IDS2017 数据集进行实验。该框架包含三个过滤器,并按顺序连接。针对选定的机器学习模型计算准确性、精度、召回率和 F1 分数。此外,还计算了训练时间和检测时间,因为这些参数在衡量检测系统的性能时被认为很重要。通常,决策树模型、随机森林方法和人工神经网络在以最小检测时间检测网络攻击方面表现出更好的结果。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/455364fc36e5/sensors-23-05829-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/53b3c7f6445d/sensors-23-05829-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/26ee4404203a/sensors-23-05829-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/8b04c6131f89/sensors-23-05829-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/167a45a8a6be/sensors-23-05829-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/b0a4f0f5df7e/sensors-23-05829-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/455364fc36e5/sensors-23-05829-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/53b3c7f6445d/sensors-23-05829-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/26ee4404203a/sensors-23-05829-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/8b04c6131f89/sensors-23-05829-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/167a45a8a6be/sensors-23-05829-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/b0a4f0f5df7e/sensors-23-05829-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/76e9/10346815/455364fc36e5/sensors-23-05829-g006.jpg

相似文献

1
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning.多层过滤框架,利用机器学习高效检测网络攻击。
Sensors (Basel). 2023 Jun 22;23(13):5829. doi: 10.3390/s23135829.
2
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
3
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.HDL-IDS:一种用于车联网入侵检测的混合深度学习架构。
Sensors (Basel). 2022 Feb 10;22(4):1340. doi: 10.3390/s22041340.
4
Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles.用于车联网入侵检测系统的多分类与基于树的集成网络
Sensors (Basel). 2023 Oct 28;23(21):8788. doi: 10.3390/s23218788.
5
Optimized Intrusion Detection for IoMT Networks with Tree-Based Machine Learning and Filter-Based Feature Selection.基于树型机器学习和基于滤波器的特征选择的物联网医疗网络优化入侵检测
Sensors (Basel). 2024 Sep 2;24(17):5712. doi: 10.3390/s24175712.
6
Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection.基于流量的入侵检测的机器学习技术评估。
Sensors (Basel). 2022 Nov 30;22(23):9326. doi: 10.3390/s22239326.
7
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.基于机器学习的物联网网络攻击分类的实验分析。
Sensors (Basel). 2021 Jan 10;21(2):446. doi: 10.3390/s21020446.
8
Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection.基于自动可解释特征选择的物联网系统入侵检测的注意 Transformer 深度学习算法。
PLoS One. 2023 Oct 16;18(10):e0286652. doi: 10.1371/journal.pone.0286652. eCollection 2023.
9
Adversarial attacks against supervised machine learning based network intrusion detection systems.对抗攻击对基于监督机器学习的网络入侵检测系统的影响。
PLoS One. 2022 Oct 14;17(10):e0275971. doi: 10.1371/journal.pone.0275971. eCollection 2022.
10
Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks.基于分布强化学习和生成对抗网络的工业物联网异常检测。
Sensors (Basel). 2022 Oct 22;22(21):8085. doi: 10.3390/s22218085.

引用本文的文献

1
Research on Adaptive 1DCNN Network Intrusion Detection Technology Based on BSGM Mixed Sampling.基于 BSGM 混合采样的自适应 1DCNN 网络入侵检测技术研究。
Sensors (Basel). 2023 Jul 6;23(13):6206. doi: 10.3390/s23136206.

本文引用的文献

1
Using Bayes factor hypothesis testing in neuroscience to establish evidence of absence.运用贝叶斯因子假设检验在神经科学中建立无证据的结论。
Nat Neurosci. 2020 Jul;23(7):788-799. doi: 10.1038/s41593-020-0660-4. Epub 2020 Jun 29.