期刊文献+

Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems 被引量:2

下载PDF
导出
摘要 The extensive proliferation of modern information services and ubiquitous digitization of society have raised cybersecurity challenges to new levels.With the massive number of connected devices,opportunities for potential network attacks are nearly unlimited.An additional problem is that many low-cost devices are not equippedwith effective security protection so that they are easily hacked and applied within a network of bots(botnet)to perform distributed denial of service(DDoS)attacks.In this paper,we propose a novel intrusion detection system(IDS)based on deep learning that aims to identify suspicious behavior in modern heterogeneous information systems.The proposed approach is based on a deep recurrent autoencoder that learns time series of normal network behavior and detects notable network anomalies.An additional feature of the proposed IDS is that it is trained with an optimized dataset,where the number of features is reduced by 94%without classification accuracy loss.Thus,the proposed IDS remains stable in response to slight system perturbations,which do not represent network anomalies.The proposed approach is evaluated under different simulation scenarios and provides a 99%detection accuracy over known datasets while reducing the training time by an order of magnitude.
出处 《Computers, Materials & Continua》 SCIE EI 2022年第1期413-431,共19页 计算机、材料和连续体(英文)
基金 This work was supported by the Slovak Research and Development Agency,project number APVV-18-0214 by the Scientific Grant Agency of the Ministry of Education,science,research and sport of the Slovak Republic under the contract:1/0268/19 by the Ukrainian government projects No.0120U102201“Development the methods and unified software-hardware means for the deployment of the energy efficient intent-based multi-purpose information and communication networks,”and No.0120U100674,“Designing the novel decentralized mobile network based on blockchain architecture and artificial intelligence for 5G/6G development in Ukraine.”。
  • 相关文献

参考文献1

二级参考文献11

  • 1王立新著,王迎军译.模糊系统与模糊控制教程[M]. 清华大学出版社, 2003 被引量:1
  • 2M.Sato,and Y.Sato.Fuzzy clustering model forasymmetry and self-similarity[].Proceedings of theSixth IEEE International Conference on Fuzzy Sys-tems July –.1–51997 被引量:1
  • 3H.Debar,and A.Wespi.Aggregation and correlationof intrusion-detection alerts[].Proceedings of the thInternational Symposium on Recent Advances in In-trusion Detection October –.10–122001 被引量:1
  • 4Y.Soejima,E.Y.Chen,and H.Fuji.DetectingDDoS attacks by analyzing client response patterns[].Proceedings of the Symposium on Applicationsand the Internet WorkshopsSaint Workshops Jan–Feb.42005 被引量:1
  • 5V.Paxson,and S.Floyd.Wide area traffic:The failureof Poisson modeling[].IEEE/ACM Transon Net-working.1995 被引量:1
  • 6T.E.Ozkurt,,T.Akgul,and S.Baykut.Principalcomponent analysis of the fractional brownian motionfor 0<H<0.5[].Proceedings of the International con-ference on AcousticsSpeech and Signal Processing(ICASSP’) May –.21–242006 被引量:1
  • 7Y.G.Kim,A.Shiravi,and P.S.Min.Congestionprediction of self-similar network through parameterestimation[].Network Operations and ManagementSymposium.2006 被引量:1
  • 8Guanghui He,and J.C Hou.An in-depth,analyticalstudy of sampling techniques for self-similar internettraffic[].The th International Conference on Dis-tributed Computing Systems June–.6–102005 被引量:1
  • 9H.F.Zhang,Y.T.Shu,and Oliver Yang.Estimationof Hurst parameter by variance-time plots[].Proceed-ings of the IEEE Pacific Rim Conference on Com-municationsComputers and Signal Processing Aug–.20–221997 被引量:1
  • 10A.Popescu.Traffic self-similarity[].IEEE InternationalConference on Telecommunications(ICT’) June.82001 被引量:1

共引文献1

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部