network intrusion detection

  • 文章类型: Journal Article
    随着互联网的迅猛发展,用户在享受极大便利的同时,也面临着诸多严重的安全问题。数据泄露的频率越来越高,这表明网络安全形势变得越来越紧迫。在网络安全领域,入侵检测在监控网络攻击中起着举足轻重的作用。然而,现有解决方案在检测此类入侵方面的功效仍然不理想,持续的安全危机。为了应对这一挑战,提出了一种基于卷积神经网络(CNN)的稀疏自编码器-贝叶斯优化-卷积神经网络(SA-BO-CNN)系统。首先,为了解决数据不平衡的问题,我们在系统构建过程中采用了SMOTE重采样功能。其次,我们通过结合SA来增强系统的特征提取能力。最后,我们利用BO与CNN相结合来提高系统准确性。此外,采用多轮迭代法进一步提高检测精度。实验结果表明,系统精度为98.36%。比较分析强调了SA-BO-CNN系统的较高检测率。
    With the rapid extensive development of the Internet, users not only enjoy great convenience but also face numerous serious security problems. The increasing frequency of data breaches has made it clear that the network security situation is becoming increasingly urgent. In the realm of cybersecurity, intrusion detection plays a pivotal role in monitoring network attacks. However, the efficacy of existing solutions in detecting such intrusions remains suboptimal, perpetuating the security crisis. To address this challenge, we propose a sparse autoencoder-Bayesian optimization-convolutional neural network (SA-BO-CNN) system based on convolutional neural network (CNN). Firstly, to tackle the issue of data imbalance, we employ the SMOTE resampling function during system construction. Secondly, we enhance the system\'s feature extraction capabilities by incorporating SA. Finally, we leverage BO in conjunction with CNN to enhance system accuracy. Additionally, a multi-round iteration approach is adopted to further refine detection accuracy. Experimental findings demonstrate an impressive system accuracy of 98.36%. Comparative analyses underscore the superior detection rate of the SA-BO-CNN system.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    工业物联网(IIoT)的安全性至关重要,网络入侵检测系统(NIDS)在其中发挥着不可或缺的作用。尽管关于利用深度学习技术实现网络入侵检测的研究越来越多,由于深度学习需要大规模数据集进行训练,因此设备的本地数据有限可能会导致模型性能不佳。一些解决方案建议集中设备的本地数据集用于深度学习训练,但这可能涉及用户隐私问题。为了应对这些挑战,这项研究提出了一种新颖的基于联邦学习(FL)的方法,旨在提高网络入侵检测的准确性,同时确保数据隐私保护。这项研究将卷积神经网络与注意力机制相结合,开发了一种专门为IIoT设计的新的深度学习入侵检测模型。此外,变分自动编码器被纳入以增强数据隐私保护。此外,FL框架使多个IIoT客户端能够在不共享其原始数据的情况下联合训练共享入侵检测模型。此策略显著提高了模型的检测能力,同时有效解决了数据隐私和安全问题。为了验证该方法的有效性,在真实世界的物联网(IoT)网络入侵数据集上进行了一系列实验。实验结果表明,我们的模型和FL方法显著提高了关键性能指标,如检测精度,精度,与传统的局部训练方法和现有模型相比,以及假阳性率(FPR)。
    The security of the Industrial Internet of Things (IIoT) is of vital importance, and the Network Intrusion Detection System (NIDS) plays an indispensable role in this. Although there is an increasing number of studies on the use of deep learning technology to achieve network intrusion detection, the limited local data of the device may lead to poor model performance because deep learning requires large-scale datasets for training. Some solutions propose to centralize the local datasets of devices for deep learning training, but this may involve user privacy issues. To address these challenges, this study proposes a novel federated learning (FL)-based approach aimed at improving the accuracy of network intrusion detection while ensuring data privacy protection. This research combines convolutional neural networks with attention mechanisms to develop a new deep learning intrusion detection model specifically designed for the IIoT. Additionally, variational autoencoders are incorporated to enhance data privacy protection. Furthermore, an FL framework enables multiple IIoT clients to jointly train a shared intrusion detection model without sharing their raw data. This strategy significantly improves the model\'s detection capability while effectively addressing data privacy and security issues. To validate the effectiveness of the proposed method, a series of experiments were conducted on a real-world Internet of Things (IoT) network intrusion dataset. The experimental results demonstrate that our model and FL approach significantly improve key performance metrics such as detection accuracy, precision, and false-positive rate (FPR) compared to traditional local training methods and existing models.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    网络入侵检测系统(NIDS)作为一种安全措施,在应对不断增加的网络威胁中起着至关重要的作用。当前的大多数研究依赖于严重依赖于特征工程的特征就绪数据集。相反,网络流量的日益复杂和攻击技术的不断发展导致良性和恶意网络行为之间的区别逐渐减弱。在本文中,提出了一种基于对比学习方法的端到端入侵检测框架。我们设计了一个分层卷积神经网络(CNN)和门控循环单元(GRU)模型,以促进从原始交通数据中自动提取时空特征。对比学习的集成放大了表示空间中良性和恶意网络流量之间的区别。与使用交叉熵损失函数训练的方法相比,所提出的方法对未知攻击具有增强的检测能力。在公共数据etsCIC-IDS2017和CSE-CIC-IDS2018上进行了实验,证明我们的方法可以对已知攻击达到99.9%的检测精度,从而实现了最先进的性能。对于未知的攻击,可以实现95%的加权召回率。
    The network intrusion detection system (NIDS) plays a crucial role as a security measure in addressing the increasing number of network threats. The majority of current research relies on feature-ready datasets that heavily depend on feature engineering. Conversely, the increasing complexity of network traffic and the ongoing evolution of attack techniques lead to a diminishing distinction between benign and malicious network behaviors. In this paper, we propose a novel end-to-end intrusion detection framework based on a contrastive learning approach. We design a hierarchical Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU) model to facilitate the automated extraction of spatiotemporal features from raw traffic data. The integration of contrastive learning amplifies the distinction between benign and malicious network traffic in the representation space. The proposed method exhibits enhanced detection capabilities for unknown attacks in comparison to the approaches trained using the cross-entropy loss function. Experiments are carried out on the public datasets CIC-IDS2017 and CSE-CIC-IDS2018, demonstrating that our method can attain a detection accuracy of 99.9% for known attacks, thus achieving state-of-the-art performance. For unknown attacks, a weighted recall rate of 95% can be achieved.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    关于网络入侵检测的知识越来越多,在过去的几十年中,已经发布了一些具有网络流量和网络安全威胁的开放数据集。然而,许多数据集已经老化,不是在当代工业通信系统中收集的,或者不容易支持专注于分布式异常检测的研究。本文介绍了Westermo网络流量数据集,在由12个硬件设备组成的网络中,在90分钟内记录了180万个网络数据包。除了PCAP格式的原始数据之外,数据集还包含CSV文件中网络流形式的预处理数据。此数据集可以支持研究社区的主题,例如入侵检测,异常检测,错误配置检测,分布式或联合人工智能,和攻击分类。特别是,我们的目标是使用数据集来继续在边缘设备中进行资源受限的分布式人工智能。数据集包含六种类型的事件:无害SSH、坏SSH,配置错误的IP地址,重复的IP地址,端口扫描,和中间攻击的人。
    There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged, were not collected in a contemporary industrial communication system, or do not easily support research focusing on distributed anomaly detection. This paper presents the Westermo network traffic data set, 1.8 million network packets recorded in over 90 minutes in a network built up of twelve hardware devices. In addition to the raw data in PCAP format, the data set also contains pre-processed data in the form of network flows in CSV files. This data set can support the research community for topics such as intrusion detection, anomaly detection, misconfiguration detection, distributed or federated artificial intelligence, and attack classification. In particular, we aim to use the data set to continue work on resource-constrained distributed artificial intelligence in edge devices. The data set contains six types of events: harmless SSH, bad SSH, misconfigured IP address, duplicated IP address, port scan, and man in the middle attack.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    互联网技术的发展给我们带来了好处,但同时,网络攻击事件激增,对网络安全构成严重威胁。在现实世界中,攻击数据量比正常数据量小得多,导致严重的类不平衡问题,影响分类器的性能。此外,当使用CNN进行检测和分类时,需要手动调整参数,这使得很难获得最优的卷积核数。因此,我们提出了一种混合采样技术,称为边界线-SMOTE和高斯混合模型(GMM),被称为BSGM,结合了这两种方法。我们利用量子粒子群优化(QPSO)算法自动确定每个一维卷积层的最佳卷积核数量,从而提高少数类的检出率。在我们的实验中,我们使用KDD99数据集进行了二进制和多类实验。我们将我们提出的BSGM-QPSO-1DCNN方法与ROS-CNN进行了比较,SMOTE-CNN,RUS-SMOTE-CNN,RUS-SMOTE-RF,和RUS-SMOTE-MLP作为入侵检测的基准模型。实验结果表明:(i)BSGM-QPSO-1DCNN在二进制和多类实验中获得了99.93%和99.94%的高准确率,(ii)少数类R2L和U2R的准确率分别提高了68%和66%,分别。我们的研究表明,BSGM-QPSO-1DCNN是解决该领域数据不平衡问题的有效解决方案,它优于本研究中使用的五种入侵检测方法。
    The development of internet technology has brought us benefits, but at the same time, there has been a surge in network attack incidents, posing a serious threat to network security. In the real world, the amount of attack data is much smaller than normal data, leading to a severe class imbalance problem that affects the performance of classifiers. Additionally, when using CNN for detection and classification, manual adjustment of parameters is required, making it difficult to obtain the optimal number of convolutional kernels. Therefore, we propose a hybrid sampling technique called Borderline-SMOTE and Gaussian Mixture Model (GMM), referred to as BSGM, which combines the two approaches. We utilize the Quantum Particle Swarm Optimization (QPSO) algorithm to automatically determine the optimal number of convolutional kernels for each one-dimensional convolutional layer, thereby enhancing the detection rate of minority classes. In our experiments, we conducted binary and multi-class experiments using the KDD99 dataset. We compared our proposed BSGM-QPSO-1DCNN method with ROS-CNN, SMOTE-CNN, RUS-SMOTE-CNN, RUS-SMOTE-RF, and RUS-SMOTE-MLP as benchmark models for intrusion detection. The experimental results show the following: (i) BSGM-QPSO-1DCNN achieves high accuracy rates of 99.93% and 99.94% in binary and multi-class experiments, respectively; (ii) the precision rates for the minority classes R2L and U2R are improved by 68% and 66%, respectively. Our research demonstrates that BSGM-QPSO-1DCNN is an efficient solution for addressing the imbalanced data issue in this field, and it outperforms the five intrusion detection methods used in this study.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    互联网使用的普遍性导致互联网流量的多样化,其中可能包含有关各种类型的Internet攻击的信息。近年来,许多研究人员已经将深度学习技术应用于入侵检测系统中,并获得了相当强的识别结果。然而,大多数实验都使用旧的数据集,所以他们不能反映最新的攻击信息。在本文中,CSE-CIC-IDS2018数据集和标准评估指标的当前状态已被用于评估所提出的机制.预处理数据集后,六个模型-深度神经网络(DNN),卷积神经网络(CNN)递归神经网络(RNN),长短期记忆(LSTM),CNN+RNN和CNN+LSTM是用来判断网络流量是否包含恶意攻击的。此外,进行了多分类实验,将流量分类为良性流量和六类恶意攻击:BruteForce,拒绝服务(DoS),网络攻击,浸润,僵尸网络,和分布式拒绝服务(DDoS)。每个模型在各种实验中都表现出很高的准确性,多类分类准确率均在98%以上。与其他论文的入侵检测系统(IDS)相比,该模型有效地提高了检测性能。此外,CNN+RNN和CNN+LSTM组合的推断时间比单个DNN的推断时间长,RNN和CNN。因此,DNN,考虑到算法在IDS设备中的实现,RNN和CNN优于CNN+RNN和CNN+LSTM。
    The prevalence of internet usage leads to diverse internet traffic, which may contain information about various types of internet attacks. In recent years, many researchers have applied deep learning technology to intrusion detection systems and obtained fairly strong recognition results. However, most experiments have used old datasets, so they could not reflect the latest attack information. In this paper, a current state of the CSE-CIC-IDS2018 dataset and standard evaluation metrics has been employed to evaluate the proposed mechanism. After preprocessing the dataset, six models-deep neural network (DNN), convolutional neural network (CNN), recurrent neural network (RNN), long short-term memory (LSTM), CNN + RNN and CNN + LSTM-were constructed to judge whether network traffic comprised a malicious attack. In addition, multi-classification experiments were conducted to sort traffic into benign traffic and six categories of malicious attacks: BruteForce, Denial-of-service (DoS), Web Attacks, Infiltration, Botnet, and Distributed denial-of-service (DDoS). Each model showed a high accuracy in various experiments, and their multi-class classification accuracy were above 98%. Compared with the intrusion detection system (IDS) of other papers, the proposed model effectively improves the detection performance. Moreover, the inference time for the combinations of CNN + RNN and CNN + LSTM is longer than that of the individual DNN, RNN and CNN. Therefore, the DNN, RNN and CNN are better than CNN + RNN and CNN + LSTM for considering the implementation of the algorithm in the IDS device.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    入侵检测系统(IDS)对于网络安全至关重要,因为它们可以检测和响应恶意流量。然而,随着下一代通信网络变得越来越多样化和互联,入侵检测系统面临维数困难。先前的工作表明,模拟现实世界网络数据的高维数据集增加了IDS系统训练和测试的复杂性和处理时间,而不相关的特征资源浪费,降低了检测率。在本文中,提出了一种新的入侵检测模型,该模型使用遗传算法(GA)进行特征选择,并使用梯度下降优化算法。首先,基于GA的方法用于从NSL-KDD数据集中选择一组高度相关的特征,这些特征可以显着提高所提出模型的检测能力。然后使用HPSOGWO方法训练反向传播神经网络(BPNN),粒子群优化(PSO)和灰狼优化(GWO)算法的混合组合。最后,利用混合HPSOGWO-BPNN算法解决NSL-KDD数据集上的二类和多类分类问题。实验结果表明,该模型在准确性方面比其他技术具有更好的性能,具有较低的错误率和更好的检测不同类型攻击的能力。
    Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion detection systems are confronted with dimensionality difficulties. Prior works have shown that high-dimensional datasets that simulate real-world network data increase the complexity and processing time of IDS system training and testing, while irrelevant features waste resources and reduce the detection rate. In this paper, a new intrusion detection model is presented which uses a genetic algorithm (GA) for feature selection and optimization algorithms for gradient descent. First, the GA-based method is used to select a set of highly correlated features from the NSL-KDD dataset that can significantly improve the detection ability of the proposed model. A Back-Propagation Neural Network (BPNN) is then trained using the HPSOGWO method, a hybrid combination of the Particle Swarm Optimization (PSO) and Grey Wolf Optimization (GWO) algorithms. Finally, the hybrid HPSOGWO-BPNN algorithm is used to solve binary and multi-class classification problems on the NSL-KDD dataset. The experimental outcomes demonstrate that the proposed model achieves better performance than other techniques in terms of accuracy, with a lower error rate and better ability to detect different types of attacks.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    近年来,物联网(IoT)已成为我们现代生活各个方面最重要的概念之一。然而,物联网在全球范围内使用的最关键挑战是解决其安全问题。解决物联网安全挑战的最重要任务之一是检测网络中的入侵。尽管近年来基于机器/深度学习的解决方案已被反复用于检测网络入侵,仍然有相当大的潜力来提高分类器(入侵检测器)的准确性和性能。在本文中,我们开发了一种新颖的训练算法来更好地调整所使用的深层架构的参数。要特别这样做,我们首先介绍了一种新颖的基于邻域搜索的粒子群优化(NSBPSO)算法,以改善对PSO算法的开发/探索。接下来,我们利用NSBPSO的优势来优化训练深度架构作为我们的网络入侵检测器,以获得更好的准确性和性能。为了评估所提出的分类器的性能,我们使用两个名为UNSW-NB15和Bot-IoT的网络入侵检测数据集来评估所提出的分类器的准确性和性能。
    The Internet of Things (IoT) has become one of the most important concepts in various aspects of our modern life in recent years. However, the most critical challenge for the world-wide use of the IoT is to address its security issues. One of the most important tasks to address the security challenges in the IoT is to detect intrusion in the network. Although the machine/deep learning-based solutions have been repeatedly used to detect network intrusion through recent years, there is still considerable potential to improve the accuracy and performance of the classifier (intrusion detector). In this paper, we develop a novel training algorithm to better tune the parameters of the used deep architecture. To specifically do so, we first introduce a novel neighborhood search-based particle swarm optimization (NSBPSO) algorithm to improve the exploitation/exploration of the PSO algorithm. Next, we use the advantage of NSBPSO to optimally train the deep architecture as our network intrusion detector in order to obtain better accuracy and performance. For evaluating the performance of the proposed classifier, we use two network intrusion detection datasets named UNSW-NB15 and Bot-IoT to rate the accuracy and performance of the proposed classifier.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    The number of security breaches in the cyberspace is on the rise. This threat is met with intensive work in the intrusion detection research community. To keep the defensive mechanisms up to date and relevant, realistic network traffic datasets are needed. The use of flow-based data for machine-learning-based network intrusion detection is a promising direction for intrusion detection systems. However, many contemporary benchmark datasets do not contain features that are usable in the wild. The main contribution of this work is to cover the research gap related to identifying and investigating valuable features in the NetFlow schema that allow for effective, machine-learning-based network intrusion detection in the real world. To achieve this goal, several feature selection techniques have been applied on five flow-based network intrusion detection datasets, establishing an informative flow-based feature set. The authors\' experience with the deployment of this kind of system shows that to close the research-to-market gap, and to perform actual real-world application of machine-learning-based intrusion detection, a set of labeled data from the end-user has to be collected. This research aims at establishing the appropriate, minimal amount of data that is sufficient to effectively train machine learning algorithms in intrusion detection. The results show that a set of 10 features and a small amount of data is enough for the final model to perform very well.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one another, coming up with new attacks, new ways to defend against those attacks, and again with new ways to circumvent those defences. This situation creates a constant need for novel, realistic cybersecurity datasets. This paper introduces the effects of using machine-learning-based intrusion detection methods in network traffic coming from a real-life architecture. The main contribution of this work is a dataset coming from a real-world, academic network. Real-life traffic was collected and, after performing a series of attacks, a dataset was assembled. The dataset contains 44 network features and an unbalanced distribution of classes. In this work, the capability of the dataset for formulating machine-learning-based models was experimentally evaluated. To investigate the stability of the obtained models, cross-validation was performed, and an array of detection metrics were reported. The gathered dataset is part of an effort to bring security against novel cyberthreats and was completed in the SIMARGL project.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Sci-hub)

       PDF(Pubmed)

公众号