Skip to main content

2021 | OriginalPaper | Buchkapitel

A Performance Analysis Approach for Network Intrusion Detection Algorithms

verfasst von : Zhihao Wang, Dingde Jiang, Yuqing Wang, Junyang Zhang

Erschienen in: Simulation Tools and Techniques

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of mobile Internet and cloud computing, the amount of network traffic has been significantly increased. Security problems have drawn a lot of attention, while traditional methods are becoming increasingly unsuitable for it. In this paper, three machine learning algorithms are employed to detect network intrusion, including KNN, Random Forest, and Multilayer Perceptron. Performance evaluation and comparison between them are conducted, in terms of precision, recall, training time, etc. Simulation results on the NSL-KDD, a benchmark data set of network intrusion detection, show that the Random Forest algorithm exhibits higher detection accuracy and remarkably shorter training time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Xie, J., Li, S., Zhang, Y., et al.: A method based on hierarchical spatiotemporal features for trojan traffic detection. In: 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), pp. 1–8 (2019) Xie, J., Li, S., Zhang, Y., et al.: A method based on hierarchical spatiotemporal features for trojan traffic detection. In: 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), pp. 1–8 (2019)
2.
Zurück zum Zitat Li, Z., Batta, P., Trajkovic, L.: Comparison of machine learning algorithms for detection of network intrusions. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 4248–4253 (2018) Li, Z., Batta, P., Trajkovic, L.: Comparison of machine learning algorithms for detection of network intrusions. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 4248–4253 (2018)
5.
Zurück zum Zitat Ahmad, I., Basheri, M., Iqbal, M.J., et al.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789–33795 (2018)CrossRef Ahmad, I., Basheri, M., Iqbal, M.J., et al.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789–33795 (2018)CrossRef
6.
Zurück zum Zitat Jiang, D., Huo, L., Li, Y.: Fine-granularity inference and estimations to network traffic for SDN. PLoS ONE 13(5), 1–23 (2018) Jiang, D., Huo, L., Li, Y.: Fine-granularity inference and estimations to network traffic for SDN. PLoS ONE 13(5), 1–23 (2018)
7.
Zurück zum Zitat Cosar, M., Kiran, H.E.: Performance comparison of open source IDSs via Raspberry Pi. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), pp. 1–5 (2018) Cosar, M., Kiran, H.E.: Performance comparison of open source IDSs via Raspberry Pi. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), pp. 1–5 (2018)
8.
Zurück zum Zitat Jiang, D., Huo, L., Song, H.: Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans. Netw. Sci. Eng. 7(1), 80–90 (2020)MathSciNetCrossRef Jiang, D., Huo, L., Song, H.: Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans. Netw. Sci. Eng. 7(1), 80–90 (2020)MathSciNetCrossRef
9.
Zurück zum Zitat Sarvari, S., Sani, N.F.M., Hanapi, Z.M., et al.: An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access 8, 70651–70663 (2020)CrossRef Sarvari, S., Sani, N.F.M., Hanapi, Z.M., et al.: An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access 8, 70651–70663 (2020)CrossRef
10.
Zurück zum Zitat Jiang, D., Wang, W., Shi, L., Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans. Netw. Sci. Eng. 7(1), 507–519 (2020)MathSciNetCrossRef Jiang, D., Wang, W., Shi, L., Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans. Netw. Sci. Eng. 7(1), 507–519 (2020)MathSciNetCrossRef
11.
Zurück zum Zitat Chiba, Z., Abghour, N., Moussaid, K., et al.: A hybrid optimization framework based on genetic algorithm and simulated annealing algorithm to enhance performance of anomaly network intrusion detection system based on BP neural network. In: 2018 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), pp. 1–6 (2018) Chiba, Z., Abghour, N., Moussaid, K., et al.: A hybrid optimization framework based on genetic algorithm and simulated annealing algorithm to enhance performance of anomaly network intrusion detection system based on BP neural network. In: 2018 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), pp. 1–6 (2018)
12.
Zurück zum Zitat Jiang, D., Li, W., Lv, H.: An energy-efficient cooperative multicast routing in multi-hop wireless networks for smart medical applications. Neurocomputing 2017(220), 160–169 (2017)CrossRef Jiang, D., Li, W., Lv, H.: An energy-efficient cooperative multicast routing in multi-hop wireless networks for smart medical applications. Neurocomputing 2017(220), 160–169 (2017)CrossRef
13.
Zurück zum Zitat Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366–64374 (2019)CrossRef Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366–64374 (2019)CrossRef
14.
Zurück zum Zitat Jiang, D., Zhang, P., Lv, Z., et al.: Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet of Things J. 3(6), 1437–1447 (2016)CrossRef Jiang, D., Zhang, P., Lv, Z., et al.: Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet of Things J. 3(6), 1437–1447 (2016)CrossRef
15.
Zurück zum Zitat Singh, K., Mathai, K.J.: Performance comparison of intrusion detection system between deep belief network (DBN) algorithm and state preserving extreme learning machine (SPELM) algorithm. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–7 (2019) Singh, K., Mathai, K.J.: Performance comparison of intrusion detection system between deep belief network (DBN) algorithm and state preserving extreme learning machine (SPELM) algorithm. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–7 (2019)
16.
Zurück zum Zitat Jiang, D., Wang, Y., Lv, Z., Wang, W., Wang, H.: An energy-efficient networking approach in cloud services for IIoT networks. IEEE J. Sel. Areas Commun. 38(5), 928–941 (2020)CrossRef Jiang, D., Wang, Y., Lv, Z., Wang, W., Wang, H.: An energy-efficient networking approach in cloud services for IIoT networks. IEEE J. Sel. Areas Commun. 38(5), 928–941 (2020)CrossRef
17.
Zurück zum Zitat Zhang, Y., Li, P., Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019)CrossRef Zhang, Y., Li, P., Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019)CrossRef
18.
Zurück zum Zitat Wang, F., Jiang, D., Qi, S.: An adaptive routing algorithm for integrated information networks. China Commun. 7(1), 196–207 (2019) Wang, F., Jiang, D., Qi, S.: An adaptive routing algorithm for integrated information networks. China Commun. 7(1), 196–207 (2019)
19.
Zurück zum Zitat Liu, W., Liu, X., Di, X., et al.: A novel network intrusion detection algorithm based on fast fourier transformation. In: 2019 1st International Conference on Industrial Artificial Intelligence (IAI), pp. 1–6 (2019) Liu, W., Liu, X., Di, X., et al.: A novel network intrusion detection algorithm based on fast fourier transformation. In: 2019 1st International Conference on Industrial Artificial Intelligence (IAI), pp. 1–6 (2019)
20.
Zurück zum Zitat Jiang, D., Wang, Y., Lv, Z., Qi, S., Singh, S.: Big data analysis based network behavior insight of cellular networks for Industry 4.0 applications. IEEE Trans. Ind. Inf. 16(2), 1310–1320 (2020)CrossRef Jiang, D., Wang, Y., Lv, Z., Qi, S., Singh, S.: Big data analysis based network behavior insight of cellular networks for Industry 4.0 applications. IEEE Trans. Ind. Inf. 16(2), 1310–1320 (2020)CrossRef
21.
Zurück zum Zitat Liang, W., Li, K., Long, J., et al.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inf. 16(3), 2063–2071 (2020)CrossRef Liang, W., Li, K., Long, J., et al.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inf. 16(3), 2063–2071 (2020)CrossRef
22.
Zurück zum Zitat Jiang, D., Huo, L., Lv, Z., Song, H., Qin, W.: A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans. Intell. Transp. Syst. 19(10), 3305–3319 (2018)CrossRef Jiang, D., Huo, L., Lv, Z., Song, H., Qin, W.: A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans. Intell. Transp. Syst. 19(10), 3305–3319 (2018)CrossRef
23.
Zurück zum Zitat Khan, R.U., Zhang, X., Alazab, M., et al.: An improved convolutional neural network model for intrusion detection in networks. In: 2019 Cybersecurity and Cyberforensics Conference (CCC), pp. 74–77 (2019) Khan, R.U., Zhang, X., Alazab, M., et al.: An improved convolutional neural network model for intrusion detection in networks. In: 2019 Cybersecurity and Cyberforensics Conference (CCC), pp. 74–77 (2019)
25.
Zurück zum Zitat Miehling, E., Rasouli, M., Teneketzis, D.: A POMDP approach to the dynamic defense of large-scale cyber networks. IEEE Trans. Inf. Forensics Secur. 13(10), 2490–2505 (2018)CrossRef Miehling, E., Rasouli, M., Teneketzis, D.: A POMDP approach to the dynamic defense of large-scale cyber networks. IEEE Trans. Inf. Forensics Secur. 13(10), 2490–2505 (2018)CrossRef
Metadaten
Titel
A Performance Analysis Approach for Network Intrusion Detection Algorithms
verfasst von
Zhihao Wang
Dingde Jiang
Yuqing Wang
Junyang Zhang
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-72792-5_20