入侵检测分类算法的部署与分析

Himanshu Pandey, Saumya Bhadauria
{"title":"入侵检测分类算法的部署与分析","authors":"Himanshu Pandey, Saumya Bhadauria","doi":"10.1109/IATMSI56455.2022.10119264","DOIUrl":null,"url":null,"abstract":"Intrusion Detection Systems that use anomaly de-tection can detect unknown assaults, but they are less accurate, resulting in many false alarms. In this paper, machine learning techniques are examined in order to create IDSs that may be used in existing computer networks. In order to improve detection quality, a three-step optimization technique is first provided: 1) rebalancing the dataset with augmented data, 2) optimizing model performance, and 3) integrating the results of the best models through ensemble learning. This method has problems because the models are trained on previously known assaults and so do not do anomaly detection. To solve the existing issues, we studied the accuracy, sensitivity, roc curve, false positive rate of various binary and multi-class classifiers like KNN, Linear SVM, Quadratic SVM, multi-layer perceptron(MLP), and some other general classification algorithms, which inferred to us that some advancements could be made to the existing models. We developed a new and better LSTM (Long Short Term Memory) technique, a deep learning technique for recognizing attacks and storing them in long-term memory in order to counter future attacks.","PeriodicalId":221211,"journal":{"name":"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deploying and Analyzing Classification Algorithms for Intrusion Detection\",\"authors\":\"Himanshu Pandey, Saumya Bhadauria\",\"doi\":\"10.1109/IATMSI56455.2022.10119264\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion Detection Systems that use anomaly de-tection can detect unknown assaults, but they are less accurate, resulting in many false alarms. In this paper, machine learning techniques are examined in order to create IDSs that may be used in existing computer networks. In order to improve detection quality, a three-step optimization technique is first provided: 1) rebalancing the dataset with augmented data, 2) optimizing model performance, and 3) integrating the results of the best models through ensemble learning. This method has problems because the models are trained on previously known assaults and so do not do anomaly detection. To solve the existing issues, we studied the accuracy, sensitivity, roc curve, false positive rate of various binary and multi-class classifiers like KNN, Linear SVM, Quadratic SVM, multi-layer perceptron(MLP), and some other general classification algorithms, which inferred to us that some advancements could be made to the existing models. We developed a new and better LSTM (Long Short Term Memory) technique, a deep learning technique for recognizing attacks and storing them in long-term memory in order to counter future attacks.\",\"PeriodicalId\":221211,\"journal\":{\"name\":\"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IATMSI56455.2022.10119264\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IATMSI56455.2022.10119264","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

采用异常检测的入侵检测系统可以检测到未知的攻击,但检测的准确性较低,容易产生误报。在本文中,为了创建可用于现有计算机网络的ids,研究了机器学习技术。为了提高检测质量,首先提出了一种三步优化技术:1)用增强数据重新平衡数据集,2)优化模型性能,3)通过集成学习整合最佳模型的结果。这种方法存在问题,因为模型是在先前已知的攻击上训练的,因此不进行异常检测。为了解决存在的问题,我们研究了KNN、Linear SVM、Quadratic SVM、multi-layer perceptron(MLP)等各种二分类器和多分类器的准确率、灵敏度、roc曲线、假阳性率等一些通用分类算法,这给我们提供了一些可以改进现有模型的推断。我们开发了一种新的更好的LSTM(长短期记忆)技术,这是一种用于识别攻击并将其存储在长期记忆中以应对未来攻击的深度学习技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Deploying and Analyzing Classification Algorithms for Intrusion Detection
Intrusion Detection Systems that use anomaly de-tection can detect unknown assaults, but they are less accurate, resulting in many false alarms. In this paper, machine learning techniques are examined in order to create IDSs that may be used in existing computer networks. In order to improve detection quality, a three-step optimization technique is first provided: 1) rebalancing the dataset with augmented data, 2) optimizing model performance, and 3) integrating the results of the best models through ensemble learning. This method has problems because the models are trained on previously known assaults and so do not do anomaly detection. To solve the existing issues, we studied the accuracy, sensitivity, roc curve, false positive rate of various binary and multi-class classifiers like KNN, Linear SVM, Quadratic SVM, multi-layer perceptron(MLP), and some other general classification algorithms, which inferred to us that some advancements could be made to the existing models. We developed a new and better LSTM (Long Short Term Memory) technique, a deep learning technique for recognizing attacks and storing them in long-term memory in order to counter future attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信