通过入侵检测数据集分类检测网络攻击的框架

IF 1.9 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Durgesh Srivastava , Rajeshwar Singh , Chinmay Chakraborty , Sunil Kr. Maakar , Aaisha Makkar , Deepak Sinwar
{"title":"通过入侵检测数据集分类检测网络攻击的框架","authors":"Durgesh Srivastava ,&nbsp;Rajeshwar Singh ,&nbsp;Chinmay Chakraborty ,&nbsp;Sunil Kr. Maakar ,&nbsp;Aaisha Makkar ,&nbsp;Deepak Sinwar","doi":"10.1016/j.micpro.2023.104964","DOIUrl":null,"url":null,"abstract":"<div><p><span><span>Recognition of the consequence for advanced tools and techniques to secure the network infrastructure from the security risks has prompted the advancement of many machine learning-based intrusion detection strategies. However, it is a big challenge for the researchers to make improvements in an </span>Intrusion Detection System with desired advantages and constraints. This paper has developed a proficient soft computing framework using </span>Grey Wolf Optimization<span> and Entropy-Based Graph (GWO-EBG) to classify intrusion detection datasets to reduce the false rate. In the proposed scheme, initially, the input data is preprocessed by the data transformation and normalization procedure. After the preprocessing, optimal features have been chosen for the dimension reduction from the preprocessed data using the grey wolf optimization (GWO) algorithm. Then, the Entropy value has estimated from the idyllically selected features. Lastly, an Entropy-Based Graph (EBG) has been constructed to classify data into intrusion or normal data. The experimental results demonstrate that the developed method outperforms other existing methods in various performance measures<span><span>. The detection rate of the developed GWO-EBG is found to be 94.6%, which is higher than 91.24 % of EBG, 75.60 % K-Nearest Neighbors (KNN), 73.36 % of Support Vector Machine<span> (SVM), and 74.88 % of Generalized Regression Neural Network (GRNN) on 5000 connection vectors data obtained from KDD CUP’99 </span></span>testing dataset. The false-positive rate of developed strategy (GWO-EBG) is 0.35 %%, which is lower than 2.18 % of EBG, 7.32 % KNN, 8.15 % of SVM, and 8.13 % of GRNN with 5000 testing datasets.</span></span></p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"105 ","pages":"Article 104964"},"PeriodicalIF":1.9000,"publicationDate":"2023-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A framework for detection of cyber attacks by the classification of intrusion detection datasets\",\"authors\":\"Durgesh Srivastava ,&nbsp;Rajeshwar Singh ,&nbsp;Chinmay Chakraborty ,&nbsp;Sunil Kr. Maakar ,&nbsp;Aaisha Makkar ,&nbsp;Deepak Sinwar\",\"doi\":\"10.1016/j.micpro.2023.104964\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p><span><span>Recognition of the consequence for advanced tools and techniques to secure the network infrastructure from the security risks has prompted the advancement of many machine learning-based intrusion detection strategies. However, it is a big challenge for the researchers to make improvements in an </span>Intrusion Detection System with desired advantages and constraints. This paper has developed a proficient soft computing framework using </span>Grey Wolf Optimization<span> and Entropy-Based Graph (GWO-EBG) to classify intrusion detection datasets to reduce the false rate. In the proposed scheme, initially, the input data is preprocessed by the data transformation and normalization procedure. After the preprocessing, optimal features have been chosen for the dimension reduction from the preprocessed data using the grey wolf optimization (GWO) algorithm. Then, the Entropy value has estimated from the idyllically selected features. Lastly, an Entropy-Based Graph (EBG) has been constructed to classify data into intrusion or normal data. The experimental results demonstrate that the developed method outperforms other existing methods in various performance measures<span><span>. The detection rate of the developed GWO-EBG is found to be 94.6%, which is higher than 91.24 % of EBG, 75.60 % K-Nearest Neighbors (KNN), 73.36 % of Support Vector Machine<span> (SVM), and 74.88 % of Generalized Regression Neural Network (GRNN) on 5000 connection vectors data obtained from KDD CUP’99 </span></span>testing dataset. The false-positive rate of developed strategy (GWO-EBG) is 0.35 %%, which is lower than 2.18 % of EBG, 7.32 % KNN, 8.15 % of SVM, and 8.13 % of GRNN with 5000 testing datasets.</span></span></p></div>\",\"PeriodicalId\":49815,\"journal\":{\"name\":\"Microprocessors and Microsystems\",\"volume\":\"105 \",\"pages\":\"Article 104964\"},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2023-10-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Microprocessors and Microsystems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0141933123002089\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Microprocessors and Microsystems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0141933123002089","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

由于认识到需要先进的工具和技术来保护网络基础设施免受安全风险的影响,许多基于机器学习的入侵检测策略得到了发展。然而,如何改进入侵检测系统,使其具备所需的优势和约束条件,是研究人员面临的一大挑战。本文利用灰狼优化和基于熵的图(GWO-EBG)开发了一个精通软计算的框架,用于对入侵检测数据集进行分类,以降低误报率。在提议的方案中,首先通过数据转换和归一化程序对输入数据进行预处理。预处理后,使用灰狼优化(GWO)算法从预处理数据中选择最佳特征进行降维。然后,根据所选特征估算熵值。最后,构建了基于熵的图(EBG),将数据分为入侵数据和正常数据。实验结果表明,所开发的方法在各种性能指标上都优于其他现有方法。在从 KDD CUP'99 测试数据集获得的 5000 个连接向量数据上,发现所开发的 GWO-EBG 的检测率为 94.6%,高于 EBG 的 91.24%、K-近邻(KNN)的 75.60%、支持向量机(SVM)的 73.36% 和广义回归神经网络(GRNN)的 74.88%。所开发策略(GWO-EBG)的误判率为 0.35 %%,低于使用 5000 个测试数据集的 EBG 的 2.18 %、KNN 的 7.32 %、SVM 的 8.15 % 和 GRNN 的 8.13 %。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A framework for detection of cyber attacks by the classification of intrusion detection datasets

Recognition of the consequence for advanced tools and techniques to secure the network infrastructure from the security risks has prompted the advancement of many machine learning-based intrusion detection strategies. However, it is a big challenge for the researchers to make improvements in an Intrusion Detection System with desired advantages and constraints. This paper has developed a proficient soft computing framework using Grey Wolf Optimization and Entropy-Based Graph (GWO-EBG) to classify intrusion detection datasets to reduce the false rate. In the proposed scheme, initially, the input data is preprocessed by the data transformation and normalization procedure. After the preprocessing, optimal features have been chosen for the dimension reduction from the preprocessed data using the grey wolf optimization (GWO) algorithm. Then, the Entropy value has estimated from the idyllically selected features. Lastly, an Entropy-Based Graph (EBG) has been constructed to classify data into intrusion or normal data. The experimental results demonstrate that the developed method outperforms other existing methods in various performance measures. The detection rate of the developed GWO-EBG is found to be 94.6%, which is higher than 91.24 % of EBG, 75.60 % K-Nearest Neighbors (KNN), 73.36 % of Support Vector Machine (SVM), and 74.88 % of Generalized Regression Neural Network (GRNN) on 5000 connection vectors data obtained from KDD CUP’99 testing dataset. The false-positive rate of developed strategy (GWO-EBG) is 0.35 %%, which is lower than 2.18 % of EBG, 7.32 % KNN, 8.15 % of SVM, and 8.13 % of GRNN with 5000 testing datasets.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Microprocessors and Microsystems
Microprocessors and Microsystems 工程技术-工程:电子与电气
CiteScore
6.90
自引率
3.80%
发文量
204
审稿时长
172 days
期刊介绍: Microprocessors and Microsystems: Embedded Hardware Design (MICPRO) is a journal covering all design and architectural aspects related to embedded systems hardware. This includes different embedded system hardware platforms ranging from custom hardware via reconfigurable systems and application specific processors to general purpose embedded processors. Special emphasis is put on novel complex embedded architectures, such as systems on chip (SoC), systems on a programmable/reconfigurable chip (SoPC) and multi-processor systems on a chip (MPSoC), as well as, their memory and communication methods and structures, such as network-on-chip (NoC). Design automation of such systems including methodologies, techniques, flows and tools for their design, as well as, novel designs of hardware components fall within the scope of this journal. Novel cyber-physical applications that use embedded systems are also central in this journal. While software is not in the main focus of this journal, methods of hardware/software co-design, as well as, application restructuring and mapping to embedded hardware platforms, that consider interplay between software and hardware components with emphasis on hardware, are also in the journal scope.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信