基于模块化的局域网实时入侵检测系统

IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Ilhan Firat Kilincer
{"title":"基于模块化的局域网实时入侵检测系统","authors":"Ilhan Firat Kilincer","doi":"10.1016/j.comnet.2025.111577","DOIUrl":null,"url":null,"abstract":"<div><div>Resistance to cyber-attacks is critical for local networks, which are responsible for the smooth operation of many processes such as data sharing, communication, data storage and application access. In this study, a modular system is proposed to detect attacks that may occur in local networks. The proposed model is designed to detect local network attacks using two different methods. The first method aims to detect Spanning Tree Protocol (STP) Root Bridge, MAC Flood, Man in the Middle (MiTM) and Rogue DHCP attacks that are common in local area networks. The Layer 2 Discovery (L2D) application has been developed to detect these attacks in real time, which can lead to major service interruptions and data breaches in local networks. In addition, the developed application offers brand-independent security configurations to network administrators with GPT- 4o support. The another module of the proposed method, a feature selection and machine learning based method is presented for the detection of Distributed Denial of Service (DDoS) attacks occurring in local networks. In the proposed method, the most effective features in the CIC-DDoS2019 dataset are iteratively ranked with the default parameters of the Information Gain Attribute (IGA) algorithm and the Light Gradient Boosting Machine (LGBM) algorithm. A median filter is applied to the best selected features, and then new features are created with time series. The newly obtained data set was classified with the default parameters of the K-NN, RF, 1D-CNN, MLP and LGBM classifiers and the classifier with the highest accuracy result was selected. As a result of the process, the best hyper-parameters of the LGBM classifier that gave the highest result were determined with 10-K cross validation. As a result, the proposed method achieved 95.98 % accuracy and 96 % F1 Score value on the 13-class CIC-DDoS2019 dataset. In the last step of the study, classes consisting of similar characteristics in the dataset were combined and the CIC_DDoS2019 dataset was reduced to 12 classes. The proposed method was applied to the 12-class CIC_DDoS2019 dataset and achieved an accuracy 99.14 % and 99 % F1 Score. In addition to the detection capability of DDoS attacks, the study brings a new perspective to intrusion detection studies with the detection of real-time STP Root Bridge, MAC Flood, Man in the Middle (MiTM) and Rogue DHCP attacks.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"270 ","pages":"Article 111577"},"PeriodicalIF":4.4000,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A modular system for real-time intrusion detection on local area networks\",\"authors\":\"Ilhan Firat Kilincer\",\"doi\":\"10.1016/j.comnet.2025.111577\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Resistance to cyber-attacks is critical for local networks, which are responsible for the smooth operation of many processes such as data sharing, communication, data storage and application access. In this study, a modular system is proposed to detect attacks that may occur in local networks. The proposed model is designed to detect local network attacks using two different methods. The first method aims to detect Spanning Tree Protocol (STP) Root Bridge, MAC Flood, Man in the Middle (MiTM) and Rogue DHCP attacks that are common in local area networks. The Layer 2 Discovery (L2D) application has been developed to detect these attacks in real time, which can lead to major service interruptions and data breaches in local networks. In addition, the developed application offers brand-independent security configurations to network administrators with GPT- 4o support. The another module of the proposed method, a feature selection and machine learning based method is presented for the detection of Distributed Denial of Service (DDoS) attacks occurring in local networks. In the proposed method, the most effective features in the CIC-DDoS2019 dataset are iteratively ranked with the default parameters of the Information Gain Attribute (IGA) algorithm and the Light Gradient Boosting Machine (LGBM) algorithm. A median filter is applied to the best selected features, and then new features are created with time series. The newly obtained data set was classified with the default parameters of the K-NN, RF, 1D-CNN, MLP and LGBM classifiers and the classifier with the highest accuracy result was selected. As a result of the process, the best hyper-parameters of the LGBM classifier that gave the highest result were determined with 10-K cross validation. As a result, the proposed method achieved 95.98 % accuracy and 96 % F1 Score value on the 13-class CIC-DDoS2019 dataset. In the last step of the study, classes consisting of similar characteristics in the dataset were combined and the CIC_DDoS2019 dataset was reduced to 12 classes. The proposed method was applied to the 12-class CIC_DDoS2019 dataset and achieved an accuracy 99.14 % and 99 % F1 Score. In addition to the detection capability of DDoS attacks, the study brings a new perspective to intrusion detection studies with the detection of real-time STP Root Bridge, MAC Flood, Man in the Middle (MiTM) and Rogue DHCP attacks.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"270 \",\"pages\":\"Article 111577\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625005444\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625005444","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

抵抗网络攻击对于本地网络来说至关重要,因为本地网络负责数据共享、通信、数据存储和应用程序访问等许多过程的顺利运行。在这项研究中,提出了一个模块化系统来检测可能发生在本地网络中的攻击。该模型设计用于使用两种不同的方法检测本地网络攻击。第一种方法是检测局域网中常见的STP (Spanning Tree Protocol)根桥、MAC Flood、MiTM (Man in Middle)和Rogue DHCP攻击。已经开发了第2层发现(L2D)应用程序来实时检测这些攻击,这些攻击可能导致本地网络中的主要服务中断和数据泄露。此外,开发的应用程序为支持GPT- 40的网络管理员提供了独立于品牌的安全配置。该方法的另一个模块是基于特征选择和机器学习的方法,用于检测本地网络中发生的分布式拒绝服务(DDoS)攻击。该方法利用信息增益属性(IGA)算法和光梯度增强机(LGBM)算法的默认参数对CIC-DDoS2019数据集中最有效的特征进行迭代排序。对最佳选择的特征应用中值滤波器,然后用时间序列创建新特征。使用K-NN、RF、1D-CNN、MLP和LGBM分类器的默认参数对新获得的数据集进行分类,选择准确率结果最高的分类器。在此过程中,通过10-K交叉验证确定了LGBM分类器的最佳超参数,获得了最高的结果。结果表明,该方法在13类CIC-DDoS2019数据集上的准确率达到95.98%,F1 Score值达到96%。在研究的最后一步,将数据集中由相似特征组成的类进行组合,将CIC_DDoS2019数据集缩减为12个类。将该方法应用于12类CIC_DDoS2019数据集,准确率达到99.14%,F1分数达到99%。除了对DDoS攻击的检测能力外,该研究还为实时STP根桥、MAC Flood、MiTM (Man In the Middle)和Rogue DHCP攻击的检测提供了新的研究视角。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A modular system for real-time intrusion detection on local area networks
Resistance to cyber-attacks is critical for local networks, which are responsible for the smooth operation of many processes such as data sharing, communication, data storage and application access. In this study, a modular system is proposed to detect attacks that may occur in local networks. The proposed model is designed to detect local network attacks using two different methods. The first method aims to detect Spanning Tree Protocol (STP) Root Bridge, MAC Flood, Man in the Middle (MiTM) and Rogue DHCP attacks that are common in local area networks. The Layer 2 Discovery (L2D) application has been developed to detect these attacks in real time, which can lead to major service interruptions and data breaches in local networks. In addition, the developed application offers brand-independent security configurations to network administrators with GPT- 4o support. The another module of the proposed method, a feature selection and machine learning based method is presented for the detection of Distributed Denial of Service (DDoS) attacks occurring in local networks. In the proposed method, the most effective features in the CIC-DDoS2019 dataset are iteratively ranked with the default parameters of the Information Gain Attribute (IGA) algorithm and the Light Gradient Boosting Machine (LGBM) algorithm. A median filter is applied to the best selected features, and then new features are created with time series. The newly obtained data set was classified with the default parameters of the K-NN, RF, 1D-CNN, MLP and LGBM classifiers and the classifier with the highest accuracy result was selected. As a result of the process, the best hyper-parameters of the LGBM classifier that gave the highest result were determined with 10-K cross validation. As a result, the proposed method achieved 95.98 % accuracy and 96 % F1 Score value on the 13-class CIC-DDoS2019 dataset. In the last step of the study, classes consisting of similar characteristics in the dataset were combined and the CIC_DDoS2019 dataset was reduced to 12 classes. The proposed method was applied to the 12-class CIC_DDoS2019 dataset and achieved an accuracy 99.14 % and 99 % F1 Score. In addition to the detection capability of DDoS attacks, the study brings a new perspective to intrusion detection studies with the detection of real-time STP Root Bridge, MAC Flood, Man in the Middle (MiTM) and Rogue DHCP attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信