首页> 外文期刊>Cybernetics, IEEE Transactions on >Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection
【24h】

Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

机译:僵尸网络入侵检测的数据随机化和基于聚类的划分

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet’s payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network’s traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.
机译:僵尸网络由称为bot的受远程控制的受感染机器组成,它提供了一个分布式平台,可应对网络世界实体和企业的多种威胁。入侵检测系统(IDS)提供了针对僵尸网络的有效对策。它会持续监视和分析网络流量,以发现潜在的漏洞以及可能存在的主动攻击。基于有效负载检查的IDS(PI-IDS)通过检查传输控制协议和用户数据报协议数据包的有效负载并将其与以前看到的攻击签名进行比较,来识别活动的入侵尝试。但是,PI-IDS检测入侵的功能可能会因数据包加密而失效。基于流量的IDS(T-IDS)减轻了PI-IDS的缺点,因为它不检查数据包有效负载;但是,它分析数据包头以识别入侵。随着网络流量的快速增长,不仅检测率至关重要,而且IDS的效率和可扩展性也变得越来越重要。在本文中,我们提出了一种基于新型随机数据分区学习模型(RDPLM)的最新T-IDS,该模型依赖于紧凑的网络特征集和特征选择技术,简化的子步距和多重随机元学习技巧。该模型在著名的基准僵尸网络数据集上已达到99.984%的准确性和21.38 s的训练时间。实验结果表明,该方法优于同一检测任务中使用的其他知名机器学习模型,即顺序最小优化,深度神经网络,C4.5,减少错误的修剪树和randomTree。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号