...
首页> 外文期刊>International journal of machine learning and cybernetics >A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
【24h】

A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks

机译:用于5G和IOT网络的基于多核聚类的入侵检测方案

获取原文
获取原文并翻译 | 示例

摘要

The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise network face greater security threats. To protect the security of core business, the network infrastructure must be able to recognize not only the known abnormal traffic, but also new emerging threats. Intrusion Detection Systems (IDSs) are widely used to protect the core network against external intrusions. Most of the existing research works design anomaly detection models for a specific set of traffic attributes. In fact, it is difficult for us to find the specific correspondence between traffic attributes and attack behaviors. Worse, some traffic attributes will be missing in the IoT environment, which further increases the difficulty of anomaly analysis. In traditional solutions, the missing attributes are usually filled with zero or mean values. Sometimes, the attributes are directly discarded. Both of these methods may result in lower detection accuracy. To solve this problem, we propose an intrusion detection method based on multiple-kernel clustering (MKC) algorithms. Be different from zero value filling and mean value filling, the proposed method completes the absent traffic property through similarity calculation. Experimental results show that this method can effectively improve the clustering accuracy of incomplete sampled data, at the same time it can reduce the sensitivity of the anomaly detection model to the selection of traffic feature, and has a better tolerance for poor-quality traffic sampled data.
机译:5G网络为边缘IOT设备提供更高的带宽和降低延迟,以访问核心业务网络。但与此同时,它还扩展了核心网络的攻击面,这使得企业网络面临更大的安全威胁。为了保护核心业务的安全性,网络基础设施不得能够识别已知的异常流量,也能够识别出新的新兴威胁。入侵检测系统(IDS)广泛用于保护核心网络免受外部入侵。大多数现有的研究工作设计了一组特定流量属性的异常检测模型。实际上,我们很难找到交通属性和攻击行为之间的具体对应关系。更糟糕的是,物联网环境中将缺少一些流量属性,这进一步提高了异常分析的难度。在传统的解决方案中,丢失的属性通常填充零或平均值。有时,属性直接丢弃。这两种方法都可能导致较低的检测精度。为了解决这个问题,我们提出了一种基于多内核聚类(MKC)算法的入侵检测方法。与零值填充和平均值填充不同,所提出的方法通过相似性计算完成缺陷的流量属性。实验结果表明,该方法可以有效提高不完全采样数据的聚类精度,同时它可以降低异常检测模型对交通功能的灵敏度,并且对劣质的交通采样数据具有更好的耐受性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号