期刊
IEEE ACCESS
卷 9, 期 -, 页码 63995-64015出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3075066
关键词
Network intrusion detection; Measurement; Anomaly detection; Machine learning algorithms; Feature extraction; Wireless sensor networks; Hidden Markov models; Intrusion detection; machine learning; neural networks; security
资金
- COllective Research NETworking (CORNET)
- VLAIO [HBC.2018.0491]
- CyberSecurity Research Flanders [VR20192203]
Network intrusion detection systems are essential for protecting advanced communication networks. Machine learning algorithms and two new evaluation metrics have been proposed to improve performance and reliability. A workflow for converting raw packet flows into machine learning features allows for quick comparison of algorithms across different datasets.
Network Intrusion detection systems are essential for the protection of advanced communication networks. Originally, these systems were hard-coded to identify specific signatures, patterns and rule violations; now artificial intelligence and machine learning algorithms provide promising alternatives. However, in the literature, various outdated datasets as well as a plethora of different evaluation metrics are used to prove algorithm efficacy. To enable a global comparison, this study compiles algorithms for different configurations to create common ground and proposes two new evaluation metrics. These metrics, the detection score and the identification score, together reliably present the performance of a network intrusion detection system to allow for practical comparison on a large scale. Additionally, we present a workflow to process raw packet flows into input features for machine learning. This framework quickly implements different algorithms for the various datasets and allows systematic performance comparison between those algorithms. Our experimental results, matching and surpassing the state-of-the-art, indicate the potential of this approach. As raw traffic input features are much easier and cheaper to extract when compared to traditional features, they show promise for application in real-time deep learning-based systems.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据