داده های عظیم برای تشخیص نفوذ در شبکه های کامپیوتری
ترجمه نشده

داده های عظیم برای تشخیص نفوذ در شبکه های کامپیوتری

عنوان فارسی مقاله: چکیده گیری از داده های عظیم برای تشخیص نفوذ خفیف در شبکه های کامپیوتری
عنوان انگلیسی مقاله: Abstracting massive data for lightweight intrusion detection in computernetworks
مجله/کنفرانس: علوم اطلاعاتی – Information Sciences
رشته های تحصیلی مرتبط: فناوری اطلاعات، مهندسی کامپیوتر
گرایش های تحصیلی مرتبط: شبکه های کامپیوتری، مدیریت سیستم های اطلاعات، امنیت اطلاعات
کلمات کلیدی فارسی: کاهش داده، تشخیص نفوذ، تشخیص آنومالی، امنیت کامپیوتر
کلمات کلیدی انگلیسی: Data reduction, intrusion detection, anomaly detection, computer security
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.ins.2016.10.023
دانشگاه: School of Computer and Information Technology – Beijing Jiaotong University No.3 Shangyuancun – China
صفحات مقاله انگلیسی: 16
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2018
ایمپکت فاکتور: 6.774 در سال 2018
شاخص H_index: 154 در سال 2019
شاخص SJR: 1.620 در سال 2018
شناسه ISSN: 0020-0255
شاخص Quartile (چارک): Q1 در سال 2018
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: بله
کد محصول: E10100
فهرست مطالب (انگلیسی)

Abstract

1- Introduction

2- Related work

3- Abstracting big audit data for intrusion detection

4- Experiments

5- Comparative results

6- Concluding remarks

Acknowledgments

References

بخشی از مقاله (انگلیسی)

Abstract

Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional k-means, are employed to find the exemplars from the audit data. K-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD’99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

Introduction

The importance of computer network security is growing with the pervasive involvement of computers in people’s daily lives and in business processes within most organizations. As an important technique in the defense-indepth network security framework, intrusion detection has become a widely studied topic in computer networks in recent years. In general, the techniques for intrusion detection can be categorized as signature-based detection and anomaly detection. Signature-based detection (e.g., Snort [31]) relies on a database of signatures from known malicious threats. Anomaly detection, on the other hand, defines a profile of a subject’s normal activities and attempts to identify any unacceptable deviation as a potential attack. Typically, machine learning techniques are used to build normal profiles of a subject. Any observable behavior of a system, such as a network’s traffic [13,19], a computer host’s operating system [11,36] or a mobile application [2,39], can be used as the subject information.