XOR-Based Detector of Different Decisions on Anomalies in the Computer Network Traffic

Author:

PROTIC Danijela, ,STANKOVIC Miomir,

Abstract

Anomaly-based intrusion detection systems are designed to scan computer network traffic for abnormal behavior. Binary classifiers based on supervised machine learning have proven to be highly accurate tools for classifying instances as normal or abnormal. Main disadvantages of supervised machine learning are the long processing time and large amount of training data required to ensure accurate results. Two preprocessing steps to reduce data sets are feature selection and feature scaling. In this article, we present a new hyperbolic tangent feature scaling approach based on the linearization of the tangent hyperbolic function and the damping strategy of the Levenberg-Marquardt algorithm. Experiments performed on the Kyoto 2006+ dataset used four high-precision binary classifiers: weighted k-nearest neighbors, decision tree, feedforward neural networks, and support vector machine. It is shown that hyperbolic tangent scaling reduces processing time by more than twofold. An XOR-based detector is proposed to determine conflicting decisions about anomalies. The decisions of the FNN and wk-NN models are compared. It is shown that decisions sometimes turn out differently. The percentage of the opposite decisions has been shown to vary and is not affected by dataset size.

Publisher

Editura Academiei Romane

Subject

General Computer Science

Reference50 articles.

1. "[1] F. ALIYU, T. SHELTAMI, M. DERICHE and N. NASSER., Human immune-based intrusion detection and prevention system for fog computing, J. Netw Syst Manage 30, p. 11, 2020.

2. [2] S. SCHALLER, J. WEINBERGER, R. JIMENEZ-HERENDIA, M. DANZER and S.-M. WINKLER, Classification of the states of human adaptive immune systems by analyzing immunoglobin and T cell receptors using ImmunExplorer, Computer Aided Systems Theory - EUROCAST 2015, R. Moreno-Diaz, F. Pichler and A. Quesada-Arencibia, Eds. 15th International Conference, Las Palmas de Gran Canaria, Spain, February 8-13, 2015, Revised Selected Papers, Lecture Notes in Computer Science, Springer International Publishing Switzerland, pp. 302-309, 2015.

3. [3] M.-R. MARINESCU, M. AVRAM, C. VOITINCU, M. SAVIN, C. MIHAILESCU and L.-D. GHICULESCU, Electrotechnical sensors with interdigitated electrodes counting T-cells, Romanian Journal of Information Science and Technology 23(4), pp. 368-378, 2020.

4. [4] S. OMAR, A. NAGADI and H.-H. JEBUR, Machine learning techniques for anomaly detection: An overview, International Journal of Computer Applications 79(2), pp. 33-41, 2013.

5. [5] A. HALIMAA and K. SUNDARKANTHAM, Machine learning based intrusion detection system, Proceedings of 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 916-920, 2019.

Cited by 9 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3