Affiliation:
1. Information Center, Yunnan Power Grid Co. Ltd., Kunming, Yunnan 650034, China
2. Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China
Abstract
With the increasing development of the industrial Internet, network security has attracted more and more attention. Among the numerous network security technologies, anomaly detection technology based on network traffic has become an important research field. At present, a large number of methods for network anomaly detection have been proposed. Most of the better performance detection methods are based on supervised machine learning algorithms, which require a large number of labelled data for model training. However, in a real network, it is impossible to manually filter and label large-scale traffic data. Network administrators can only use unsupervised machine learning algorithms for actual detection, and the detection effects are much worse than supervised learning algorithms. To improve the accuracy of the unsupervised detection methods, this study proposes a network anomaly detection model based on multiple classifier fusion technology, which applies different fusion techniques (such as Majority Vote, Weighted Majority Vote, and Naive Bayes) to fuse the detection results of the five best performing unsupervised anomaly detection algorithms. Comparative experiments are carried out on three public datasets. Experimental results show that, in terms of RECALL and AUC score, the fusion model proposed in this study achieves better performance than the five separate anomaly detection baseline algorithms, and it has better robustness and stability, which can be effectively applied to a wide range of network anomaly detection scenarios.
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Computer Science Applications
Reference32 articles.
1. Haystack: an intrusion detection system;S. E. Smaha
2. Practical automated detection of stealthy portscans
3. HeckermanD.A Tutorial on Learning with Bayesian Networks1995Bengalaru, IndiaMicrosoft ResearchTechnical Report MSRTR-95-06
4. Adaptive model-based monitoring for cyber attack detection;K. S. Valdes
5. Bayesian event classification for intrusion detection;D. M. Kruegel
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Assessing Intrusion Detection Process Using ML Techniques: Issues, Options, and Potential Future Directions;2023 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT);2023-09-08