Affiliation:
1. 1 Book and Information Center , Anhui University of Finance and Economics , Bengbu , Anhui , , China .
Abstract
Abstract
To protect network security, this paper develops a large-scale network anomalous traffic identification algorithm that utilizes the linear discriminant analysis method to intercept network anomalous traffic. Firstly, the classification of large-scale network anomalous traffic is explored, and the SSAE algorithm is combined with the feature selection of large-scale network traffic on the basis of network flow feature extraction. Secondly, data dimensionality reduction of network anomalous traffic using linear discriminant analysis and feature selection of large-scale network traffic based on SSAE to identify network anomalous traffic. Finally, the CICIDS2017 dataset and the NSL-KDD dataset are used to experimentally analyze the effect and performance of feature selection and anomaly identification algorithms. The results show that the classification accuracy of the feature selection algorithm is 0.989, the 10-dimensional optimal features selected are (12,6,5,38,29,3,33,35,36,40), and the recognition result is 0.803 for normal network traffic and 0.197 for anomalous traffic, with an overall recognition error of 0.003, and a performance of more than 0.988.
Subject
Applied Mathematics,Engineering (miscellaneous),Modeling and Simulation,General Computer Science
Reference18 articles.
1. Stergiou, C., & Psannis, K. E. (2017). Recent advances delivered by mobile cloud computing and internet of things for big data applications: a survey. International Journal of Network Management, 27(3), 1-12.
2. Choi, M., Glassman, M., & Cristol, D. (2017). What it means to be a citizen in the internet age: development of a reliable and valid digital citizenship scale. Computers & Education, 107(APR.), 100-112.
3. Divakaran, D. M., Fok, K. W., Nevat, I., & Thing, V. L. L. (2017). Evidence gathering for network security and forensics. Digital Investigation, 20S(MAR.), S56-S65.
4. Jiang, C. (2022). Network security and ideological security based on wireless communication and big data analysis. Wireless Communications and Mobile Computing, 2022(3), 1-6.
5. Vajjha, H. V. V., & Sushma, P. (2021). Techniques and limitations in securing the log files to enhance network security and monitoring. Solid State Technology, 64(2), 1-8.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献