Research on Network Security Analysis and Prevention Strategies Based on Artificial Intelligence Algorithms
Author:
Liu Quansheng1, Ma Shiming1
Affiliation:
1. College of Artificial Intelligence and Software , NANNING University , Nanning , Guangxi , , China .
Abstract
Abstract
In this paper, we propose a new DDoS attack detection mechanism based on federated learning that employs dynamic thresholds to cope with the fluctuation of variable rate DDoS attacks. The performance of this detection mechanism is analyzed in terms of traffic classification, performance of verification module, accuracy and loss value. Experimental results show that the method has an accuracy of 99.83% in detecting regular Benign traffic. In burst attack scenarios, the technique significantly improves detection accuracy for all 10 common DDoS attack types. In a sustained attack environment, the intrusion detection system trained based on the DDoS model has the most minor performance degradation, and the average detection accuracy for all types of DDoS attacks still exceeds 90%. Compared with the traditional SVM model, the DDoS attack detection model based on federated learning has a significant performance advantage with Loss and Acc parameters of 0.1 and 0.9, respectively.
Publisher
Walter de Gruyter GmbH
Reference20 articles.
1. Li, Y., Hua, N., Li, J., Zhong, Z., & Zheng, X. (2019). Optical spectrum feature analysis and recognition for optical network security with machine learning. Optics Express, 27(17), 24808. 2. Hartzell, S., Stubel, C., & Bonaci, T. (2020). Security analysis of an automobile controller area network bus. IEEE Potentials, 39(3), 19-24. 3. Huang, J., Huang, W., Meng, Z., Miao, F., & Xiong, Y. (2020). Static analysis of superfluous network transmissions in android applications. International Journal of Network Security, 22(3), 411-420. 4. Xiao, B., Lan, Y., Zhao, H., Wu, X., & Liu, W. (2022). An ism-based analysis method on the influencing factors of network security situation (nss). Journal of Interconnection Networks. 5. Sureshkumar, T., Lingaraj, M., Anand, B., & Premkumar, T. (2018). Non‐dominated sorting particle swarm optimization (nspso) and network security policy enforcement for policy space analysis. International Journal of Communication Systems, 31(10), e3554.1-e3554.15.
|
|