-
1
Personalized lightweight distributed network intrusion detection system in fog computing
Published 2023-06-01“…With the continuous development of Internet of Things (IoT) technology, there is a constant emergency of new IoT applications with low latency, high dynamics, and large bandwidth requirements.This has led to the widespread aggregation of massive devices and information at the network edge, promoting the emergence and deep development of fog computing architecture.However, with the widespread and in-depth application of fog computing architecture, the distributed network security architecture deployed to ensure its security is facing critical challenges brought by fog computing itself, such as the limitations of fog computing node computing and network communication resources, and the high dynamics of fog computing applications, which limit the edge deployment of complex network intrusion detection algorithms.To effectively solve the above problems, a personalized lightweight distributed network intrusion detection system (PLD-NIDS) was proposed based on the fog computing architecture.A large-scale complex network flow intrusion detection model was trained based on the convolutional neural network architecture, and furthermore the network traffic type distribution of each fog computing node was collected.The personalized model distillation algorithm and the weighted first-order Taylor approximation pruning algorithm were proposed to quickly compress the complex model, breaking through the limitation of traditional model compression algorithms that can only provide single compressed models for edge node deployment due to the high compression calculation overhead when facing a large number of personalized nodes.According to experimental results, the proposed PLD-NIDS architecture can achieve fast personalized compression of edge intrusion detection models.Compared with traditional model pruning algorithms, the proposed architecture achieves a good balance between computational loss and model accuracy.In terms of model accuracy, the proposed weighted first-order Taylor approximation pruning algorithm can achieve about 4% model compression ratio improvement under the same 0.2% model accuracy loss condition compared with the traditional first-order Taylor approximation pruning algorithm.…”
Get full text
Article -
2
Research on distributed network intrusion detection system for IoT based on honeyfarm
Published 2024-01-01“…To solve the problems that the network intrusion detection system in the Internet of things couldn’t identify new attacks and has limited flexibility, a network intrusion detection system based on honeyfarm was proposed, which could effectively identify abnormal traffic and have continuous learning ability.Firstly, considering the characteristics of the convolutional block attention module, an abnormal traffic detection model was developed, focusing on both channel and spatial dimensions, to enhance the model’s recognition abilities.Secondly, a model training scheme utilizing federated learning was employed to enhance the model’s generalization capabilities.Finally, the abnormal traffic detection model at the edge nodes was continuously updated and iterated based on the honeyfarm, so as to improve the system’s accuracy in recognizing new attack traffic.The experimental results demonstrate that the proposed system not only effectively detects abnormal behavior in network traffic, but also continually enhances performance in detecting abnormal traffic.…”
Get full text
Article -
3
Broadcasting Bidirectional Access Network Intrusion Detection System Facing Tri-Networks Integration
Published 2015-06-01“…In view of this situation,a network intrusion detection system for the border safety was proposed and an example product called SunGnet703 was given. …”
Get full text
Article -
4
EM-AUC: A Novel Algorithm for Evaluating Anomaly Based Network Intrusion Detection Systems
Published 2024-12-01“…To the best of our knowledge, this is the first time AUC-ROC and AUC-PR, derived without labels, have been used to evaluate network intrusion detection systems. The EM-AUC algorithm enables model training, testing, and performance evaluation to proceed without comprehensive labels, offering a cost-effective and scalable solution for selecting the most effective models for network intrusion detection.…”
Get full text
Article -
5
Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Published 2024-01-01Subjects: Get full text
Article -
6
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Published 2020-01-01“…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. …”
Get full text
Article -
7
Application of adversarial machine learning in network intrusion detection
Published 2021-11-01“…In recent years, machine learning (ML) has become the mainstream network intrusion detection system(NIDS).However, the inherent vulnerabilities of machine learning make it difficult to resist adversarial attacks, which can mislead the models by adding subtle perturbations to the input sample.Adversarial machine learning (AML) has been extensively studied in image recognition.In the field of intrusion detection, which is inherently highly antagonistic, it may directly make ML-based detectors unavailable and cause significant property damage.To deal with such threats, the latest work of applying AML technology was systematically investigated in NIDS from two perspectives: attack and defense.First, the unique constraints and challenges were revealed when applying AML technology in the NIDS field; secondly, a multi-dimensional taxonomy was proposed according to the adversarial attack stage, and current work was compared and summarized on this basis; finally, the future research directions was discussed.…”
Get full text
Article -
8
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01“…Hotelling's T2 multivariate control charts based on Principal Component Analysis mix (PCA mix) with bootstrap control limit were proposed, and applied to the network intrusion detection system. It was compared with the conventional Hotelling's T2 control chart based on PCA and the performance of the control limits obtained with the bootstrap method was compared to the ones calculated using the most commonly used kernel density estimation. …”
Get full text
Article -
9
Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks
Published 2025-02-01“…A novel ensemble of deep learning technique is proposed to enhance the efficiency of Packet Flow Classification in Network Intrusion Detection System (NIDS). The proposed work consists of three phases: (i) Feature Augmented Convolutional Neural Network (FA-CNN) (ii) Deep Autoencoder (iii) Ensemble of FA-CNN and Deep Autoencoder. …”
Get full text
Article -
10
Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement.
Published 2025-01-01“…The network intrusion detection system (NIDS) plays a critical role in maintaining network security. …”
Get full text
Article -
11
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
Published 2018-11-01“…Network intrusion detection system plays an important role in protecting network security.With the continuous development of science and technology,the current intrusion technology cannot cope with the modern complex and volatile network abnormal traffic,without taking into account the scalability,sustainability and training time of the detection technology.Aiming at these problems,a new deep learning method was proposed,which used unsupervised non-symmetric convolutional auto-encoder to learn the characteristics of the data.In addition,a new method based on the combination of non-symmetric convolutional auto-encoder and multi-class support vector machine was proposed.Experiments on the data set of KDD99 show that the method achieves good results,significantly reduces training time compared with other methods,and further improves the network intrusion detection technology.…”
Get full text
Article -
12
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Published 2024-01-01“…Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. …”
Get full text
Article -
13
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…In this paper, PCAP refers to Packet Capture, Network Intrusion Detection Systems refers to NIDS, Artificial Intelligence refers to AI, machine learning refers to ML, Computer Vision refers to CV, and Natural Language Processing refers to NLP. …”
Get full text
Article -
14
A Comparative Analysis of Support Vector Machine and K-Nearest Neighbors Models for Network Attack Traffic Detection
Published 2025-01-01“…Moreover, the research highlights future directions to strengthen the resilience and precision of network intrusion detection systems, ensuring the development of more effective defenses against the ever-evolving landscape of cybersecurity risks.…”
Get full text
Article -
15
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01“…In the digital age, the increasing demand for network security has driven research on efficient network intrusion detection systems. The effectiveness of traditional network intrusion is limited in the face of complex network attacks and constantly increasing data volume. …”
Get full text
Article -
16
Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model
Published 2024-01-01“…Network intrusion detection systems play a critical role in protecting a variety of services ranging from economic through social to commerce. …”
Get full text
Article -
17
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01“…Numerous research works were keen to project intelligent network intrusion detection systems (NIDS) to avert the exploitation of IoT data through smart applications. …”
Get full text
Article -
18
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01“…Network Intrusion Detection Systems (NIDS) are critical in ensuring the security of connected computer systems by actively detecting and preventing unauthorized activities and malicious attacks. …”
Get full text
Article