scholarly journals Intrusion Detection Based on Gray-Level Co-Occurrence Matrix and 2D Dispersion Entropy

2021 ◽  
Vol 11 (12) ◽  
pp. 5567
Author(s):  
Gianmarco Baldini ◽  
Jose Luis Hernandez Ramos ◽  
Irene Amerini

The Intrusion Detection System (IDS) is an important tool to mitigate cybersecurity threats in an Information and Communication Technology (ICT) infrastructure. The function of the IDS is to detect an intrusion to an ICT system or network so that adequate countermeasures can be adopted. Desirable features of IDS are computing efficiency and high intrusion detection accuracy. This paper proposes a new anomaly detection algorithm for IDS, where a machine learning algorithm is applied to detect deviations from legitimate traffic, which may indicate an intrusion. To improve computing efficiency, a sliding window approach is applied where the analysis is applied on large sequences of network flows statistics. This paper proposes a novel approach based on the transformation of the network flows statistics to gray images on which Gray level Co-occurrence Matrix (GLCM) are applied together with an entropy measure recently proposed in literature: the 2D Dispersion Entropy. This approach is applied to the recently public IDS data set CIC-IDS2017. The results show that the proposed approach is competitive in comparison to other approaches proposed in literature on the same data set. The approach is applied to two attacks of the CIC-IDS2017 data set: DDoS and Port Scan achieving respectively an Error Rate of 0.0016 and 0.0048.

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1081
Author(s):  
Tamon Miyake ◽  
Shintaro Yamamoto ◽  
Satoshi Hosono ◽  
Satoshi Funabashi ◽  
Zhengxue Cheng ◽  
...  

Gait phase detection, which detects foot-contact and foot-off states during walking, is important for various applications, such as synchronous robotic assistance and health monitoring. Gait phase detection systems have been proposed with various wearable devices, sensing inertial, electromyography, or force myography information. In this paper, we present a novel gait phase detection system with static standing-based calibration using muscle deformation information. The gait phase detection algorithm can be calibrated within a short time using muscle deformation data by standing in several postures; it is not necessary to collect data while walking for calibration. A logistic regression algorithm is used as the machine learning algorithm, and the probability output is adjusted based on the angular velocity of the sensor. An experiment is performed with 10 subjects, and the detection accuracy of foot-contact and foot-off states is evaluated using video data for each subject. The median accuracy is approximately 90% during walking based on calibration for 60 s, which shows the feasibility of the static standing-based calibration method using muscle deformation information for foot-contact and foot-off state detection.


2019 ◽  
Vol 16 (6) ◽  
pp. 172988141989211
Author(s):  
Wanhui Yang ◽  
Hengyu Li ◽  
Jingyi Liu ◽  
Shaorong Xie ◽  
Jun Luo

This article presents a sea-sky-line detection algorithm in a sea-sky environment for unmanned surface vehicles. Obstacle detection is a vital branch for unmanned surface vehicles on the ocean. Because of the specificity and complexity of the marine navigation environment, we first apply semantic segmentation for marine images. The complete marine scene is divided into sky area, middle mixture area, and seawater area before sea-sky-line detection. Segmenting the marine environment is beneficial for narrowing the obstacle search area, accelerating the rate of obstacle detection, and improving detection accuracy. Therefore, a fast, robust, and accurate sea-sky image segmentation method is urgently required. Therefore, we present a method that lies in a probabilistic graphical model for segmenting marine images. The Gaussian mixture model is introduced as the probability distribution model for the marine image. The sky, middle mixture, and seawater areas are generated by three Gaussian models. The expectation–maximization algorithm is utilized to maximize the log-likelihood function, and the parameters of the Gaussian mixture probability density function that recover the marine image distribution are available after several iterations. Furthermore, to solve the problem of incorrect convergence direction caused by unsatisfactory initialization conditions, the gray level co-occurrence matrix is referenced to initialize the Gaussian components. The coarse segmentation results rely on the gray level co-occurrence matrix and are used to calculate the prior initialization parameters of Gaussian components and obtain the prior distribution information of marine images, which mitigates the harmful influence of poor initialization. The algorithm is tested on a data set consisting of the marine obstacle detection dataset (MODD) public data set and our collected images. The results on this data set demonstrate that the proposed method is more robust and that a superior initialization condition can effectively accelerate the convergence velocity of the iterative process for Gaussian components.


2021 ◽  
pp. 1-12
Author(s):  
Qian Wang ◽  
Wenfang Zhao ◽  
Jiadong Ren

Intrusion Detection System (IDS) can reduce the losses caused by intrusion behaviors and protect users’ information security. The effectiveness of IDS depends on the performance of the algorithm used in identifying intrusions. And traditional machine learning algorithms are limited to deal with the intrusion data with the characteristics of high-dimensionality, nonlinearity and imbalance. Therefore, this paper proposes an Intrusion Detection algorithm based on Image Enhanced Convolutional Neural Network (ID-IE-CNN). Firstly, based on the image processing technology of deep learning, oversampling method is used to increase the amount of original data to achieve data balance. Secondly, the one-dimensional data is converted into two-dimensional image data, the convolutional layer and the pooling layer are used to extract the main features of the image to reduce the data dimensionality. Third, the Tanh function is introduced as an activation function to fit nonlinear data, a fully connected layer is used to integrate local information, and the generalization ability of the prediction model is improved by the Dropout method. Finally, the Softmax classifier is used to predict the behavior of intrusion detection. This paper uses the KDDCup99 data set and compares with other competitive algorithms. Both in the performance of binary classification and multi-classification, ID-IE-CNN is better than the compared algorithms, which verifies its superiority.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Jiarui Man ◽  
Guozi Sun

Neural networks have been proved to perform well in network intrusion detection. In order to acquire better features of network traffic, more learning layers are necessarily required. However, according to the results of the previous research, adding layers to the neural networks might fail to improve the classification results. In fact, after the number of layers has reached a certain threshold, performance of the model tends to degrade. In this paper, we propose a network intrusion detection model based on residual learning. After transforming the UNSW-NB15 data set into images, deeper convolutional neural networks with residual blocks are built to learn more critical features. Instead of the cross-entropy loss function, the modified focal loss is calculated to address the class imbalance problem in the training set and identify minor attacks in the testing set. Batch normalization and global average pooling are used to avoid overfitting and enhance the model. Experimental results show that the proposed model can improve attack detection accuracy compared with existing models.


Intrusion Detection System observes the network traffic and identifies the attack and also inform the admin to corrective action. Powerful Intrusion Detection system is required for detection to various modern attack. There is need of efficient Intrusion Detection system .The focus of IDS research is the application of machine Learning and Deep Learning techniques. Projected work is combination of Deep Learning Technique in which Non Symmetric Deep Auto Encoder and Machine Learning Algorithm, Support Vector Machine Classifier is used to develop the Model. Stack power of the Non symmetric Deep Auto Encoder and Quickness with exactness of the SVM makes the Model very efficient. This Model not only improves the accuracy value but also improve recall and precision. It also cause the reduction of training time .To evaluate the performance of the Model and do the analysis the special Data set which are used are KDD CUP and NSL KDD Dataset.


Author(s):  
Musaab Riyadh ◽  
Dina Riadh Alshibani

Recently, the data flow over the internet has exponentially increased due to the massive growth of computer networks connected to it. Some of these data can be classified as a malicious activity which cannot be captured by firewalls and anti-malwares. Due to this, the intrusion detection systems are urgent need in order to recognize malicious activity to keep data integrity and availability. In this study, an intrusion detection system based on cluster feature concepts and KNN classifier has been suggested to handle the various challenges issues in data such as in complete data, mixed-type and noise data. To streng then the proposed system a special kind of patterns similarity measures are supported to deal with these types of challenges. The experimental results show that the classification accuracy of the suggested system is better than K-nearest neighbor (KNN) and support vector machine classifiers when processing incomplete data set, inspite of droping down the overall detection accuracy.


2021 ◽  
Vol 2091 (1) ◽  
pp. 012001
Author(s):  
C Callegari ◽  
S Giordano ◽  
M Pagano

Abstract Thanks to its ability to face unknown attacks, Anomaly-based Intrusion Detection is a key research topic in network security and different statistical methods, fed by suitable traffic features, have been proposed in the literature. The choice of a proper dataset is a critical element not only for performance comparison, but also for the correct identification of the normal traffic behaviour. In this paper we address the general problem of selecting traffic features from recent real traffic traces (MAWI data set) and verify how the real-time constraint impacts on the general performance. Although a state-of-the-art IDS (Intrusion Detection System) based on deep neural networks is considered, our conclusions can be extended to any anomaly detection algorithm and advocate for a fair comparison of IDSs using representative datasets and traffic features that can be extracted on-line (and do not depend on the entire dataset).


2014 ◽  
Vol 599-601 ◽  
pp. 726-730 ◽  
Author(s):  
Gang Ke ◽  
Ying Han Hong

The traditional BP neural network algorithm is applied to intrusion detection system, detection speed slow and low detection accuracy. In order to solve the above problems, this paper proposes a network intrusion detection algorithm using genetic algorithms to optimize neural network weights. which find the most suitable weights of BP neural network by the genetic algorithm, and uses the optimized BP neural network to learn and detect the network intrusion detection data. Matlab simulation results show that the training sample time of the algorithm is shorter, has good intrusion recognition and detection effect, compared with the traditional network intrusion detection algorithm.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Zengri Zeng ◽  
Wei Peng ◽  
Baokang Zhao

In recent years, machine learning (ML) algorithms have been approved effective in the intrusion detection. However, as the ML algorithms are mainly applied to evaluate the anomaly of the network, the detection accuracy for cyberattacks with multiple types cannot be fully guaranteed. The existing algorithms for network intrusion detection based on ML or feature selection are on the basis of spurious correlation between features and cyberattacks, causing several wrong classifications. In order to tackle the abovementioned problems, this research aimed to establish a novel network intrusion detection system (NIDS) based on causal ML. The proposed system started with the identification of noisy features by causal intervention, while only the features that had a causality with cyberattacks were preserved. Then, the ML algorithm was used to make a preliminary classification to select the most relevant types of cyberattacks. As a result, the unique labeled cyberattack could be detected by the counterfactual detection algorithm. In addition to a relatively stable accuracy, the complexity of cyberattack detection could also be effectively reduced, with a maximum reduction to 94% on the size of training features. Moreover, in case of the availability of several types of cyberattacks, the detection accuracy was significantly improved compared with the previous ML algorithms.


2011 ◽  
Vol 267 ◽  
pp. 720-725
Author(s):  
Ke Chen ◽  
Wen De Ke

This paper put forward intrusion detection algorithm based on improved fuzzy C means (FCM) algorithm and execute the anomaly detection on KDDCUP data set, build intrusion detection system based improved algorithm and analyze the feasibility of the system. Through the fuzzy C means value's improvement algorithm, solve the fuzzy C means value algorithm problem that the algorithm sensitive to selection of the initial values and easily to fall in the local best solution. Thereby under the condition guarantee integrality and consistency of data attribute values, get rid of blindness of selecting initial value and reduce clustering time and algorithm complexity, enhance speed of the algorithm.


Sign in / Sign up

Export Citation Format

Share Document