Abstract
Intrusion detection is one of the important means to ensure network security, aiming at the problem that the current network intrusion detection model cannot obtain the ideal network intrusion detection effect, a large-scale network intrusion detection model based on FS feature selection is designed. This study takes the NSL-KDD dataset as an example, and performs numerical and normalization processing on it. The main features are selected using the grey wolf optimization algorithm fused with cuckoo search. Taking the feature as input, the C4.5 algorithm is used to realize network intrusion detection. The results show that under the application of the constructed model, the accuracy rate (A), detection rate (D), and precision rate (P) are all greater than 90%, and the F1 score is greater than 1, indicating that the model has a good performance in network intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dong, R.H., Yan, H.H., Zhang, Q.Y.: An intrusion detection model for wireless sensor network based on information gain ratio and bagging algorithm. Int. J. Network Secur. 22(2), 218–230 (2020)
Zhou, J., He, P., Qiu, R., Chen, G., Wu, W.: Research on intrusion detection based on random forest and gradient lifting tree. J. Software 32(10), 3254–3265 (2021)
Song, W., Beshley, M., Przystupa, K., et al.: A software deep packet inspection system for network traffic analysis and anomaly detection. Sensors 20(6), 1637 (2020)
Asad, H., Gashi, I.: Dynamical analysis of diversity in rule-based open source network intrusion detection systems. Empir. Softw. Eng. 27(1), 1–30 (2022)
Dong, R.H., Li, X.Y., Zhang, Q.Y., et al.: Network intrusion detection model based on multivariate correlation analysis – long short-time memory network. IET Inf. Secur. 14(2), 166–174 (2020)
Liu, S., Liu, D., Muhammad, K., Ding, W.: Effective template update mechanism in visual tracking with background clutter. Neurocomputing 458, 615–625 (2021)
Zhang, Z., Ding, J., Song, Z.: Worm virus propagation model in a predator-prey time-delay wireless sensor network. Control Eng. 28(12), 2343–2350 (2021)
Lijian, Z., Jinpeng, C.: Optimization and detection simulation of anomaly detection algorithm based on extended Jarvis Patrick clustering. Electron. Des. Eng. 30(13), 100–104 (2022)
Wang, Z., He, Y., Li, H., Zhang, F.: Binary particle swarm optimization algorithm based on novel S-type transformation function for solving knapsack problem with single continuous variable. Comput. Appl. 41(2), 461–469 (2021)
Daihua, Z., Yong, S., Xiangfei, Z., Bing, W.: Simulation of network intrusion data autonomous defense based on data mining. Comput. Simul. 37(10), 263–267 (2020)
Aknowledgement
1. General project of Jilin Provincial Department of Education: Detection Model of Network Intrusion Based on FS Feature Selection and Extreme Learning Machine (jjkh20210615kj).
2. General project of Jilin Provincial Department of Education: Building Intelligent Data Analysis Platforms to Help the Operation and Management of Insurance Enterprises (jjkh20220598kj).
3. General project of Jilin Provincial Department of Education: Research on Robot Bending Personalized Orthodontic Arch Wire Forming (jjkh20200561kj).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hong, M., Zou, Y., Ai, C. (2023). Large Scale Network Intrusion Detection Model Based on FS Feature Selection. In: Xu, Y., Yan, H., Teng, H., Cai, J., Li, J. (eds) Machine Learning for Cyber Security. ML4CS 2022. Lecture Notes in Computer Science, vol 13655. Springer, Cham. https://doi.org/10.1007/978-3-031-20096-0_29
Download citation
DOI: https://doi.org/10.1007/978-3-031-20096-0_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20095-3
Online ISBN: 978-3-031-20096-0
eBook Packages: Computer ScienceComputer Science (R0)