skip to main content
10.1145/3653081.3653120acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiotaaiConference Proceedingsconference-collections
research-article

Research on Unpredetermined Behavior Recognition Techniques Based on Network Attacks

Published: 03 May 2024 Publication History

Abstract

With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based on rule-base matching, which often fails to identify the attack behaviors when faced with unpreset path attack behaviors of the actual attack process due to its reliance on predefined abnormal behavior patterns and attack labels. Therefore, this paper proposes an efficient and accurate unpreset behavior detection framework for cyber-attack behaviors, introduces machine learning techniques into the identification of unpreset attack behaviors, proposes an RF-Corr feature importance assessment method based on the Kendall correlation coefficient between features and the feature weight values, and designs an unpreset attack behavior identification method based on BiLSTM neural network, which improves the current effectiveness of identification and detection for unpresetted behavior of cyber attacks, and provides a solution for artificial intelligence detection of unpresetted behavior of cyber attacks.

References

[1]
Ghiasi M, Dehghani M, Niknam T, Cyber-attack detection and cyber-security enhancement in smart DC-microgrid based on blockchain technology and Hilbert Huang transform[J]. Ieee Access, 2021, 9: 29429-29440.
[2]
Lee J Y, Moon D S, Kim I K. Technological trends in cyber attack simulations[J]. Electronics and Telecommunications Trends, 2020, 35(1): 34-48.
[3]
Al-Mohannadi H, Mirza Q, Namanya A, Cyber-attack modeling analysis techniques: An overview[C]//2016 IEEE 4th international conference on future internet of things and cloud workshops (FiCloudW). IEEE, 2016: 69-76.
[4]
Pipyros K, Mitrou L, Gritzalis D, A cyber attack evaluation methodology[C]//Proc. of the 13th European Conference on Cyber Warfare and Security. 2014: 264-270.
[5]
Weinsberg Y, Tzur-David S, Dolev D, High performance string matching algorithm for a network intrusion prevention system (nips)[C]//2006 Workshop on High Performance Switching and Routing. IEEE, 2006: 7 pp.
[6]
Zheng K, Cai Z, Zhang X, Algorithms to speedup pattern matching for network intrusion detection systems[J]. Computer Communications, 2015, 62: Figure-58.
[7]
Liu P M, Guo X G, Wang J L, Preset-Time and-Accuracy Human-in-The-Loop Cluster Consensus Control for MASs Under Stochastic Actuation Attacks[J]. IEEE Transactions on Automatic Control, 2023.
[8]
Zhao Jing. Research on cyberspace security range technology and system architecture design[J]. Computer Knowledge and Technology,2020,16(3):51-54.
[9]
HAN Ting, LI Xin, HAN Yaoming. Research on cyberspace security range design[J]. Information Security Research,2018,4(5):430-432.
[10]
Luo X J, Oyedele L O, Ajayi A O, Feature extraction and genetic algorithm enhanced adaptive deep neural network for energy consumption prediction in buildings[J]. Renewable and Sustainable Energy Reviews, 2020, 131: 109980.
[11]
Abdi H. The Kendall rank correlation coefficient[J]. Encyclopedia of Measurement and Statistics. Sage, Thousand Oaks, CA, 2007: 508-510.
[12]
Stepanov A. On the Kendall correlation coefficient[J]. arXiv preprint arXiv:1507.01427, 2015.
[13]
Zhou H F, Zhang J W, Zhou Y Q, A feature selection algorithm of decision tree based on feature weight[J]. Expert Systems with Applications, 2021, 164: 113842.
[14]
Hashemzadeh M, Oskouei A G, Farajzadeh N. New fuzzy C-means clustering method based on feature-weight and cluster-weight learning[J]. Applied Soft Computing, 2019, 78: 324-345.
[15]
Siami-Namini S, Tavakoli N, Namin A S. The performance of LSTM and BiLSTM in forecasting time series[C]//2019 IEEE International conference on big data (Big Data). IEEE, 2019: 3285-3292.
[16]
Rhanoui M, Mikram M, Yousfi S, A CNN-BiLSTM model for document-level sentiment analysis[J]. Machine Learning and Knowledge Extraction, 2019, 1(3): 832-847
[17]
Hameed Z, Garcia-Zapirain B. Sentiment classification using a single-layered BiLSTM model[J]. Ieee Access, 2020, 8: 73992-74001.
[18]
Assiri A. Anomaly classification using genetic algorithm-based random forest model for network attack detection[J]. Computers, Materials & Continua, 2021, 66(1).
[19]
Jongsuebsuk P, Wattanapongsakorn N, Charnsripinyo C. Network intrusion detection with fuzzy genetic algorithm for unknown attacks[C]//The International Conference on Information Networking 2013 (ICOIN). IEEE, 2013: 1-5.
[20]
Liu X, Du Y. Towards Effective Feature Selection for IoT Botnet Attack Detection Using a Genetic Algorithm[J]. Electronics, 2023, 12(5): 1260.
[21]
Chakraborty S, Krishna R, Ding Y, Deep learning based vulnerability detection: Are we there yet[J]. IEEE Transactions on Software Engineering, 2021.
[22]
Kotenko I, Saenko I, Branitskiy A. Machine learning and big data processing for cybersecurity data analysis[J]. Data science in cybersecurity and cyberthreat intelligence, 2020: 61-85.
[23]
Zhang F, Kodituwakku H A D E, Hines J W, Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data[J]. IEEE Transactions on Industrial Informatics, 2019, 15(7): 4362-4369.
[24]
Ahmed M, Mahmood A N, Hu J. A survey of network anomaly detection techniques[J]. Journal of Network and Computer Applications, 2016, 60: 19-31.
[25]
Moustafa N, Hu J, Slay J. A holistic review of network anomaly detection systems: A comprehensive survey[J]. Journal of Network and Computer Applications, 2019, 128: 33-55.
[26]
Bhattacharyya D K, Kalita J K. Network anomaly detection: A machine learning perspective[M]. Crc Press, 2013.
[27]
Ali P J M, Faraj R H, Koya E, Data normalization and standardization: a technical report[J]. Mach Learn Tech Rep, 2014, 1(1): 1-6.
[28]
Rigatti S J. Random forest[J]. Journal of Insurance Medicine, 2017, 47(1): 31-39.
[29]
Sanz H, Valim C, Vegas E, SVM-RFE: selection and visualization of the most relevant features through non-linear kernels[J]. BMC bioinformatics, 2018, 19(1): 1-18.
[30]
Abdulsalam S O, Mohammed A A, Ajao J F, Performance evaluation of ANOVA and RFE algorithms for classifying microarray dataset using SVM[C]//Information Systems: 17th European, Mediterranean, and Middle Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25–26, 2020, Proceedings 17. Springer International Publishing, 2020: 480-492.
[31]
I. Guyon, J. Weston, S. Barnhill, Gene selection for cancer classification using support vector machines[J]. Machine learning, 2002, 46(1-3): 389-422
[32]
Leevy J L, Khoshgoftaar T M. A survey and analysis of intrusion detection models based on cse-cic-ids2018 big data[J]. Journal of Big Data, 2020, 7(1): 1-19.
[33]
Kanimozhi V, Jacob T P. Calibration of various optimized machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing[J]. International Journal of Engineering Applied Sciences and Technology, 2019, 4(6): 2455-2143.
[34]
Wang S, Dai Y, Shen J, Research on expansion and classification of imbalanced data based on SMOTE algorithm[J]. Scientific reports, 2021, 11(1): 24039.
[35]
Lerman R I, Yitzhaki S. A note on the calculation and interpretation of the Gini index[J]. Economics Letters, 1984, 15(3-4): 363-368.
[36]
Sperl P, Gao CY, Chen P, DLA: dense layer analysis for adversarial paradigm detection[C]//2020 IEEE European Symposium on Security and Privacy (EuroS&P).IEEE, 2020:198-215.
[37]
Park S, Kwak N. Analysis on the dropout effect in convolutional neural networks[C]//Computer Vision–ACCV 2016: 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part II 13. Springer International Publishing, 2017: 189-204.
[38]
Ćavar E, Westerström R, Mikkelsen A, A single h-BN layer on Pt (1 1 1)[J]. Surface Science, 2008, 602(9): 1722-1726.
[39]
Gao Y, Liu W, Lombardi F. Design and implementation of an approximate softmax layer for deep neural networks[C]//2020 IEEE international symposium on circuits and systems (ISCAS). IEEE, 2020: 1-5.
[40]
Shafi U, Mumtaz R, García-Nieto J, Precision agriculture techniques and practices: From considerations to applications[J]. Sensors, 2019, 19(17): 3796.
[41]
Eusebi P. Diagnostic accuracy measures[J]. Cerebrovascular Diseases, 2013, 36(4): 267-272.
[42]
Zhu M. Recall, precision and average precision[J]. Department of Statistics and Actuarial Science, University of Waterloo, Waterloo, 2004, 2(30): 6.

Index Terms

  1. Research on Unpredetermined Behavior Recognition Techniques Based on Network Attacks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IoTAAI '23: Proceedings of the 2023 5th International Conference on Internet of Things, Automation and Artificial Intelligence
    November 2023
    902 pages
    ISBN:9798400716485
    DOI:10.1145/3653081
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 May 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    IoTAAI 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 16
      Total Downloads
    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media