计算机科学
加密
入侵检测系统
图论
特征(语言学)
理论计算机科学
数据挖掘
特征提取
模式识别(心理学)
人工智能
计算机安全
数学
语言学
哲学
组合数学
作者
Ying Han,Xinlei Wang,Mingshu He,Xiaojuan Wang,Shize Guo
出处
期刊:IEEE Internet of Things Journal
[Institute of Electrical and Electronics Engineers]
日期:2024-01-30
卷期号:11 (10): 17589-17601
标识
DOI:10.1109/jiot.2024.3360039
摘要
To ensure the privacy and security of Internet of Things data, encrypted transmission of data has become a common approach. However, this has also introduced limitations for the detection of malicious network flows, often requiring reliance on only a few selected features for categorizing malicious flows. In this paper, we proposed a novel Graph Integration Theory and applied it to construct graphs based solely on packet length sequences, aiming to enhance the detection capability of single-feature-based methods, such as packet length sequences. Our proposed approach not only demonstrated its applicability in binary and multi-class classification problems but also provided a detailed analysis of the underlying reasons for its effectiveness in detecting different types of attacks and in various classification networks. Additionally, we proposed the use of the Tree-Like structure to construct Traffic Interaction Graphs and verified that the Graph Integration Theory achieved excellent classification results in both the Tree-Like and Cross-Linked list structures. Specifically, the average detection accuracy achieved in the Tree-Like structure was 0.9842, while that in the Cross-Linked list structure was 0.9836. These results significantly outperformed those obtained using either original graph structure or packet length sequences alone for detection. In the ten-class classification problem, the proposed approach achieved a detection accuracy of 0.8557, which was much higher than the accuracy of 0.6252 obtained using only packet length sequences, as well as the accuracy of 0.6634 obtained using only the original graph structure.
科研通智能强力驱动
Strongly Powered by AbleSci AI