Network Security Monitoring by Combining Semi-Supervised Learning and Active Learning

Network Security Monitoring by Combining Semi-Supervised Learning and Active Learning

Yun Pan
Copyright: © 2022 |Pages: 9
DOI: 10.4018/IJISMD.313578
Article PDF Download
Open access articles are freely available for download

Abstract

In network intrusion and network security monitoring, there is massive data. When using supervised learning method directly, it will cost lots of time to collect labeled samples, which is expensive. In order to solve this issue, this paper adopts an active learning model to detect network intrusion. First, massive unlabeled samples are used to establish a weighted support vector data description model. Then, the most valuable samples are used to improve the performance of network intrusion by combining with active learning, which utilizes labeled samples and unlabeled samples to extend the weighted support data description model in a semi-supervised learning method. The experimental results show that the active learning can utilize minor labeled sample to reduce the cost of manual labeling work, which is more suitable for an actual network intrusion detection environment.
Article Preview
Top

Network intrusion and attack detection is an important and difficult task in the community of network security. Many researchers have conducted a lot of efforts and proposed many anomaly detection methods for network intrusion detection. The methods include data mining based anomaly detection (Wang 2018), fractal time series based anomaly detection (Radivilova 2019), information fusion based anomaly detection (Zhang 2008), principal component analysis based anomaly detection (Salman 2018), wavelet analysis based anomaly detection (Lu 2009), and fractal feature parameters based anomaly detection (Ya-min 2009). These methods performs feature analysis from different aspects to establish anomaly detection model and have been well applied in practice. These methods focus on how to extract features to train anomaly detection model, which can achieve a high detection accuracy. However, it requires massive labeled samples which are difficult to collect in actual network environment.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 8 Issues (2022): 7 Released, 1 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing