1
|
Zou C, Chen R, Wang B, Fei Q, Song H, Zang L. Development of a deep learning radiomics model combining lumbar CT, multi-sequence MRI, and clinical data to predict high-risk cage subsidence after lumbar fusion: a retrospective multicenter study. Biomed Eng Online 2025; 24:27. [PMID: 40025592 PMCID: PMC11872306 DOI: 10.1186/s12938-025-01355-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/16/2024] [Accepted: 02/18/2025] [Indexed: 03/04/2025] Open
Abstract
BACKGROUND To develop and validate a model that integrates clinical data, deep learning radiomics, and radiomic features to predict high-risk patients for cage subsidence (CS) after lumbar fusion. METHODS This study analyzed preoperative CT and MRI data from 305 patients undergoing lumbar fusion surgery from three centers. Using a deep learning model based on 3D vision transformations, the data were divided the dataset into training (n = 214), validation (n = 61), and test (n = 30) groups. Feature selection was performed using LASSO regression, followed by the development of a logistic regression model. The predictive ability of the model was assessed using various machine learning algorithms, and a combined clinical model was also established. RESULTS Ultimately, 11 traditional radiomic features, 5 deep learning radiomic features, and 1 clinical feature were selected. The combined model demonstrated strong predictive performance, with area under the curve (AUC) values of 0.941, 0.832, and 0.935 for the training, validation, and test groups, respectively. Notably, our model outperformed predictions made by two experienced surgeons. CONCLUSIONS This study developed a robust predictive model that integrates clinical features and imaging data to identify high-risk patients for CS following lumbar fusion. This model has the potential to improve clinical decision-making and reduce the need for revision surgeries, easing the burden on healthcare systems.
Collapse
Affiliation(s)
- Congying Zou
- Department of Orthopedics, Beijing Chaoyang Hospital, Capital Medical University, 5 JingYuan Road, Shijingshan District, Beijing, 100043, China
| | - Ruiyuan Chen
- Department of Orthopedics, Beijing Chaoyang Hospital, Capital Medical University, 5 JingYuan Road, Shijingshan District, Beijing, 100043, China
| | - Baodong Wang
- Department of Orthopedics, Beijing Chaoyang Hospital, Capital Medical University, 5 JingYuan Road, Shijingshan District, Beijing, 100043, China
| | - Qi Fei
- Department of Orthopedics, Beijing Friendship Hospital, Capital Medical University, No 95, Yong'an Road, Xicheng District, Beijing, 100050, China
| | - Hongxing Song
- Department of Orthopedics, Beijing Shijitan Hospital, Capital Medical University, Beijing, 100038, China
| | - Lei Zang
- Department of Orthopedic Surgery, Beijing Chao-Yang Hospital, Capital Medical University, 8 Gong Ti Nan Lu, Chaoyang District, Beijing, 100020, China.
- Department of Orthopedics, Beijing Chaoyang Hospital, Capital Medical University, 5 JingYuan Road, Shijingshan District, Beijing, 100043, China.
| |
Collapse
|
2
|
Hashmi A, Barukab OM, Hamza Osman A. A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm. PLoS One 2024; 19:e0302294. [PMID: 38781186 PMCID: PMC11115263 DOI: 10.1371/journal.pone.0302294] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/01/2023] [Accepted: 04/01/2024] [Indexed: 05/25/2024] Open
Abstract
Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. The primary goal is to create models that are highly sensitive to intrusions while minimizing false alarms, an essential aspect of effective IDS. This approach is not only practical for real-world applications but also enhances the theoretical understanding of managing class imbalance in machine learning. Our research, by addressing these significant challenges, is positioned to make substantial contributions to cybersecurity, providing valuable insights and applicable solutions in the fight against digital threats and ensuring robustness and relevance in IDS development. An intrusion detection system (IDS) checks network traffic for security, availability, and being non-shared. Despite the efforts of many researchers, contemporary IDSs still need to further improve detection accuracy, reduce false alarms, and detect new intrusions. The mean convolutional layer (MCL), feature-weighted attention (FWA) learning, a bidirectional long short-term memory (BILSTM) network, and the random forest algorithm are all parts of our unique hybrid model called MCL-FWA-BILSTM. The CNN-MCL layer for feature extraction receives data after preprocessing. After convolution, pooling, and flattening phases, feature vectors are obtained. The BI-LSTM and self-attention feature weights are used in the suggested method to mitigate the effects of class imbalance. The attention layer and the BI-LSTM features are concatenated to create mapped features before feeding them to the random forest algorithm for classification. Our methodology and model performance were validated using NSL-KDD and UNSW-NB-15, two widely available IDS datasets. The suggested model's accuracies on binary and multi-class classification tasks using the NSL-KDD dataset are 99.67% and 99.88%, respectively. The model's binary and multi-class classification accuracies on the UNSW-NB15 dataset are 99.56% and 99.45%, respectively. Further, we compared the suggested approach with other previous machine learning and deep learning models and found it to outperform them in detection rate, FPR, and F-score. For both binary and multiclass classifications, the proposed method reduces false positives while increasing the number of true positives. The model proficiently identifies diverse network intrusions on computer networks and accomplishes its intended purpose. The suggested model will be helpful in a variety of network security research fields and applications.
Collapse
Affiliation(s)
- Arshad Hashmi
- Faculty of Computing and Information Technology in Rabigh (FCITR), Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia
| | - Omar M. Barukab
- Faculty of Computing and Information Technology in Rabigh (FCITR), Department of Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia
| | - Ahmad Hamza Osman
- Faculty of Computing and Information Technology in Rabigh (FCITR), Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia
| |
Collapse
|
3
|
Al-Saleh A. A balanced communication-avoiding support vector machine decision tree method for smart intrusion detection systems. Sci Rep 2023; 13:9083. [PMID: 37277467 DOI: 10.1038/s41598-023-36304-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2022] [Accepted: 05/31/2023] [Indexed: 06/07/2023] Open
Abstract
The Internet of Things field has created many challenges for network architectures. Ensuring cyberspace security is the primary goal of intrusion detection systems (IDSs). Due to the increases in the number and types of attacks, researchers have sought to improve intrusion detection systems by efficiently protecting the data and devices connected in cyberspace. IDS performance is essentially tied to the amount of data, data dimensionality, and security features. This paper proposes a novel IDS model to improve computational complexity by providing accurate detection in less processing time than other related works. The Gini index method is used to compute the impurity of the security features and refine the selection process. A balanced communication-avoiding support vector machine decision tree method is performed to enhance intrusion detection accuracy. The evaluation is conducted using the UNSW-NB 15 dataset, which is a real dataset and is available publicly. The proposed model achieves high attack detection performance, with an accuracy of approximately 98.5%.
Collapse
Affiliation(s)
- Abdullah Al-Saleh
- Department of Information Engineering, Florence University, Florence, Italy.
- Department of Computer Engineering, College of Computer and Information Sciences, Majmaah University, Majmaah, Saudi Arabia.
| |
Collapse
|
4
|
Sun EYN, Wu HC, Huang SCH, Kuan YC. A Novel Protocol-Free Bandage-Cover Cryptographer. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:11431-11441. [PMID: 34637392 DOI: 10.1109/tcyb.2021.3117235] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
Cyber security has become an important problem nowadays as almost everyone is often linked to the Internet for business and entertainment. Conventional cryptographers fail to address timely issues regarding cyber-attacks, such as cyber identity theft. In this work, we propose a novel idea, namely, a bandage-cover cryptographer (BCC), which is completely software-defined and protocol-free. Besides, this new cryptographic approach can enable camouflages to confuse data-mining robots, which are often encountered in the cyber world nowadays. Because all of the existing cryptographers aim to protect the entire data (document and file) altogether, they cannot have camouflagibility to mislead data-mining robots. Conversely, by our proposed novel BCC, one can select arbitrary contexts or parts of the data (related to individual identify and/or private confidential information) under protection. To evaluate such a first-ever cryptographer capable of misleading data-mining robots, we define two new metrics, namely: 1) vulnerability and 2) camouflage rates. The theoretical analyses of vulnerability rate and camouflage rate for our proposed new BCC are also presented in this article to demonstrate the corresponding effectiveness.
Collapse
|
5
|
Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102675] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
6
|
Wu Z, Gao P, Cui L, Chen J. An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2022. [DOI: 10.1109/tnsm.2021.3102388] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
|
7
|
Markiewicz M, Koperwas J. Evaluation Platform for DDM Algorithms With the Usage of Non-Uniform Data Distribution Strategies. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH 2022. [DOI: 10.4018/ijitsa.290000] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
Huge amounts of data are collected in numerous independent data storage facilities around the world. However, how the data is distributed between physical locations remains unspecified. Downloading all of the data for the purpose of processing it is undesirable and sometimes even impossible. Various methods have been proposed for performing data mining tasks, but the main problem is the lack of an objective strategy for comparing them. The authors present current research on a novel evaluation platform for distributed data mining (DDM) algorithms. The proposed platform opens up a new field to evaluate algorithms in terms of the quality of the results, transfer used, and speed, but also for the use of a non-uniform data distribution among independent nodes during algorithm evaluation. This work introduces a ‘data partitioning strategy’ term referring to a specific, not necessarily uniform data distribution. A brief evaluation for three clustering algorithms is also reported, showing the usability and simplicity of identifying differences in processing with the use of the platform.
Collapse
|
8
|
Bhor HN, Kalla M. TRUST‐based
features for detecting the intruders in the Internet of Things network using deep learning. Comput Intell 2021. [DOI: 10.1111/coin.12473] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Affiliation(s)
- Harsh Namdev Bhor
- Department of IT K. J. Somaiya Institute of Engineering and Information Technology, Sion Mumbai India
| | - Mukesh Kalla
- Department of Computer Science and Engineering Sir Padampat Singhania University, Bhatewar Udaipur India
| |
Collapse
|
9
|
Gavel S, Raghuvanshi AS, Tiwari S. A novel density estimation based intrusion detection technique with Pearson's divergence for Wireless Sensor Networks. ISA TRANSACTIONS 2021; 111:180-191. [PMID: 33276967 DOI: 10.1016/j.isatra.2020.11.016] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/16/2019] [Revised: 11/09/2020] [Accepted: 11/22/2020] [Indexed: 06/12/2023]
Abstract
We present a novel technique to detect an intrusive attack that occurs in the network due to the presence of a compromised node. These intrusive attacks last for a long time in the network due to the existence of compromised nodes this also affects the sensor reading. As the time span of the attack in longer in the network, it affects the system and can cause a system failure. Hence, we propose a technique that uses the combination of multi-varying kernel density estimation with distributed computing. This combination analyzes the individual probability of the existence of data and calculates the global value of the Probability Density Function (PDFs). Pearson's divergence (PE) is applied for efficient in-network detection and estimation of intrusion at low False Positive Rate (FPRs). The approximation of PE divergence is carried out using different techniques of distributed computing. The value of PDFs is calculated for a successive period of time in order to provide efficient performance. We also propose an entropy-based method that uses a centralized computing approach. Results obtained using PE divergence and entropy-based method are compared in order to judge the robustness. Finally, the proposed algorithms are evaluated using real-world based datasets, and the results are compared using Accuracy and FPRs.
Collapse
Affiliation(s)
- Shashank Gavel
- Department of Electronics and Telecommunication, National Institute of Technology Raipur, India.
| | - Ajay Singh Raghuvanshi
- Department of Electronics and Telecommunication, National Institute of Technology Raipur, India.
| | - Sudarshan Tiwari
- Department of Electronics and Communication, Motilal Nehru National Institute of Technology Allahabad, India.
| |
Collapse
|
10
|
A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies. ENTROPY 2021; 23:e23050529. [PMID: 33923125 PMCID: PMC8145138 DOI: 10.3390/e23050529] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/15/2021] [Revised: 04/11/2021] [Accepted: 04/20/2021] [Indexed: 12/03/2022]
Abstract
Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified.
Collapse
|
11
|
Liu C, Lore KG, Jiang Z, Sarkar S. Root-cause analysis for time-series anomalies via spatiotemporal graphical modeling in distributed complex systems. Knowl Based Syst 2021. [DOI: 10.1016/j.knosys.2020.106527] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
|
12
|
A new perspective towards the development of robust data-driven intrusion detection for industrial control systems. NUCLEAR ENGINEERING AND TECHNOLOGY 2020. [DOI: 10.1016/j.net.2020.05.012] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
13
|
Molina-Coronado B, Mori U, Mendiburu A, Miguel-Alonso J. Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2020. [DOI: 10.1109/tnsm.2020.3016246] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
|
14
|
Hosseinzadeh M, Rahmani AM, Vo B, Bidaki M, Masdari M, Zangakani M. Improving security using SVM-based anomaly detection: issues and challenges. Soft comput 2020. [DOI: 10.1007/s00500-020-05373-x] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
15
|
Du J, Vong CM. Robust Online Multilabel Learning Under Dynamic Changes in Data Distribution With Labels. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:374-385. [PMID: 31107670 DOI: 10.1109/tcyb.2018.2869476] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
Abstract
In this paper, a robust online multilabel learning method dealing with dynamically changing multilabel data streams is proposed. The proposed method has three advantages: 1) higher accuracy due to a newly defined objective function based on labels ranking; 2) fast training and update based on a newly derived closed-form (rather than gradient descent based) solution for the new objective function; and 3) high robustness to a newly identified concept drift in multilabel data streams, namely, changes in data distribution with labels (CDDL). The high robustness benefits from two novel works: 1) a new sequential update rule that preserves the labels ranking information learned from all old (but discarded) samples while updating the model only based on new incoming samples and 2) a fixed threshold for label bipartition that is insensitive to any kind of changes in data distribution including CDDL. The proposed method has been evaluated over 13 benchmark datasets from various domains. As shown in the experimental results, the proposed work is highly robust to CDDL in both the sequential model update and multilabel thresholding. Furthermore, the proposed method improves the performance in different evaluation measures, including Hamming loss, F1-measure, Precision, and Recall while taking short training time on most evaluated datasets.
Collapse
|
16
|
Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO. SENSORS 2019; 19:s19245529. [PMID: 31847361 PMCID: PMC6960526 DOI: 10.3390/s19245529] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/16/2019] [Revised: 12/09/2019] [Accepted: 12/12/2019] [Indexed: 11/17/2022]
Abstract
With the rapid development of information technology, the problem of the network security of unmanned aerial vehicles (UAVs) has become increasingly prominent. In order to solve the intrusion detection problem of massive, high-dimensional, and nonlinear data, this paper proposes an intrusion detection method based on the deep belief network (DBN) optimized by particle swarm optimization (PSO). First, a classification model based on the DBN is constructed, and the PSO algorithm is then used to optimize the number of hidden layer nodes of the DBN, to obtain the optimal DBN structure. The simulations are conducted on a benchmark intrusion dataset, and the results show that the accuracy of the DBN-PSO algorithm reaches 92.44%, which is higher than those of the support vector machine (SVM), artificial neural network (ANN), deep neural network (DNN), and Adaboost. It can be seen from comparative experiments that the optimization effect of PSO is better than those of the genetic algorithm, simulated annealing algorithm, and Bayesian optimization algorithm. The method of PSO-DBN provides an effective solution to the problem of intrusion detection of UAV networks.
Collapse
|
17
|
Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2018.06.072] [Citation(s) in RCA: 15] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
18
|
Abstract
Many classification algorithms aim to minimize just their training error count; however, it is often desirable to minimize a more general cost metric, where distinct instances have different costs. In this paper, an instance-based cost-sensitive Bayesian consistent version of exponential loss function is proposed. Using the modified loss function, the derivation of instance-based cost-sensitive extensions of AdaBoost, RealBoost and GentleBoost are developed which are termed as ICSAdaBoost, ICSRealBoost and ICSGentleBoost, respectively. In this research, a new instance-based cost generation method is proposed instead of doing this expensive process by experts. Thus, each sample takes two cost values; a class cost and a sample cost. The first cost is equally assigned to all samples of each class while the second cost is generated according to the probability of each sample within its class probability density function. Experimental results of the proposed schemes imply 12% enhancement in terms of [Formula: see text]-measure and 13% on cost-per-sample over a variety of UCI datasets, compared to the state-of-the-art methods. The significant priority of the proposed method is supported by applying the pair of [Formula: see text]-tests to the results.
Collapse
Affiliation(s)
- Ensieh Sharifnia
- CSE & IT Dept., School of Electrical and Computer Engineering, Shiraz University, Campus#2, MollaSadra St., Shiraz 71348-51154, Iran
| | - Reza Boostani
- CSE & IT Dept., School of Electrical and Computer Engineering, Shiraz University, Campus#2, MollaSadra St., Shiraz 71348-51154, Iran
| |
Collapse
|
19
|
Mikhail JW, Fossaceca JM, Iammartino R. A Semi-Boosted Nested Model With Sensitivity-Based Weighted Binarization for Multi-Domain Network Intrusion Detection. ACM T INTEL SYST TEC 2019. [DOI: 10.1145/3313778] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/20/2022]
Abstract
Effective network intrusion detection techniques are required to thwart evolving cybersecurity threats. Historically, traditional enterprise networks have been researched extensively in this regard. However, the cyber threat landscape has grown to include wireless networks. In this article, the authors present a novel model that can be trained on completely different feature sets and applied to two distinct intrusion detection applications: traditional enterprise networks and 802.11 wireless networks. This is the first method that demonstrates superior performance in both aforementioned applications. The model is based on a one-versus-all binary framework comprising multiple nested sub-ensembles. To provide good generalization ability, each sub-ensemble contains a collection of sub-learners, and only a portion of the sub-learners implement boosting. A class weight based on the sensitivity metric (true-positive rate), learned from the training data only, is assigned to the sub-ensembles of each class. The use of pruning to remove sub-learners that do not contribute to or have an adverse effect on overall system performance is investigated as well. The results demonstrate that the proposed system can achieve exceptional performance in applications to both traditional enterprise intrusion detection and 802.11 wireless intrusion detection.
Collapse
|
20
|
Mohammadi S, Amiri F. An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS 2019. [DOI: 10.1142/s1469026819500019] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
An intrusion detection system (IDS) is an immunizing system that identifies the hostile activities in a network, and alerts the network administrator in case of detecting suspicious behaviors. Signature-based systems are the most common methods for intrusion detection, but however, they are not able to detect new attacks on the network. The main problem of these systems is to keep up to date the database of already containing known attack signatures. Neural networks have a high ability to learn and are generalizable. This study present as follow: A new intrusion detection system that is a hybrid of self-organizing map algorithm (SOM), radial basis function (RBF) and perceptron networks is proposed to solve this problem. For the first time, The Imperialist Competitive Algorithm is used to calculate the parameters of the Perceptron neural network. The proposed approach uses a hybrid architecture that tries to increase the quality of warnings. Signature-based systems using this method can detect new attacks as a self-learner. The results indicated better performance of the proposed hybrid algorithm compared to earlier methods.
Collapse
Affiliation(s)
- Shahriar Mohammadi
- Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran
| | - Fatemeh Amiri
- Faculty of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran
| |
Collapse
|
21
|
Yu H, Webb GI. Adaptive online extreme learning machine by regulating forgetting factor by concept drift map. Neurocomputing 2019. [DOI: 10.1016/j.neucom.2018.11.098] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
22
|
|
23
|
Wang W, Velswamy K, Hao K, Chen L, Pedrycz W. A hierarchical memory network-based approach to uncertain streaming data. Knowl Based Syst 2019. [DOI: 10.1016/j.knosys.2018.11.011] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
|
24
|
|
25
|
Mousavinejad E, Yang F, Han QL, Vlacic L. A Novel Cyber Attack Detection Method in Networked Control Systems. IEEE TRANSACTIONS ON CYBERNETICS 2018; 48:3254-3264. [PMID: 29994687 DOI: 10.1109/tcyb.2018.2843358] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Abstract
This paper is concerned with cyber attack detection in a networked control system. A novel cyber attack detection method, which consists of two steps: 1) a prediction step and 2) a measurement update step, is developed. An estimation ellipsoid set is calculated through updating the prediction ellipsoid set with the current sensor measurement data. Based on the intersection between these two ellipsoid sets, two criteria are provided to detect cyber attacks injecting malicious signals into physical components (i.e., sensors and actuators) or into a communication network through which information among physical components is transmitted. There exists a cyber attack on sensors or a network exchanging data between sensors and controllers if there is no intersection between the prediction set and the estimation set updated at the current time instant. Actuators or network transmitting data between controllers and actuators are under a cyber attack if the prediction set has no intersection with the estimation set updated at the previous time instant. Recursive algorithms for the calculation of the two ellipsoid sets and for the attack detection on physical components and the communication network are proposed. Simulation results for two types of cyber attacks, namely a replay attack and a bias injection attack, are provided to demonstrate the effectiveness of the proposed method.
Collapse
|
26
|
Hidden Markov models with random restarts versus boosting for malware detection. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2018. [DOI: 10.1007/s11416-018-0322-1] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
|
27
|
Wang CR, Xu RF, Lee SJ, Lee CH. Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowl Based Syst 2018. [DOI: 10.1016/j.knosys.2018.02.015] [Citation(s) in RCA: 29] [Impact Index Per Article: 4.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
28
|
Aleroud A, Karabatis G. Contextual information fusion for intrusion detection: a survey and taxonomy. Knowl Inf Syst 2017. [DOI: 10.1007/s10115-017-1027-3] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
29
|
Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet. SUSTAINABILITY 2017. [DOI: 10.3390/su9020262] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
|
30
|
Security Enrichment in Intrusion Detection System Using Classifier Ensemble. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING 2017. [DOI: 10.1155/2017/1794849] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.
Collapse
|
31
|
|
32
|
Al-Jarrah OY, Alhussein O, Yoo PD, Muhaidat S, Taha K, Kim K. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection. IEEE TRANSACTIONS ON CYBERNETICS 2016; 46:1796-806. [PMID: 26540724 DOI: 10.1109/tcyb.2015.2490802] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/22/2023]
Abstract
Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.
Collapse
|
33
|
Liu CL, Hsaio WH, Lee CH, Chang TH, Kuo TH. Semi-Supervised Text Classification With Universum Learning. IEEE TRANSACTIONS ON CYBERNETICS 2016; 46:462-473. [PMID: 25730839 DOI: 10.1109/tcyb.2015.2403573] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
Abstract
Universum, a collection of nonexamples that do not belong to any class of interest, has become a new research topic in machine learning. This paper devises a semi-supervised learning with Universum algorithm based on boosting technique, and focuses on situations where only a few labeled examples are available. We also show that the training error of AdaBoost with Universum is bounded by the product of normalization factor, and the training error drops exponentially fast when each weak classifier is slightly better than random guessing. Finally, the experiments use four data sets with several combinations. Experimental results indicate that the proposed algorithm can benefit from Universum examples and outperform several alternative methods, particularly when insufficient labeled examples are available. When the number of labeled examples is insufficient to estimate the parameters of classification functions, the Universum can be used to approximate the prior distribution of the classification functions. The experimental results can be explained using the concept of Universum introduced by Vapnik, that is, Universum examples implicitly specify a prior distribution on the set of classification functions.
Collapse
|
34
|
Elsayed S, Sarker R, Essam D. Survey of Uses of Evolutionary Computation Algorithms and Swarm Intelligence for Network Intrusion Detection. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS 2015. [DOI: 10.1142/s146902681550025x] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
Many infrastructures, such as those of finance and banking, transportation, military and telecommunications, are highly dependent on the Internet. However, as the Internet’s underlying structural protocols and governance can be disturbed by intruders, for its smooth operation, it is important to minimize such disturbances. Of the available techniques for achieving this, computational intelligence methodologies, such as evolutionary algorithms and swarm intelligence approaches, are popular and have been successfully applied to detect intrusions. In this paper, we present an overview of these techniques and related literature on intrusion detection, analyze their research contributions, compare their approaches and discuss new research directions which will provide useful insights for intrusion detection researchers and practitioners.
Collapse
Affiliation(s)
- Saber Elsayed
- School of Engineering and Information Technology University of New South Wales at Canberra, Canberra, Australia
| | - Ruhul Sarker
- School of Engineering and Information Technology University of New South Wales at Canberra, Canberra, Australia
| | - Daryl Essam
- School of Engineering and Information Technology University of New South Wales at Canberra, Canberra, Australia
| |
Collapse
|