Data mining based network intrusion detection method in the environment of IoT

IF 0.5 Q4 TELECOMMUNICATIONS Internet Technology Letters Pub Date : 2023-05-14 DOI:10.1002/itl2.440
Guihua Wu, Lijing Xie
{"title":"Data mining based network intrusion detection method in the environment of IoT","authors":"Guihua Wu,&nbsp;Lijing Xie","doi":"10.1002/itl2.440","DOIUrl":null,"url":null,"abstract":"<p>With the rapid development of Internet of Things (IoT) and Internet technology, the network is becoming more and more important and strict. The IoT networks that access to a large number of devices make network intrusion more convenient. However, because the traditional network intrusion detection methods have the problems of low detection rate and high false alarm rate, this paper proposes a network intrusion detection method based on data mining. Firstly, a pre-processing model is established to process the initial data. Then, according to the characteristics of network behavior, a new feature subset selection process is designed. Based on the above data mining and analysis process, a dynamic detection generation rule matching with data mining is set to detect abnormal network intrusion traffic. Then, the network intrusion detection based on data mining is completed. The experimental results show that, compared with other methods, the network intrusion detection method based on data mining has higher network intrusion detection rate and lower false alarm rate, which is helpful to improve the detection accuracy.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2023-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet Technology Letters","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/itl2.440","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

With the rapid development of Internet of Things (IoT) and Internet technology, the network is becoming more and more important and strict. The IoT networks that access to a large number of devices make network intrusion more convenient. However, because the traditional network intrusion detection methods have the problems of low detection rate and high false alarm rate, this paper proposes a network intrusion detection method based on data mining. Firstly, a pre-processing model is established to process the initial data. Then, according to the characteristics of network behavior, a new feature subset selection process is designed. Based on the above data mining and analysis process, a dynamic detection generation rule matching with data mining is set to detect abnormal network intrusion traffic. Then, the network intrusion detection based on data mining is completed. The experimental results show that, compared with other methods, the network intrusion detection method based on data mining has higher network intrusion detection rate and lower false alarm rate, which is helpful to improve the detection accuracy.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网环境下基于数据挖掘的网络入侵检测方法
随着物联网(IoT)和互联网技术的快速发展,网络变得越来越重要和严格。接入大量设备的物联网网络为网络入侵提供了便利。然而,由于传统的网络入侵检测方法存在检测率低、虚警率高的问题,本文提出了一种基于数据挖掘的网络入侵检测方法。首先,建立预处理模型对初始数据进行处理。然后,根据网络行为的特点,设计了一种新的特征子集选择过程。在上述数据挖掘分析过程的基础上,设置与数据挖掘相匹配的动态检测生成规则,检测异常网络入侵流量。然后,完成了基于数据挖掘的网络入侵检测。实验结果表明,与其他方法相比,基于数据挖掘的网络入侵检测方法具有更高的网络入侵检测率和更低的虚警率,有助于提高检测精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
3.10
自引率
0.00%
发文量
0
期刊最新文献
IIoT-Oriented Recursive Filtering for Networked Time-Varying Systems With Stochastic Nonlinearity Under Relay-Assisted Channels A Real-Time English Knowledge Recommendation Framework Integrating ITL Networks and TinyML LLF: A Lightweight Learning Framework for Resource-Efficient Sports Pattern Recognition in Mobile Edge IoT Performance Evaluation of Privacy Models for Data Streams on the Edge Wearable-Assisted Localization in Wireless Networks: A Hybrid Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1