[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3335484.3335486acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdcConference Proceedingsconference-collections
research-article

Network Security Situation Factor Extraction Based on Random Forest of Information Gain

Published: 10 May 2019 Publication History

Abstract

Aiming at the problem of situational element extraction, a method based on random forest of information gain for network security situation factor extraction is proposed. First, the importance of the attribute is determined by the information gain. After the threshold is set, the attribute is reduced and the redundant attribute is deleted. Secondly, the processed data is classified using the random forest classifier. Finally, in order to verify the efficiency of the algorithm, the improved method is tested by the intrusion detection data set. Compared with the traditional method, the experimental results show that the algorithm effectively improves the accuracy and achieves efficient extraction of network security situation elements.

References

[1]
Gong J, Zang XD, Su Q, Hu XY, Xu J. Survey of Network Security Situation Awareness{J}. Journal of Software, 2017, 28(4): 1010--1026(in Chinese).DOI=http://www.jos.org.cn/1000-9825/5142.htm.
[2]
Bass T, Gruber D. A glimpse into the future of id{J}. login:: the magazine of USENIX & SAGE, 1999, 24:págs. 40--45.
[3]
Yurcik W. Visualizing NetFlows for security at line speed: the SIFT tool suite{C}// Conference on Systems Administration. DBLP, 2005: 169--176.
[4]
Lau S. The Spinning Cube of Potential Doom.{J}. Comm Acm, 2004, 47(6):págs. 25--26.
[5]
Li D, Liu Z. Situation element extraction of network security based on Logistic Regression and Improved Particle Swarm Optimization{C}//Natural Computation (ICNC), 2013 Ninth International Conference on. IEEE, 2013: 569--573.
[6]
Huiqiang Wang, Ying Liang, Haizhi Ye. An Extraction Method of situation Factors for Network Security situation Awareness{P}. Internet Computing in Science and Engineering, 2008. ICICSE '08. International Conference on,2008.
[7]
Si Cheng,Zhang Hongqi,Wang Yongwei,Yang Yingjie.Research on Knowledge Base Model of Network Security Situational Elements Based on Ontology{J}.Computer Science,2015,42(05): 173--177.
[8]
LIU Xiao-Wu, WANG Hui-Qiang,Lü Hong-Wu,YU Ji-Guo,ZHANG Shu-Wen Fusion-Based Cognitive Awareness-Control Model for Network Security Situation{J}. Journal of Software, 2016, 27(8): 2099--2114(in Chinese).DOI=http://www.jos.org.cn/1000-9825/4611.htm.
[9]
9Guo Jian. Research on the acquisition technology of situational factors in network security situational awareness{D}. Northeastern University, 2011.
[10]
10Lai Jibao,Wang Ying,Wang Huiqiang,Zheng Fengbin,Zhou Bing.Research on the Structure of Network Security Situation Awareness System Based on Multi-source Heterogeneous Sensors{J}.Computer Science,2011,38(03): 144--149+158.
[11]
LIN Weining, CHEN Mingzhi, ZHAN Yunqing, et al. Research on an Intrusion Detection Algorithm Based on PCA and Random-forest Classification{J}.Netinfo Security,2017(11): 50--54.
[12]
Liang Ying,Wang Huiqiang,Lai Jibao.A Network Security Situational Awareness Method Based on Rough Set Theory{J}.Computer Science,2007(08): 95--97+147.
[13]
Li Hong. Research on Extraction of Network Security Situation Factors Based on Rough Sets{D}.Hebei Normal University, 2017.
[14]
Kwok SW, Carter C. Multiple decision trees{EB/OL}.{2018-01-31}.https://arxiv.org/abs/1304.2363
[15]
Ho TK. The random subspace method for constructing decision forests{J}. IEEE transactions on pattern analysis and machine intelligence, 1998, 20(8): 832--44
[16]
Quinlan JR. Induction of decision trees{J}. Machine learning, 1986, 1(1): 81--106
[17]
Quinlan JR. C4. 5: programs for machine learning{M}.Elsevier, 2014
[18]
Breiman L,Friedman J,Stone C J,et al.Classification and Regression Trees{M}. CRC press, 1984
[19]
QI Ben, WANG Mengdi. A Method Using Information Gain and Naive Bayes to Extract Network Situation Information {J}. Netinfo Security, 2017(9): 54--57

Cited By

View all
  • (2024)Research on Industrial Control Network Security Data Feature Extraction Technology Based on Composite Sparse Autoencoder2024 5th International Conference on Computer Engineering and Application (ICCEA)10.1109/ICCEA62105.2024.10603581(805-809)Online publication date: 12-Apr-2024
  • (2024)BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical TransformerIEEE Access10.1109/ACCESS.2024.338640512(54191-54201)Online publication date: 2024
  • (2023)An SSA-LC-DAE Method for Extracting Network Security ElementsIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.323398610:2(1175-1185)Online publication date: 1-Mar-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICBDC '19: Proceedings of the 4th International Conference on Big Data and Computing
May 2019
353 pages
ISBN:9781450362788
DOI:10.1145/3335484
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Shenzhen University: Shenzhen University
  • Sun Yat-Sen University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Situational awareness
  2. information gain
  3. random-forest
  4. situational extraction

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICBDC 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Research on Industrial Control Network Security Data Feature Extraction Technology Based on Composite Sparse Autoencoder2024 5th International Conference on Computer Engineering and Application (ICCEA)10.1109/ICCEA62105.2024.10603581(805-809)Online publication date: 12-Apr-2024
  • (2024)BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical TransformerIEEE Access10.1109/ACCESS.2024.338640512(54191-54201)Online publication date: 2024
  • (2023)An SSA-LC-DAE Method for Extracting Network Security ElementsIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.323398610:2(1175-1185)Online publication date: 1-Mar-2023
  • (2021)Research on Network Security Situation Awareness Based on the LSTM-DT ModelSensors10.3390/s2114478821:14(4788)Online publication date: 13-Jul-2021
  • (2021)Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)10.1109/CCCI52664.2021.9583206(1-5)Online publication date: 15-Oct-2021
  • (2021)Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detectionFuture Generation Computer Systems10.1016/j.future.2021.03.024122(130-143)Online publication date: Sep-2021
  • (2021)Research Progress and Future Trend Analysis of Network Security Situational AwarenessMobile Multimedia Communications10.1007/978-3-030-89814-4_39(537-549)Online publication date: 2-Nov-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media