Journal of East China Normal University(Natural Science) ›› 2021, Vol. 2021 ›› Issue (6): 100-111.doi: 10.3969/j.issn.1000-5641.2021.06.011
• Computer Science • Previous Articles
Qiwen HUANG, Liying LI, Fuke SHEN, Tongquan WEI*()
Received:
2020-06-28
Online:
2021-11-25
Published:
2021-11-26
Contact:
Tongquan WEI
E-mail:tqwei@cs.ecnu.edu.cn
CLC Number:
Qiwen HUANG, Liying LI, Fuke SHEN, Tongquan WEI. Network anomaly traffic detection based on ensemble feature selection[J]. Journal of East China Normal University(Natural Science), 2021, 2021(6): 100-111.
Table 1
Features of CIC-IDS-2018"
CIC-IDS-2018特征 | |||
Flow Duration | Total Forward Packets | Total Backward Packets | Total Length Forward Packets |
Total Length Backward Packets | Forward Packet Length Max | Forward Packet Length Min | Forward Packet Length Mean |
Forward Packet Length Std | Backward Packet Length Max | Backward Packet Length Min | Backward Packet Length Mean |
Backward Packet Length Std | Flow Bytes/s | Flow Packets/s | Flow IAT Mean |
Flow IAT Std | Flow IAT Max | Flow IAT Min | Forward IAT Total |
Forward IAT Mean | Forward IAT Std | Forward IAT Max | Forward IAT Min |
Backward IAT Total | Backward IAT Mean | Backward IAT Std | Backward IAT Max |
Backward IAT Min | Forward PSH Flags | Backward PSH Flags | Forward URG Flags |
Backward URG Flags | Forward Header Length | Backward Header Length | Forward Packets/s |
Backward Packets/s | Packet Length Min | Packet Length Max | Packet Length Mean |
Packet Length Std | Packet Length Var | FIN Flag Count | SYN Flag Count |
RST Flag Count | PSH Flag Count | ACK Flag Count | URG Flag Count |
CWE Flag Count | ECE Flag Count | Down/Up Ratio | Packet Size Avg |
Forward Seg Size Avg | Backward Seg Size Avg | Forward Byts/b Avg | Forward Packets/b Avg |
Forward Blk Rate Avg | Backward Byts/b Avg | Backward Packets/b Avg | Backward Blk Rate Avg |
Subflow Forward Packets | Subflow Forward Byts | Subflow Backward Packets | Subflow Backward Byts |
Init Forward Win Byts | Init Backward Win Byts | Forward Act Data Packets | Forward Seg Size Min |
Active Mean | Active Std | Active Max | Active Min |
Idle Mean | Idle Std | Idle Max | Idle Min |
Table 3
Statistics of features"
特征名称 | 特征选择方法 | 方法数 | 总计 | 特征子集 | ||||
相关系数 | 卡方 | 互信息 | 随机森林 | LGBM | ||||
Pkt Len Std | 1 | 1 | 1 | 1 | 1 | 5 | 5 | F5, F4, F3 |
Fwd Seg Size Min | 1 | 1 | 1 | 1 | 1 | 5 | ||
Fwd Pkts/s | 1 | 1 | 1 | 1 | 1 | 5 | ||
Flow Pkts/s | 1 | 1 | 1 | 1 | 1 | 5 | ||
Bwd Pkts/s | 1 | 1 | 1 | 1 | 1 | 5 | ||
Init Fwd Win Byts | 0 | 1 | 1 | 1 | 1 | 4 | 6 | F4, F3 |
Init Bwd Win Byts | 1 | 1 | 1 | 1 | 0 | 4 | ||
Fwd IAT Mean | 1 | 0 | 1 | 1 | 1 | 4 | ||
Flow IAT Mean | 1 | 0 | 1 | 1 | 1 | 4 | ||
Bwd Pkt Len Std | 1 | 1 | 0 | 1 | 1 | 4 | ||
Bwd Pkt Len Mean | 1 | 1 | 1 | 1 | 0 | 4 | ||
Pkt Size Avg | 1 | 1 | 1 | 0 | 0 | 3 | 9 | F3 |
Pkt Len Var | 1 | 0 | 1 | 0 | 1 | 3 | ||
Pkt Len Mean | 1 | 1 | 1 | 0 | 0 | 3 | ||
Fwd Seg Size Avg | 1 | 0 | 1 | 1 | 0 | 3 | ||
Fwd Pkt Len Std | 1 | 1 | 0 | 0 | 1 | 3 | ||
Fwd Pkt Len Mean | 1 | 0 | 1 | 1 | 0 | 3 | ||
Fwd Pkt Len Max | 1 | 0 | 1 | 1 | 0 | 3 | ||
Fwd Header Len | 0 | 0 | 1 | 1 | 1 | 3 | ||
Bwd Seg Size Avg | 1 | 1 | 1 | 0 | 0 | 3 |
1 | CISCO. Cisco visual networking index: Forecast and methodology, 2016–2021 [EB/OL]. (2017-06-15)[2020-06-24]. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visualnetworking-indexvni/complete-white-paper-c11-481360.pdf. |
2 | KYLE Y. Read Dyn’s statement on the 10/21/2016 DNS DDoS attack [EB/OL]. (2016-10-21)[2020-06-24]. https://dyn.com/blog/dyn-statement-on-10212016-ddos-attack.html. |
3 | PATIL N V, KRISHNA C R, KUMAR K, et al. E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks [J/OL]. Journal of King Saud University-Computer and Information Sciences, 2019. https://doi.org/10.1016/j.jksuci.2019.06.016. |
4 | PACHECO F, EXPOSITO E, GINESTE M, et al. Towards the deployment of machine learning solutions in network traffic classification: A systematic survey. IEEE Communications Surveys and Tutorials, 2018, 21(4), 1988- 2014. |
5 | INTERNET ASSIGNED NUMBERS AUTHORITY. Protocol Assignments [EB/OL]. (2011-12-17)[2020-06-24]. https://www.iana.org/protocols. |
6 |
CALLADO A, KELNER J, SADOK D, et al. Better network traffic identification through the independent combination of techniques. Journal of Network and Computer Applications, 2010, 33 (4): 433- 446.
doi: 10.1016/j.jnca.2010.02.002 |
7 |
BELAVAGI M C, MUNIYAL B. Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Computer Science, 2016, 89, 117- 123.
doi: 10.1016/j.procs.2016.06.016 |
8 | OSANAIYE O, CAI H B, CHOO K K R, et al. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing [J]. EURASIP Journal on Wireless Communications and Networking, 2016: Article number 130. DOI: 10.1186/s13638-016-0623-3 |
9 | HOQUE N, SINGH M, BHATTACHARYYA D K. EFS-MI: An ensemble feature selection method for classification. Complex & Intelligent Systems, 2018(4): 105-118., |
10 |
SINGH K J, DE T. Efficient classification of DDoS attacks using an ensemble feature selection algorithm. Journal of Intelligent Systems, 2017, 29 (1): 71- 83.
doi: 10.1515/jisys-2017-0472 |
11 | KE G L, MENG Q, FINLEY T, et al. LightGBM: A highly efficient gradient boosting decision tree [C]// Advances in Neural Information Processing Systems (NIPS 2017). 2017: 3146-3154. |
12 | CHEN T Q, GUESTRIN C. XGBoost: A scalable tree boosting system[C] // Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2016: 785–794. |
13 |
BOLÓN-CANEDO V, ALONSO-BETANZOS A. Ensembles for feature selection: A review and future trends. Information Fusion, 2019, 52, 1- 12.
doi: 10.1016/j.inffus.2018.11.008 |
14 | HO T K. Random decision forests [C]// Proceedings of 3rd International Conference on Document Analysis and Recognition. IEEE,1995: 278-282. |
15 |
BREIMAN L. Random forest. Machine Learning, 2001, 45, 5- 32.
doi: 10.1023/A:1010933404324 |
16 | 李航. 统计学习方法[M]. 2版. 北京: 清华大学出版社, 2019: 59-60. |
17 | CHEN T Q. Story and lessons behind the evolution of XGBoost [EB/OL]. (2016-03-10)[2020-06-24]. https://homes.cs.washington.edu/~tqchen/2016/03/10/story-and-lessons-behind-the-evolution-of-xgboost.html. |
18 | SHARAFALDIN I, LASHKARI A H, GHORBANI A A. Toward generating a new intrusion detection dataset and intrusion traffic characterization [C]// Proceedings of the 4th International Conference on Information Systems Security and Privacy - ICISSP. 2018: 108-116. |
19 | LASHKARI A H, DRAPER-GIL G, MAMUN M S I, et al. Characterization of tor traffic using time based features [C]// Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP. 2017: 253-262. |
[1] | Yaqin HU, Ming TANG. The impact of coupling patterns on transport in multilayer networks [J]. Journal of East China Normal University(Natural Science), 2021, 2021(3): 105-113. |
[2] | HAN Ding-ding, LIU Kang, TANG Ming. Dynamic routing algorithm based on local information in a free-scale network [J]. Journal of East China Normal University(Natural Sc, 2019, 2019(2): 69-76,96. |
[3] | YE Shi-tong, WAN Zhi-ping, KE Jian-bo, LIU Shao-jiang, NI Wei-chuan. Cognitive heterogeneous network based on cooperative spectrum sensing and interference constraints [J]. Journal of East China Normal University(Natural Sc, 2017, 2017(6): 76-84. |
[4] | WANG Rong-Rong, XUE Min-Hui, LI Xiang-Xue, QIAN Hai-Feng. An effective localization attack in locationbased social network [J]. Journal of East China Normal University(Natural Sc, 2016, 2016(2): 62-72. |
[5] | LIU Huan, WU Min-Yu, CHEN Jian-Xiang, LIU Chang, LU Bei-Rong. Accessibility evaluation on college portal websitesbased on WCAG 2.0 [J]. Journal of East China Normal University(Natural Sc, 2015, 2015(6): 143-151. |
[6] | JIANG Jia-bao,ZHENG Shang-zhi. Research on OSPF multi constraint routing based on QPSO algorithm [J]. Journal of East China Normal University(Natural Sc, 2015, 2015(3): 91-97. |
[7] | LI Zhong-Xiang, CHEN Lei. K coverage of WiFi signal node deployment based on AFSA [J]. Journal of East China Normal University(Natural Sc, 2015, 2015(1): 151-160. |
[8] | ZHANG Yu, ZHANG Yan-Song, ZHANG Bing, CHEN Hong, WANG Shan. Co-OLAP: Research on cooperated OLAP with star schema benchmark on hybrid CPU&GPU platform [J]. Journal of East China Normal University(Natural Sc, 2014, 2014(5): 240-251. |
[9] | CHEN Lei;FANG Sheng;WANG Neng. Network selection scheme and a simulator for future urban road heterogeneous wireless access networks [J]. Journal of East China Normal University(Natural Sc, 2011, 2011(3): 111-122. |
[10] | JIANG Xue;ZHENG Jun;WANG Ping. Global trust model with high white washing resistance (Chinese) [J]. Journal of East China Normal University(Natural Sc, 2010, 2010(1): 111-117. |
[11] | HUANG Su-shan;QIAN Hai-feng;ZHOU Yuan. Security authentication protocol based on bilinear pairing (Chinese) [J]. Journal of East China Normal University(Natural Sc, 2010, 2010(1): 118-126. |
[12] | CHEN Lei;WANG Neng . Evaluation scheme based on traffic flow forONU place in urban road WOBAN [J]. Journal of East China Normal University(Natural Sc, 2009, 2009(4): 98-106. |
[13] | . [J]. Journal of East China Normal University(Natural Sc, 2009, 2009(4): 137-140. |
[14] | WU He-lan;HU Bing-yuan;CHEN Bi-duo. Method for control data synchronization of business modules in a stack system(Chinese) [J]. Journal of East China Normal University(Natural Sc, 2008, 2008(2): 122-130. |
[15] | YANG Jing;HE Liang;GU Junzhong . Dissymmetrical P2P topology and resource locating algorithm (Chinese) [J]. Journal of East China Normal University(Natural Sc, 2008, 2008(1): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||