Paper
11 October 2023 Application of machine learning algorithm in intrusion detection technology
Author Affiliations +
Proceedings Volume 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023); 1280028 (2023) https://doi.org/10.1117/12.3004665
Event: 6th International Conference on Computer Information Science and Application Technology (CISAT 2023), 2023, Hangzhou, China
Abstract
Intrusion Detection (ID), as an effective network security protection technology, is an important means to ensure network security. In order to solve the problem that traditional intrusion detection technology is difficult to adapt to the current complex and changeable new network attacks, this paper uses the Random Forest (RF) algorithm of machine learning algorithm to solve this problem. Random forest algorithm has good feature learning and classification ability, which can effectively improve the accuracy of intrusion detection system. However, when the characteristic values of the sample data are high, its time complexity will also be high. In this paper, K-means clustering algorithm and One-Rule algorithm are introduced to improve the random forest algorithm, improve its modeling and classification speed, and further improve the detection efficiency by means of hierarchical division. In this paper, the proposed KOne-RF algorithm is verified by using NSL-KDD data set. Experimental results show that compared with the traditional RF algorithm, KOne-RF algorithm has improved modeling time, detection classification and detection accuracy, and detection ability for different types of attack behavior, which verifies the reliability of KOne-RF algorithm.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Tianyu Zhang, Ming Song, Qiang Zhang, and Suwen Li "Application of machine learning algorithm in intrusion detection technology", Proc. SPIE 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), 1280028 (11 October 2023); https://doi.org/10.1117/12.3004665
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Detection and tracking algorithms

Data modeling

Computer intrusion detection

Education and training

Machine learning

Feature selection

Performance modeling

Back to Top