计算机科学 ›› 2021, Vol. 48 ›› Issue (12): 357-363.doi: 10.11896/jsjkx.201000086

• 信息安全 • 上一篇    

基于SSC-BP神经网络的异常检测算法

石琳姗1, 马创2, 杨云3, 靳敏1   

  1. 1 国网重庆市电力公司信息通信分公司 重庆401123
    2 重庆邮电大学软件学院 重庆400065
    3 国网重庆市电力公司 重庆400010
  • 收稿日期:2020-10-16 修回日期:2021-01-15 出版日期:2021-12-15 发布日期:2021-11-26
  • 通讯作者: 马创(machuang@cqupt.edu.cn)
  • 作者简介:muyeandmuye@163.com
  • 基金资助:
    国家电网有限公司科技项目资助(2020渝电科技33#)

Anomaly Detection Algorithm Based on SSC-BP Neural Network

SHI Lin-shan1, MA Chuang2, YANG Yun3, JIN Min1   

  1. 1 State Grid Chongqing Electric Power Company Information and Communication Branch,Chongqing 401123,China
    2 School of Software,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
    3 State Grid Chongqing Electric Power Company,Chongqing 400010,China
  • Received:2020-10-16 Revised:2021-01-15 Online:2021-12-15 Published:2021-11-26
  • About author:SHI Lin-shan,born in 1993,bachelor,engineer.Her main research interests include Internet of Things,network security architecture and protection.
    MA Chuang,born in 1984,Ph.D,asso-ciate professor,is a member of China Computer Federation.His main research interests include complex network and machine learning.
  • Supported by:
    Science and Technology Project of State Grid Corporation of China(2020 Yudian Technology 33#).

摘要: 针对物联网环境下产生的新型网络攻击的数量持续上升和复杂性不断升高,传统的异常检测算法误报率高、检测率低以及数据量大而造成计算困难等问题,提出了一种基于子空间聚类(Subspace Clustering,SSC)和BP神经网络相结合的异常检测算法。首先在网络数据集上通过子空间聚类算法中最常用的CLIQUE算法得到不同的子空间;其次对不同子空间中的数据进行BP神经网络异常检测,计算预测误差值,通过与预先设定好的精度进行比较,来不断更新阈值进行修正,以达到提高识别网络攻击的能力。仿真实验采用NSL-KDD公开数据集和物联网环境下的网络攻击数据集,将NSL-KDD公开数据集分割为4种单一攻击子集和1种混合攻击子集,通过与K-means,DBSCAN,SSC-EA以及k-KNN异常检测模型进行比较,在混合攻击子集中,SSC-BP神经网络模型的检测率比传统的K-means模型的检测率提高了6%,误检率降低了0.2%;而在4种单一攻击子集中,SSC-BP神经网络模型都能以最低的误检率检测出最多的受到攻击的网络。在物联网环境下的网络攻击数据集上,SSC-BP神经网络模型的性能均优于其他几种对比模型。

关键词: BP神经网络, 新型网络攻击, 异常检测, 子空间聚类

Abstract: Aiming at the increasing number and complexity of new network attacks in the Internet of Things environment,the traditional anomaly detection algorithm has high false alarm rate,low detection rate and large amount of data,which cause calculation difficulties,this paper proposes an anomaly detection algorithm based on the combination of subspace clustering(SSC) and BP neural network.Firstly,different subspaces are obtained by CLIQUE algorithm,which is the most commonly used subspace clustering algorithm;secondly,BP neural network anomaly detection is carried out on the data in different subspaces,and the prediction error value is calculated.By comparing with the pre-set accuracy,the threshold value is constantly updated for correction,so as to improve the ability of identifying network attacks.The NSL-KDD public data set and the network attack data set in the Internet of Things environment are used in the simulation experiment.The NSL-KDD public data set is divided into four kinds of single attack subsets and a mixed attack subsets.Compared with K-means,DBSCAN,SSC-EA and K-KNN anomaly detection models.In the mixed attack subset,the detection rate of SSC-BP neural network model is 6% higher than that of traditional K-means model,and the false detection rate is reduced by 0.2%;SSC-BP neural network model can detect the most attacked network with the lowest false detection rate in four single attack subsets.In the Internet of Things environment,SSC-BP neural network model is superior to other models.

Key words: Anomaly detection, BP neural network, New network attack, Subspace clustering

中图分类号: 

  • TP181
[1]SHI J S,LI R.Survey of Blockchain Access Control in Internet of Things[J].Journal of Software,2019,30(6):1632-1648.
[2]SHA L T,XIAO F,CHEN W,et al.Leakage Perception Method for Backdoor Privacy in Industry Internet of Things Environment[J].Journal of Software,2018,29(7):1863-1879.
[3]JIANG Z,WU Q,LI H W,et al.Survey on Internet End-to-end Multipath Transfer Research with Cross-layer Optimization[J].Journal of Software,2019,30(2):302-322.
[4]ZHANG L.Research on Intrusion Detection Model Based on Rough Set and Artificial Immune[D].Beijing:Beijing University of Posts and Telecommunications,2014.
[5]GUO P,LI J W,JUN S,et al.A Hybrid Unsupervised Clustering-Based Anomaly Detection Method[J].Tsinghua Science and Technology,2021,26(2):146-153.
[6]LIU J,ZHANG H C,XU G X.An Anomaly Detector Deployment Awareness Detection Framework based on Multi-Dimensional Resources Balancing in Cloud Platform[J].IEEE Access,2018,6:44927-44932.
[7]MOUSTAFA N,TURNBULL B,CHOO K.An Ensemble In- trusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things[J].IEEE Internet of Things Journal,2018,6(3):4815-4830.
[8]DU Q.Research on Distributed Deployment of Anomaly Detection Function Based on Internet of Things Environment[D].Chengdu:Journal of University of Electronic Science and Technology of China,2017.
[9]ALRASHDI I,ALQAZZAZ A,ALOUFI E,et al.AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning[C]//2019 IEEE 9th Annual Computing and Communication Workshop and Conference(CCWC).IEEE,2019.
[10]ZHONG J,YANG Q,GAO W.Dynamic Scheduling Algorithm for Scalable Big Data Stream in Internet of Things[J].Journal of Chongqing University of Technology(Natural Science),2019,33(9):182-189.
[11]EFREM H B,ADHISTYA E P,SILMI F.Unsupervised Ano- maly Detection Using K-Means,Local Outlier Factor and One Class SVM[C]//2019 5th International Conference on Science and Technology(ICST).2019.
[12]YANG L.Network Anomaly Traffic Detection Algorithm Based on SVM[C]//2017 International Conference on Robots & Intelligent System(ICRIS).2017.
[13]CHEN J Y,YANG D Y.Detector Generation Algorithm Based on Online GA for Anomaly Detection[C]//2011 International Conference on Network Computing and Information Security.2011.
[14]ANSHIKA C,HIMANGI M,ANUJA A.Anomaly Detection using Graph Neural Networks[C]//2019 International Confe-rence on Machine Learning,Big Data,Cloud and Parallel Computing(COMITCon).2019.
[15]HUANG Y F,CHUN W Y,TANG X L.A Temporal Recur- rent Neural Network Approach to Detecting Market Anomaly Attacks[C]//2018 IEEE International Conference on Intelli-gence and Security Informatics(ISI).2018.
[16]PENG H.Research of Intrusion Detection Method Based on Rough Set[J].Journal of University of Electronic Science and Technology of China,2016,35(1):108-113.
[17]SUN Z X,XU H X.Survey of the Application Research of Fuzzy Technology to Intrusion Detection Systems[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2006,26(4):73-80.
[18]WANG G P,WANG J W.An anomaly detection framework for detecting anomalous virtual machines under cloud computing environment[J].International Journal of Security and its Applications,2016,10(1):75-86.
[19]ZHANG H C,LIU J,WU T S.Adaptive and Incremental-Clustering Anomaly Detection Algorithm for VMs Under Cloud Platform Runtime Environment[J].IEEE access,2018(6):76984-76992.
[20]XU B H,CHEN S Y,ZHANG H C.Incremental k-NN SVM Method in Intrusion Detection[C]//8th IEEE International Conference on Software Engineering and Service Science(ICSESS).2017:712-717.
[21]KUMARI R,SHEETANSHU A,SINGH M K,et al.Anomaly detection in network traffic using K-mean clustering[C]//2016 3rd International Conference on Recent Advances in Information Technology(RAIT).IEEE,2016.
[22]HOSSEIN S E,SAYYED M M.A Novel Anomaly Detection Algorithm Using DBSCAN and SVM in Wireless Sensor Networks[J].Wireless Personal Communications,2018,98(2):2025-2035.
[23]FOKRUL A M,ALZAHRANI M Y,GEORGIEVA L.Anomaly Detection Using Agglomerative Hierarchical Clustering Algorithm[C]//International Conference on Information Science & Applications.Springer,Singapore,2018.
[1] 徐天慧, 郭强, 张彩明.
基于全变分比分隔距离的时序数据异常检测
Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance
计算机科学, 2022, 49(9): 101-110. https://doi.org/10.11896/jsjkx.210600174
[2] 李其烨, 邢红杰.
基于最大相关熵的KPCA异常检测方法
KPCA Based Novelty Detection Method Using Maximum Correntropy Criterion
计算机科学, 2022, 49(8): 267-272. https://doi.org/10.11896/jsjkx.210700175
[3] 王馨彤, 王璇, 孙知信.
基于多尺度记忆残差网络的网络流量异常检测模型
Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network
计算机科学, 2022, 49(8): 314-322. https://doi.org/10.11896/jsjkx.220200011
[4] 杜航原, 李铎, 王文剑.
一种面向电商网络的异常用户检测方法
Method for Abnormal Users Detection Oriented to E-commerce Network
计算机科学, 2022, 49(7): 170-178. https://doi.org/10.11896/jsjkx.210600092
[5] 徐佳楠, 张天瑞, 赵伟博, 贾泽轩.
面向供应链风险评估的改进BP小波神经网络研究
Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment
计算机科学, 2022, 49(6A): 654-660. https://doi.org/10.11896/jsjkx.210800049
[6] 朱旭辉, 沈国娇, 夏平凡, 倪志伟.
基于螺旋进化萤火虫算法和BP神经网络的模型及其在PPP融资风险预测中的应用
Model Based on Spirally Evolution Glowworm Swarm Optimization and Back Propagation Neural Network and Its Application in PPP Financing Risk Prediction
计算机科学, 2022, 49(6A): 667-674. https://doi.org/10.11896/jsjkx.210800088
[7] 刘宝宝, 杨菁菁, 陶露, 王贺应.
基于DE-LSTM模型的教育统计数据预测研究
Study on Prediction of Educational Statistical Data Based on DE-LSTM Model
计算机科学, 2022, 49(6A): 261-266. https://doi.org/10.11896/jsjkx.220300120
[8] 武玉坤, 李伟, 倪敏雅, 许志骋.
单类支持向量机融合深度自编码器的异常检测模型
Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder
计算机科学, 2022, 49(3): 144-151. https://doi.org/10.11896/jsjkx.210100142
[9] 冷佳旭, 谭明圮, 胡波, 高新波.
基于隐式视角转换的视频异常检测
Video Anomaly Detection Based on Implicit View Transformation
计算机科学, 2022, 49(2): 142-148. https://doi.org/10.11896/jsjkx.210900266
[10] 夏静, 马中, 戴新发, 胡哲琨.
基于BP神经网络的智能云效能模型
Efficiency Model of Intelligent Cloud Based on BP Neural Network
计算机科学, 2022, 49(2): 353-367. https://doi.org/10.11896/jsjkx.201100140
[11] 刘意, 毛莺池, 程杨堃, 高建, 王龙宝.
基于邻域一致性的异常检测序列集成方法
Locality and Consistency Based Sequential Ensemble Method for Outlier Detection
计算机科学, 2022, 49(1): 146-152. https://doi.org/10.11896/jsjkx.201000156
[12] 张叶, 李志华, 王长杰.
基于核密度估计的轻量级物联网异常流量检测方法
Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method
计算机科学, 2021, 48(9): 337-344. https://doi.org/10.11896/jsjkx.200600108
[13] 程铁军, 王曼.
基于变权组合的突发事件网络舆情趋势预测
Network Public Opinion Trend Prediction of Emergencies Based on Variable Weight Combination
计算机科学, 2021, 48(6A): 190-195. https://doi.org/10.11896/jsjkx.200600094
[14] 郭奕杉, 刘漫丹.
基于时空轨迹数据的异常检测
Anomaly Detection Based on Spatial-temporal Trajectory Data
计算机科学, 2021, 48(6A): 213-219. https://doi.org/10.11896/jsjkx.201100193
[15] 郭福民, 张华, 胡瑢华, 宋岩.
一种基于表面肌电信号的腕部肌力估计方法研究
Study on Method for Estimating Wrist Muscle Force Based on Surface EMG Signals
计算机科学, 2021, 48(6A): 317-320. https://doi.org/10.11896/jsjkx.200600021
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!