Computer Science ›› 2022, Vol. 49 ›› Issue (10): 353-357.doi: 10.11896/jsjkx.220700095

• Information Security • Previous Articles    

Study on Distributed Intrusion Detection System Based on Artificial Intelligence

WANG Lu1, WEN Wu-song2   

  1. 1 School of Artificial Intelligence,Chongqing University of Education,Chongqing 400065,China
    2 Department of Electrical Engineering,Tsinghua University,Beijing 100084,China
  • Received:2022-06-11 Revised:2022-07-25 Online:2022-10-15 Published:2022-10-13
  • About author:WANG Lu,born in 1980,master,asso-ciate professor.Her main research in-terests include artificial intelligence,power electronics and control enginee-ring.
  • Supported by:
    Science and Technology Research Program of Chongqing Municipal Education Commission of China(KJQN201901607).

Abstract: In order to solve the problems of data processing defects and low system intrusion accuracy existing in the current dynamic loading system,a distributed intrusion detection system with complete functions and strong practicability is designed by taking the application of “artificial intelligence technology” as an example.Firstly,on the basis of completing the system architecture and database design,comprehensively analyze the control center and the extended network host of the subregional control center,and then formulate corresponding response countermeasures in strict accordance with the relevant response rules of the response library.Secondly,through the use of the communication module,the intrusion behavior is judged to determine whether the intrusion behavior is abnormal.Again,use the S5720S-28P-SI-AC24-port core switch to exchange related data.Then,through the selection of AD2032 alarm responder,a comprehensive monitoring of external intrusion behavior is carried out.In addition,based on the comprehensive analysis of the main body communication implementation,the Libpcap library function is used to complete the scientific design of the intrusion detection process test.The results show that,under the application background of artificial intelligence technology,the distributed intrusion detection system designed in this paper can obtain high detection accuracy,and its accuracy reaches 99%,which provides an important platform for the later security and stable use of the network support.

Key words: Artificial intelligence, Distributed, Intrusion detection system, Design, Implementation

CLC Number: 

  • TP393
[1]ALLADI T,KOHLI V,CHAMOLA V,et al.Artificial Intelligence(AI)-Empowered Intrusion Detection Architecture for the Internet of Vehicles[J].IEEE Wireless Communications,2021,28(3):144-149.
[2]ZEBIN T,REZVY S,LUO Y,An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS(DoH) Attacks[J].IEEE Transactions on Information Forensics and Security,2022,17:2339-2349.
[3]CHEN X A.Research on the intrusion detection system of computer network[J].Electronic Test,2021(18):76-77,73.
[4]ZHONG W,YU N C.Applying big data based deep learning system to intrusion detection[J].Big Data Mining and Analy-tics,2020,3(3):181-195.
[5]LU L,SUN Y E,HUANG H,et al.Detection of persistent elements in distributed monitoring system[J].Journal of Computer Research and Development,2020,57(5):1046-1056.
[6]TANJ A,GUAN J F.Distributed intrusion detection system of networks based on artificial bee colony algorithm[J].Computer Applications and Software,2019,36(3):326-333.
[7]CHENG W Z,ZHANG L.Talking about distributed intrusion detection system[J].Sci-Tech & Development of Enterprise,2018(7):93-94.
[8]HONG B,CAO Z J.Design and implement of distributed intrusion detection system based on Hadoop[J].Journal of Xi'an Technological University,2018,38(4):390-395,407.
[9]WANG X Y.Design of temporal sequence association rule based intrusion detection behavior detection system for distributed network[J].Modern Electronics Technique,2018,41(3):107-110.
[10]LI H.Research on hybrid architecture for distributed intrusion detection system in wireless network[J].Techniques of Automation and Applications,2018,37(5):52-55,60.
[11]CHOI I,LEE J,KWON T,et al.An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ Monitoring[C]//2021 16th Asia Joint Conference on Information Security(AsiaJCIS).2021:1-8.
[12]ALI M,HU Y F,LUONG D K,et al.Adversarial Attacks on AI based Intrusion Detection System for Heterogeneous Wireless Communications Networks[C]//2020 AIAA/IEEE 39th Digital Avionics Systems Conference(DASC).2020:1-6.
[13]LI X.Research and implementation of intrusion detection system based on spark [D].Taiyuan:Shanxi University,2021.
[14]ZHANG S S.Design and implementation of security intrusion detection system based on software definition [D].Hangzhou:Zhejiang University,2020.
[15]HU B.Distributed vulnerability emergency detection system[D].Chengdu:University of Electronic Science and Technology,2020.
[16]GAO Y,LIU Y,JIN Y,et al.A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System[J].IEEE Access,2018,6:50927-50938.
[17]ZHANG W X.Design and implementation of intrusion detection system based on improved cann algorithm [D].Xi'an:Xi'an University of Electronic Science and Technology,2019.
[18]LI J,ZHAO Z,LI R,et al.AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks[J].IEEE Internet of Things Journal,2019,6(2):2093-2102.
[19]HE J P,LUO L,XIAO K,et al.Framework intrusion detection system based on feature distribution and AI[J].Application Research of Computers,2021,38(9):2746-2751.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[3] YANG Ya-hong, WANG Hai-rui. DDoS Attack Detection Method in SDN Environment Based on Renyi Entropy and BiGRU Algorithm [J]. Computer Science, 2022, 49(6A): 555-561.
[4] ZHANG Zhi-long, SHI Xian-jun, QIN Yu-feng. Diagnosis Strategy Optimization Method Based on Improved Quasi Depth Algorithm [J]. Computer Science, 2022, 49(6A): 729-732.
[5] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[6] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[7] LI Ye, CHEN Song-can. Physics-informed Neural Networks:Recent Advances and Prospects [J]. Computer Science, 2022, 49(4): 254-262.
[8] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[9] DU Hui, LI Zhuo, CHEN Xin. Incentive Mechanism for Hierarchical Federated Learning Based on Online Double Auction [J]. Computer Science, 2022, 49(3): 23-30.
[10] TAN Shuang-jie, LIN Bao-jun, LIU Ying-chun, ZHAO Shuai. Load Scheduling Algorithm for Distributed On-board RTs System Based on Machine Learning [J]. Computer Science, 2022, 49(2): 336-341.
[11] LI Ming-liang, PANG Jian-min, YUE Feng. Distributed Lock with Inter-core Passing for SW26010 Processor [J]. Computer Science, 2022, 49(10): 52-58.
[12] ZHANG Fu-chang, ZHONG Guo-qiang, MAO Yu-xu. Neural Architecture Search for Light-weight Medical Image Segmentation Network [J]. Computer Science, 2022, 49(10): 183-190.
[13] LIU Ming-da, SHI Yi-juan, RAO Xiang, FAN Lei. Distributed Privacy Protection Data Search Scheme [J]. Computer Science, 2022, 49(10): 291-296.
[14] WANG Ru-bin, LI Rui-yuan, HE Hua-jun, LIU Tong, LI Tian-rui. Distributed Distance Join Algorithm for Massive Spatial Data [J]. Computer Science, 2022, 49(1): 95-100.
[15] CHAO Le-men, YIN Xian-long. AI Governance and System:Current Situation and Trend [J]. Computer Science, 2021, 48(9): 1-8.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!