Campus Network Security Intrusion Detection Based on Feature Segmentation and Deep Learning

Authors

  • Zhe Chen Dancing school, Shandong University of Arts, Jinan 250000, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1349

Keywords:

feature segmentation, deep learning, campus network, security intrusion

Abstract

At present, the secure campus network strategy adopts technical means such as distinguishing applications and limiting them separately, but they have triggered other new problems, greatly affecting the unity of network resources and data. The relatively dispersed network architecture will inevitably limit the further development and expansion of the campus network. Therefore, when universities plan their networks, they must consider whether the network is safe, complete, smooth, and sustainable for smooth upgrading and development. In order to improve the effect of campus network security intrusion detection, this paper combines feature segmentation and deep learning technology to construct a campus network security intrusion detection model. To reduce the transmission time of query requirements in the grid, this paper improves the replica management mechanism and requires the information server to cache the Bloom Filter structure of nodes in its successor node list. Moreover, this paper uses the Compressed Bloom Filter algorithm to compress the Bloom Filter structure that needs to be transmitted, therefore reducing the network traffic generated during the update process of the Bloom Filter structure copy and avoiding network congestion. It also constructs a campus network security intrusion detection model based on feature segmentation and deep learning. Through experimental verification, the effectiveness of the system in intrusion detection, user evaluation, information processing, and other aspects is verified, and it has certain advantages compared to traditional algorithms. Through experimental research, it can be seen that the campus network security intrusion detection model based on feature segmentation and deep learning proposed in the paper can effectively improve the effect of campus network security monitoring. The method proposed in this article can not only be applied to campus network security, but also to the network security management of enterprises and other units, with certain scalability

Downloads

Download data is not yet available.

Author Biography

Zhe Chen, Dancing school, Shandong University of Arts, Jinan 250000, China

Zhe Chen was born in 1983 in Shandong, China. He received a bachelor’s degree from Minzu University of China in 2005 and a master’s degree from Xinjiang University of the Arts in 2020. His research interests include the performance and teaching of Chinese ethnic and folk dances. He is currently working at Shandong University of the Arts.

References

Li, D., Cai, Z., Deng, L., Yao, X., and Wang, H. H. (2019). Information security model of block chain based on intrusion sensing in the IoT environment. Cluster computing, 22(1), 451–468.

Parveen Sultana, H., Shrivastava, N., Dominic, D. D., Nalini, N., and Balajee, J. M. (2019). Comparison of machine learning algorithms to build optimized network intrusion detection system. Journal of Computational and Theoretical Nanoscience, 16(5–6), 2541–2549.

Pham, V., Seo, E., and Chung, T. M. (2020). Lightweight Convolutional Neural Network Based Intrusion Detection System. J. Commun., 15(11), 808–817.

Subbarayalu, V., Surendiran, B., and Arun Raj Kumar, P. (2019). Hybrid network intrusion detection system for smart environments based on internet of things. The Computer Journal, 62(12), 1822–1839.

Molina-Coronado, B., Mori, U., Mendiburu, A., and Miguel-Alonso, J. (2020). Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process. IEEE Transactions on Network and Service Management, 17(4), 2451–2479.

Sharma, P., Sengupta, J., and Suri, P. K. (2019). Survey of intrusion detection techniques and architectures in cloud computing. International Journal of High Performance Computing and Networking, 13(2), 184–198.

Gifty, R., Bharathi, R., and Krishnakumar, P. (2019). Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection. Neural Computing and Applications, 31(1), 23–34.

Stergiopoulos, G., Chronopoulou, G., Bitsikas, E., Tsalis, N., and Gritzalis, D. (2019). Using side channel TCP features for real-time detection of malware connections. Journal of Computer Security, 27(5), 507–520.

Xue, Y. (2023). Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features. Journal of Cyber Security and Mobility, 12(05), 697–710.

Safaldin, M., Otair, M., and Abualigah, L. (2021). Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of ambient intelligence and humanized computing, 12(2), 1559–1576.

Bharathy, A. V., and Basha, A. M. (2017). A multi-class classification MCLP model with particle swarm optimization for network intrusion detection. Sâdhanâ, 42(5), 631–640.

Spathoulas, G., Theodoridis, G., and Damiris, G. P. (2021). Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts. International Journal of Information Security, 20(3), 347–370.

Young, C., Zambreno, J., Olufowobi, H., and Bloom, G. (2019). Survey of automotive controller area network intrusion detection systems. IEEE Design & Test, 36(6), 48–55.

Li, X. (2023). Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN. Journal of Cyber Security and Mobility, 11(06), 755–776.

Rathore, M. M., Ahmad, A., Anand, P., and Rho, S. (2018). Exploiting encrypted and tunneled multimedia calls in high-speed big data environment. Multimedia Tools and Applications, 77(4), 4959–4984.

Park, S. T., Li, G., and Hong, J. C. (2020). A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning. Journal of Ambient Intelligence and Humanized Computing, 11(4), 1405–1412.

Chen, L., Gao, S., Liu, B., Lu, Z., and Jiang, Z. (2020). THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection. The Journal of Supercomputing, 76(9), 7489–7518.

Naveed Ahmed, N., and Nanath, K. (2021). Exploring Cybersecurity Ecosystem in the Middle East: Towards an SME Recommender System. Journal of Cyber Security and Mobility, 10(3), 511–536.

Lagraa, S., Husák, M., Seba, H., Vuppala, S., State, R., and Ouedraogo, M. (2024). A review on graph-based approaches for network security monitoring and botnet detection. International Journal of Information Security, 23(1), 119–140.

Wei, K., Zang, H., Pan, Y., Wang, G., and Shen, Z. (2024). Strategic application of ai intelligent algorithm in network threat detection and defense. Journal of Theory and Practice of Engineering Science, 4(01), 49–57.

Ennaji, S., El Akkad, N., and Haddouch, K. (2023). i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security. International Journal of Information Security and Privacy (IJISP), 17(1), 1–17.

He, K., Kim, D. D., and Asghar, M. R. (2023). Adversarial machine learning for network intrusion detection systems: A comprehensive survey. IEEE Communications Surveys & Tutorials, 25(1), 538–566.

Mohy-Eddine, M., Guezzaz, A., Benkirane, S., and Azrour, M. (2023). An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimedia Tools and Applications, 82(15), 23615–23633.

Downloads

Published

2024-06-14

How to Cite

1.
Chen Z. Campus Network Security Intrusion Detection Based on Feature Segmentation and Deep Learning. JCSANDM [Internet]. 2024 Jun. 14 [cited 2024 Jul. 3];13(04):775-802. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24883

Issue

Section

EIC Select