A Network Intrusion Detection Model Based on Principal Component Analysis and Random Forest
DOI:
https://doi.org/10.54097/fcis.v2i1.2971Keywords:
Network security, Intrusion detection, Principal component analysis, Random forestAbstract
Network intrusion data has the characteristics of high dimension, nonlinearity and redundancy. To solve the problem of low detection rate of traditional dimensionality reduction and detection methods, a network intrusion detection method based on principal component analysis combined with random forest is proposed. Firstly, the data dimension of network intrusion is reduced by principal component analysis to eliminate redundant information between data, and then the processed data is classified and trained by using random forest classifier. The algorithm is verified by the network intrusion NSL_KDD dataset. The experimental results show that compared with other network intrusion detection methods, the method has fast learning speed, high detection accuracy, low false negative rate and low false positive rate. An efficient, real-time and good network intrusion detection method.
Downloads
References
ZHANG Shuai, DI Shaojia. Monitoring Data of Network Security in September 2019 [J]. Netinfo Security, 2019 (11): 93-94.
ZHANG Lei, CUI Yong, LIU Jing. Application of Machine Learning in Cyberspace Security Research [J]. Chinese Journal of Computers, 2018, 41(09): 1943-1975.
WANG Xiang, HU Xuegang, YANG Qiujie. Research on improved intrusion detection model with random forest based on feature evaluation of One-R00 [J]. Journal of He fei University of Technology (Natural Science), 2015, 38 (05): 627-630, 711.
REN Jiadong, LIU Xinqian, WANG Qian. A Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests [J]. Journal of Com⁃ puter Research and Development, 2019, 56(03): 566-575.
Liang C, Li C H, Zhou L E. A PCA-BP neural network-based intrusion detection method [J]. Journal of Air Engineering University (Natural Science Edition), 2016, 17(6): 93-98.
Guinde N B, Ziavras S G. Efficient hardware support for pattern matching in network intrusion detection [J]. computers & security, 2010, 29(7): 756-769.
Quinlan J R. Induction of decision trees [J]. Machine learning, 1986, 1(1), 81-106.
Quinlan, J. R. C4.5: Programs for Machine Learning [M]. Morgan Kaufmann Publishers, 1993: 1-12.
Steinberg D. CART: classification and regression trees [M]. The Top Ten Algorithms in Data Mining. Chapman and Hall/CRC, 2009:193-216.


