Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model

Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most...

Full description

Saved in:
Bibliographic Details
Main Authors: Ying-Ti Tsai, Chung-Ho Wang, Yung-Chia Chang, Lee-Ing Tong
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:IET Information Security
Online Access:http://dx.doi.org/10.1049/2024/3948341
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832550528669712384
author Ying-Ti Tsai
Chung-Ho Wang
Yung-Chia Chang
Lee-Ing Tong
author_facet Ying-Ti Tsai
Chung-Ho Wang
Yung-Chia Chang
Lee-Ing Tong
author_sort Ying-Ti Tsai
collection DOAJ
description Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most enterprises lack specialized knowledge of information security. Thus, a simple and effective model for detecting abnormal behaviors may be more practical for information personnel than attempting to identify network intrusion modes. This study develops a network intrusion detection model by integrating weighted principal component analysis into an exponentially weighted moving average control chart. The proposed method assists information personnel in easily determining whether a network intrusion event has occurred. The effectiveness of the proposed method was validated using simulated examples.
format Article
id doaj-art-f3cb2796d4ae4a658a1323d3d476e758
institution Kabale University
issn 1751-8717
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-f3cb2796d4ae4a658a1323d3d476e7582025-02-03T06:06:37ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/3948341Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection ModelYing-Ti Tsai0Chung-Ho Wang1Yung-Chia Chang2Lee-Ing Tong3Department of Industrial Engineering and ManagementDepartment of Power Vehicle and System EngineeringDepartment of Industrial Engineering and ManagementDepartment of Industrial Engineering and ManagementArtificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most enterprises lack specialized knowledge of information security. Thus, a simple and effective model for detecting abnormal behaviors may be more practical for information personnel than attempting to identify network intrusion modes. This study develops a network intrusion detection model by integrating weighted principal component analysis into an exponentially weighted moving average control chart. The proposed method assists information personnel in easily determining whether a network intrusion event has occurred. The effectiveness of the proposed method was validated using simulated examples.http://dx.doi.org/10.1049/2024/3948341
spellingShingle Ying-Ti Tsai
Chung-Ho Wang
Yung-Chia Chang
Lee-Ing Tong
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
IET Information Security
title Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
title_full Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
title_fullStr Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
title_full_unstemmed Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
title_short Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
title_sort using wpca and ewma control chart to construct a network intrusion detection model
url http://dx.doi.org/10.1049/2024/3948341
work_keys_str_mv AT yingtitsai usingwpcaandewmacontrolcharttoconstructanetworkintrusiondetectionmodel
AT chunghowang usingwpcaandewmacontrolcharttoconstructanetworkintrusiondetectionmodel
AT yungchiachang usingwpcaandewmacontrolcharttoconstructanetworkintrusiondetectionmodel
AT leeingtong usingwpcaandewmacontrolcharttoconstructanetworkintrusiondetectionmodel