Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-01-01
|
Series: | IET Information Security |
Online Access: | http://dx.doi.org/10.1049/2024/3948341 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832550528669712384 |
---|---|
author | Ying-Ti Tsai Chung-Ho Wang Yung-Chia Chang Lee-Ing Tong |
author_facet | Ying-Ti Tsai Chung-Ho Wang Yung-Chia Chang Lee-Ing Tong |
author_sort | Ying-Ti Tsai |
collection | DOAJ |
description | Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most enterprises lack specialized knowledge of information security. Thus, a simple and effective model for detecting abnormal behaviors may be more practical for information personnel than attempting to identify network intrusion modes. This study develops a network intrusion detection model by integrating weighted principal component analysis into an exponentially weighted moving average control chart. The proposed method assists information personnel in easily determining whether a network intrusion event has occurred. The effectiveness of the proposed method was validated using simulated examples. |
format | Article |
id | doaj-art-f3cb2796d4ae4a658a1323d3d476e758 |
institution | Kabale University |
issn | 1751-8717 |
language | English |
publishDate | 2024-01-01 |
publisher | Wiley |
record_format | Article |
series | IET Information Security |
spelling | doaj-art-f3cb2796d4ae4a658a1323d3d476e7582025-02-03T06:06:37ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/3948341Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection ModelYing-Ti Tsai0Chung-Ho Wang1Yung-Chia Chang2Lee-Ing Tong3Department of Industrial Engineering and ManagementDepartment of Power Vehicle and System EngineeringDepartment of Industrial Engineering and ManagementDepartment of Industrial Engineering and ManagementArtificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most enterprises lack specialized knowledge of information security. Thus, a simple and effective model for detecting abnormal behaviors may be more practical for information personnel than attempting to identify network intrusion modes. This study develops a network intrusion detection model by integrating weighted principal component analysis into an exponentially weighted moving average control chart. The proposed method assists information personnel in easily determining whether a network intrusion event has occurred. The effectiveness of the proposed method was validated using simulated examples.http://dx.doi.org/10.1049/2024/3948341 |
spellingShingle | Ying-Ti Tsai Chung-Ho Wang Yung-Chia Chang Lee-Ing Tong Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model IET Information Security |
title | Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model |
title_full | Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model |
title_fullStr | Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model |
title_full_unstemmed | Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model |
title_short | Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model |
title_sort | using wpca and ewma control chart to construct a network intrusion detection model |
url | http://dx.doi.org/10.1049/2024/3948341 |
work_keys_str_mv | AT yingtitsai usingwpcaandewmacontrolcharttoconstructanetworkintrusiondetectionmodel AT chunghowang usingwpcaandewmacontrolcharttoconstructanetworkintrusiondetectionmodel AT yungchiachang usingwpcaandewmacontrolcharttoconstructanetworkintrusiondetectionmodel AT leeingtong usingwpcaandewmacontrolcharttoconstructanetworkintrusiondetectionmodel |