• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Real-Time Network Intrusion Prevention System Using Incremental Feature Generation

    2022-11-09 08:16:40YeongjeUhmandWooguilPak
    Computers Materials&Continua 2022年1期

    Yeongje Uhm and Wooguil Pak

    1Research and Business Development Foundation,Yeungnam University,Gyeongsan,Gyeongbuk,38541,Korea

    2Department of Information and Communication Engineering,Yeungnam University,Gyeongsan,Gyeongbuk,38541,Korea

    Abstract:Security measures are urgently required to mitigate the recent rapid increase in network security attacks.Although methods employing machine learning have been researched and developed to detect various network attacks effectively,these are passive approaches that cannot protect the network from attacks,but detect them after the end of the session.Since such passive approaches cannot provide fundamental security solutions,we propose an active approach that can prevent further damage by detecting and blocking attacks in real time before the session ends.The proposed technology uses a two-level classifier structure:the first-stage classifier supports real-time classification,and the second-stage classifier supports accurate classification.Thus,the proposed approach can be used to determine whether an attack has occurred with high accuracy,even under heavy traffic.Through extensive evaluation,we confirm that our approach can provide a high detection rate in real time.Furthermore,because the proposed approach is fast,light,and easy to implement,it can be adopted in most existing network security equipment.Finally,we hope to mitigate the limitations of existing security systems,and expect to keep networks faster and safer from the increasing number of cyber-attacks.

    Keywords: Network intrusion detection;network intrusion prevention;realtime;two-level classifier

    1 Introduction

    Recently,we have experienced a rapid increase in cybercrime [1].With a growing number of people working from home,the importance of network security has increased.Therefore,there is an urgent need to develop new technology to keep networks and users safe from malicious attacks.Early network security technology uses signature-based detection to discover network attacks using specific patterns identified by analyzing previous attacks [2-4].Signature-based detection can significantly increase detection speed,thereby enabling network intrusion prevention in real time,and intrusion detection in non-real time.

    However,signature-based methods are considerably vulnerable to variants of existing attacks and to newly emerging attacks,especially zero-day attacks [5-7].Therefore,machine learning-based technology for detecting abnormal behaviors (instead of a pattern-dependent method) has recently been developed to overcome these vulnerabilities.Although a number of studies are underway into the proposed machine learning-based technologies,most of them focus on improving detection accuracy;research on improving detection speed to achieve real-time detection is lacking [8].This is evident from the fact that machine learning-based technologies are applied only to intrusion detection systems (IDSs).Thus far,intrusion prevention,which blocks intrusions in real time,does not have applicable systems using machine learning.

    There might be several reasons why a machine learning-based intrusion prevention system(IPS) has not yet been developed;however,the most important reason is the complexity of the machine learning algorithm itself.Most machine learning algorithms are trained on large amounts of data,and classification is then performed by the generated models [9-14].It requires a considerably long time to train machine-learning models with large amounts of data,and this requires huge amounts of memory and computing power.To solve these problems,various partitioningbased machine learning techniques have been proposed,and some of the problems can be solved by adopting external cloud systems to mitigate the lack of memory and computational power required by training procedures.

    However,classification by a learning model requires considerable computing power and fast speeds.As a solution,high classification speed can be obtained by massively parallel processing using expensive multiple GPUs.In this case,the CPU-GPU latency from transferring and processing a large amount of data can be detrimental to a high-capacity network that needs to transmit packets at high speed without delay [15].

    Furthermore,the biggest reason why a machine learning-based IPS is difficult to implement is that it takes too long to generate from network traffic the features used for machine learning.There are several approaches to generating features;however,most studies generate features from each session,rather than from single packets.In this case,features cannot be generated before the session ends,and any attack is detected after the session ends [5-7,16,17].Thus,attacks cannot be detected in real time.Moreover,with the current approaches,it is even difficult to detect an attack soon after the session ends because of poor classification performance.

    Thus,in this study,we propose a method of generating features and detecting attacks in real time before the session ends.In particular,this study makes the following contributions.

    (1) A structure for generating features in real time

    By presenting the structure for generating features in real time,the proposed method enables early attack detection by determining whether an attack has occurred before the session ends.

    (2) High accuracy and real time attack detection through a two-level classifier

    To detect an attack in real time,we propose a unique two-level detection method.We designed a first-stage classifier that can detect attacks at high speed;the second-stage classifier improves detection accuracy.Thus,we implement a classifier with high accuracy while detecting attacks in real time.

    (3) Low implementation costs

    Although the proposed method uses a two-level classifier,it has the advantage of being applicable to existing equipment because it uses the same classifier (or two similar classifiers) to simplify implementation,compared to other hybrid methods or ensemble-based classifier methods.

    The remainder of this manuscript is organized as follows.Section 2 identifies and compares the features in existing work.Section 3 describes the proposed method in detail.Section 4 analyzes the results of the performance evaluation.Finally,Section 5 concludes this study with a brief summary.

    2 Existing Work

    Early network intrusion detection systems (NIDSs) use pattern-matching or threshold-based approaches.Such NIDSs can support fast detection but reveal crucial limitations in detecting zero-day attacks.Thus,a lot of research is focusing on machine learning-based approaches.The early machine learning-based NIDS employed a single machine learning algorithm,so it showed weakness in accurately detecting various network attacks.NIDS research using multiple machine learning algorithms has been actively going on.Generally,machine learning-based IDSs are classified into packet-based methods and session-based methods,where the former use packet data for learning,and the latter use session data.The packet-based methods obtain features from raw packet data without a feature extraction technique.The session-based methods require all the session data in order to build features after the session is finished or has expired.Since the information from one entire session is reduced to a small number of statistical values called session features,it can support very high processing speeds.

    In this section,we describe in detail the existing work,from early non-machine learning-based approaches to various recent machine learning approaches.We also compare the pros and cons of each approach.

    2.1 The Non-Machine-Learning Algorithm

    The signature-based approaches can be classified into two groups according to whether they support real-time detection or not.One of the most well-known non-real-time detection methods using the signature-based approach is the earliest IDS for monitoring multi-user systems.It can detect some specific types of attack: intrusion attempts,unauthorized intrusions,data breaches,DDoS,and suspicious use.The security policy is converted into rules and stored in a database,and each flow is analyzed to determine whether it was an attack or not based on the data registered in the database.After the flow closes,features are extracted from transmitted and received packet data and are used for detection.Thus,this approach cannot support real-time detection [2].

    One of the NIDSs belonging to this category can provide real-time intrusion detection and prevention using the Boyer-Moore pattern matching algorithm in a signature-based manner [2,18].It compares the header,payload,and size of an incoming packet to pre-registered signatures to identify malicious traffic.However,the system has some issues,such as processing overhead and reliability.It needs to analyze every packet to create a new signature.Nonetheless,it cannot guarantee the reliability of a signature.

    2.2 The Packet-Based Single-Machine-Learning Algorithm

    This approach uses a single-machine-learning algorithm with features obtained from packet data [2].From the packet-based features,it can detect malicious code in packet payload data similar to an early pattern-matching approach.However,it inherently cannot detect zero-day attacks and attack variants,and the NIDS using this approach can be bypassed via packet fragmentation to avoid detection.By collecting multiple packets of a session rather than a single packet,such a weakness can be mitigated.

    2.3 The Packet-Based Multiple-Machine-Learning Algorithm

    This approach adopts multiple machine-learning algorithms to detect attacks [3].Multiple algorithms can greatly help increase classification performance but the classification speed can deteriorate.Thus,the main disadvantage of this approach is that it is very difficult to use in large networks because of the slow training and classification speeds [3].

    2.4 The Session-Based Single-Machine-Learning Algorithm

    This approach extracts features from each session and classifies each session to detect abnormal traffic [9-14].Early machine learning-based studies belong to this category.Since it does not use packet data to generate features,but uses a fixed number of features (regardless of the session length or packet size of each session),it can reduce memory usage and simplify the classification algorithm,resulting in high training and classification speeds.Owing to such benefits,we can apply this approach to large-scale networks.However,features can only be generated after the session ends,so when it detects an attack,it has most likely already been completed.

    2.5 The Session-Based Multiple-Machine-Learning Algorithm

    This approach performs training and classification by using features extracted from a session by using various classification algorithms.Ensemble and multi-layered methods are well-known types in this category [17,19].The ensemble method applies several algorithms and combines the results from them.By doing so,it can significantly improve the detection performance,compared to a single-machine-learning approach.The multi-layered method runs each algorithm serially,based on the results after executing a specific algorithm.Generally,this approach adopts unsupervised learning and supervised learning.One example applies k-nearest neighbors (kNN) at first,to obtain multiple partitions,and then applies a decision tree (DT) algorithm to each partition.A multiple-classification algorithm compensates for the weakness of each algorithm,reaching very high classification accuracy.Instead,the classification speed becomes too slow to support realtime attack detection because of the very high computational cost.For some algorithms in this category,it is even impossible to apply them to a real network security system,because the overall implementation cost is too high.

    As of now,little research has been done to increase detection accuracy and speed simultaneously.Various approaches have been proposed for overcoming existing technical issues,but real-time detection is still an open problem.

    3 Proposed Algorithm

    We propose a method for implementing an NIDS that can process packets received in real time and determine whether an attack has occurred.The proposed algorithm generates the latest features by updating the feature table for each session whenever a packet is received,and it determines whether an attack has occurred using the features.As shown in Fig.1,the proposed system is configured to simultaneously increase both classification speed and accuracy by utilizing two classifiers.The proposed method has the following features.

    · Early attack detection

    The proposed method performs intrusion detection whenever a packet is received.Therefore,it can detect intrusions without waiting until the session ends.

    · Easy implementation

    Although the proposed method is equipped with two classifiers,it is implemented using the simple DT and its variants.Hence,it is considerably easy and simple to implement,and therefore,it is possible to apply the proposed method,without high cost,to an existing system.

    The proposed method consists of a classifier to apply whenever a packet is received,and another classifier to apply when a session has ended.The classification executed whenever a packet is received is done by the cumulative packet-based classifier (CPC),and the classification executed after the session ends is done by the terminated flow-based classifier (TFC).A session is composed of a series of two-way packets.Therefore,sessionfis denoted asf={p1,p2,...,pn}based on the sequence of two-way packets received by the IDS.Here,fis a session consisting ofnpackets.The session is defined based on a five-tuple,<sip,dip,sport,dport,protocol>,in which sip,dip,sport,and dport denote the source IP,destination IP,source port,and destination port,respectively.Thus,<ip1,ip2,port1,port2,protocol>and<ip2,ip1,port2,port1,protocol>are regarded as the same session if the lifetimes overlap.

    Whenever an IDS or IPS receives a packet,it creates and updates session statistics to generate features for the relevant session.Now,supposeFkis the feature vector generated using the firstkpackets received.Assuming the total number of packets of the session isn,a total ofnpairs of feature vectors are created for the session (i.e.,F1,F2,...,Fn).Here,the CPC usesF1,F2,...,Fn,to classify whether the session is under attack,whereas the TFC uses onlyFnto estimate abnormality.It is common to remove sip and dip from the features used to train the CPC and TFC.This is to prevent creation of a specific session-dependent model.Furthermore,in the CPC,dport is excluded from the feature.Now,we describe in detail updating and generating features whenever a new packet is received.We also show how the CPC and TFC work.

    3.1 Incremental Feature Generation

    Whenever a packet is received,the proposed algorithm updates information on the session to which the packet belongs,and creates the features required for classification.As shown in Fig.1,the session information is stored in the feature table,which consists of internal session states and session stateful features.Internal session states are not features,but rather,the information necessary to create features.For example,Last Flow Timestamp (a field included in internal session states) stores the time at which every packet is received.This value is then used to update other values of internal session states or to create other features.

    The internal session state is composed of bi-directional flow information and uni-directional flow information,i.e.,forward and backward flow information.Whenever a packet is received,the corresponding fields for bi-directional flow information are always updated.Subsequently,fields for forward or backward flow information are updated according to the direction of the packet.Tab.1 shows some selected fields for bi-directional flow information and shows how they are updated whenever a packet is received.Similarly,Tab.2 shows a partial set of the fields for forward information,and how to update them.We omit fields for backward flow information since they are almost identical to the forward ones.

    Figure 1:Overall procedures in incremental feature generation

    Table 1:Partial list of bi-directional internal session states

    Table 2:Partial list of forward internal session states

    We call information fields similar to the internal session state that work as features for classification thesession stateful features.In session stateful features,bi-directional,forward flow,and backward flow information exists,and the corresponding fields are updated according to the direction of the received packets.Tab.3 provides some selected fields of bi-directional flow information in session stateful features and shows how we update the fields.

    Table 3:Partial list of bi-directional session stateful features

    As mentioned earlier,internal session states and session stateful features are updated every time a packet is received.Here,we should note that session stateful features do not include all features required for machine learning and classification.It means that we need to create the remaining features using internal session states and session stateful features.Such features are called derived session features.They are not stored or maintained in the feature tables shown in Fig.1,and are temporarily generated through internal session states and session stateful features whenever required.Derived session features contain fields for bi-directional,forward,and backward flows.

    Tab.4 shows some typical bi-directional derived session features,and they are created by using internal session states and session stateful features.This feature-generation approach allows the system to progressively build session features.Whenever a packet is received,internal session states and session stateful features are updated.When the entire feature set is needed,derived session features are easily created without a high cost.Generally,we incur high overhead to create the entire feature set after the session is terminated.However,incremental feature generation distributes the overhead over time.

    Table 4:Partial list of bi-directional derived session features

    3.2 The Cumulative Packet-Based Classifier

    IfFk (k <n)for a specific attack session partially reflects the characteristics of an attack,it is possible to detect the attack usingFk.Here,the smaller the value ofk,the faster the attack can be classified;however,the probability of incorrect classification may also increase.The overall characteristics of a session can be identified more accurately with an increase ink,but more time is spent detecting attacks.Ultimately,it is necessary to decide when to perform classification for the session.The session is no longer processed if it is classified as an attack in the CPC,and the relevant packet and the subsequent packets received by the IDS are discarded.Therefore,it is necessary to be cautious when classifying an attack in the CPC.In general,when machine learning is employed to detect a network intrusion,the relationship between the sip and dip address values should be used to create a feature (for example,by determining if they are the same).However,sip and dip address values should be removed from the feature.To make the CPC more reliable in detecting attacks,all features that can affect the creation of a model dependent on the session itself should be removed.Hence,sip,dip,and dport are all removed in the proposed method,whereas only sip and dip are removed in the conventional methods.

    In general,class type and score are obtained as a result of CPC classification.The closer the score is to 1,the more reliable it is,whereas the closer the score is to 0,the more unreliable it is.Therefore,the minimum CPC score (MCS) should be determined—the higher the MCS,the lower the rate of misclassification by the CPC.However,with an increase in the number of packets used to generate features for classifying a session,it takes longer to detect an attack—the lower the MCS,the quicker the detection in the CPC.However,this leads to an increase in the probability of error.Therefore,in the proposed method,it is crucial to maintain high classification accuracy and to improve speed at the same time by setting the MCS to an optimal value.

    3.3 The Terminated Flow-Based Classifier

    The TFC and CPC use basically the same feature structure;however,unlike the CPC,the TFC performs classification after the session ends.Hence,there is no need to process the session in real time.Therefore,unlike the CPC,it is more advantageous for the TFC to use a classification algorithm with high accuracy rather than considering speed or computational complexity.Furthermore,while the CPC performs learning and classification using all ofFk (k <n),the TFC classifies only finished sessions.Therefore,in the TFC,learning and classification are performed using only theFnfeatures generated based on all packets of the finished session.This method uses the same features as those used in the CPC,but uses one more: dport.

    3.4 Parameter Setting

    As described above,the performance of the proposed method varies depending on the MCS.Therefore,after training,the optimal MCS value is set based on the results from classifying the training data.The proposed method uses decision tree algorithms for machine learning.In general,the decision tree algorithm is suitable for an IDS that processes large amounts of data owing to its fast training time,high classification speed,and low memory usage.Of the several decision tree algorithms,the most appropriate should be selected.Therefore,by considering three algorithms—DT,random forest (RF),and boosted DT (BDT)—we measure the F1-score while increasing the MCS value from a combination of each algorithm.Using these results,the optimal MCS for each algorithm was selected.The ISCXIDS2012 and CICIDS2017 datasets were used for the experiment.For reference,the measurement results using the CICIDS2017 dataset are shown in Fig.2.

    Figure 2:Results of the performance comparison based on the MCS from the CICIDS2017 dataset (a) F1-score based on the MCS and (b) Average detection time

    As seen in Fig.2,the F1-score was the highest when RF and BDT were used among the combinations of first-and second-level classifiers.Here,the F1-score was consistently maintained when the MCS was 0.977 or higher;however,the average detection time increased significantly,when the MCS was 0.998 or higher.Therefore,in the proposed method,we conducted experiments by setting the MCS to 0.998 when using RF for the CPC and BDT for the TPC,and by setting it to 1 when using DT and BDT.Similarly,the same method was used to select the best combination of classifiers and the relevant MCS for the ISCXIDS2012 dataset.Thus,the MCS was set to 0.985 when using RF and BDT,and it was set to 1 when using DT and BDT.

    3.5 Overall System Operation

    The overall operation of the proposed IPS is as follows.When a packet arrives,the IPS first determines whether to receive it or not according to the firewall policy.If the matched policy returnsdeny,it is discarded.Otherwise,it is accepted,and the internal session states and session stateful features are created or existing features are updated.After that,the system builds entire features for the packet after creating derived session features.It determines if the session for the packet is benign or not through the CPC.If the classification score is higher than MCS,the session is added to the firewall policy blacklist or whitelist based on the class type.Conversely,if it is lower than MCS,the packet is forwarded regardless of the classification result.When the session terminates,the internal session state and session stateful feature data for the session expire and are removed after building the final features.The final determination about the session is done by the TFC;the results are logged and the administrator is notified,if necessary.The overall operation is in Algorithm 1.

    Algorithm 1: Intrusion Prevention System 1 IF packet P is received THEN 2 Consult firewall to find the matching policy for P.3 IF policy action is ‘deny’THEN 4 Drop P and RETURN 5 END_IF 6 Update bi-directional internal session states &bi-directional session stateful 7 features.8 IF P is in the forward direction THEN 9 Update forward internal session states and forward session stateful features.10 ELSE 11 Update backward internal session states and backward session stateful features.12 END_IF 13 Create derived session features and classify P using CPC.14 IF score <MCS THEN 15 RETURN 16 END_IF 17 IF P is malicious THEN 18 Add P session to blacklist of firewall.19 ELSE 20 Add P session to whitelist of firewall.21 END_IF 22 ELSE IF expired session S is found THEN 23 Create derived session features for S.24 Remove data for S from the session table.25 Classify S using TFC.26 IF S is malicious THEN 27 Notify the administrator and log the result.28 END_IF

    4 Performance Evaluation

    4.1 The Environment

    To evaluate the performance of the proposed method,we compared its performance using various algorithms and two datasets: CICIDS2017 and ISCXIDS2012 [17,20].For training and testing,the datasets were split in a 6:4 ratio.We chose these datasets because packet and labeling data are available,and therefore,features can be generated using CICFlowMeter.We used 80 features proposed in ISCXIDS2012.However,as described in Section 3,sip,dip,and dport were excluded from the first-level classifier,but only sip and dip were excluded from the secondlevel classifier.The size and characteristics of each dataset are summarized in Tab.5.

    Table 5:Characteristics for each dataset

    For the performance comparison,we employed a 1D-CNN [21],LSTM [22],and TCN [23],which are deep learning algorithms [24],along with DT and Na?ve Bayes (DTNB) as a clusteringbased method [25],BDT as a boosted algorithm [26],and DT and RF [27],which are DT categories [18].The parameter settings for each algorithm are listed in Tab.6.

    Table 6:Parameter settings for each algorithm

    Table 6:Continued

    4.2 Comparison of Detection Rates

    Of the various performance indicators in the classifiers used in the NIDS,the most crucial factor is detection rate.If normal and attack sessions cannot be accurately classified,such an algorithm is impractical for an NIDS,regardless of its high classification speed.In this experiment,we measured accuracy,precision,recall,and F1-score to compare the detection performance of each algorithm.The experimental results are shown in Figs.3 and 4,which indicate that the results are similar,regardless of the dataset type.As seen in the figures,the proposed method using a combination of RF and BDT showed higher performance than the conventional competing methods for all metrics.Furthermore,the method using DT and BDT achieved slightly lower performance than the 1D-CNN and LSTM.In all cases,the proposed method using RF and BDT showed the highest accuracy and F1-score.This clearly demonstrates that the proposed two-level classifier structure is effective in improving accuracy.

    4.3 Comparison of Detection Times

    To detect an attack in real time,it should be possible to detect the attack before the session ends.To evaluate this capability,we measured and compared the time taken from the start of the session to detection of an attack.The shorter the time,the more effective the method is at detecting and defending against an attack in real time.Tab.7 shows the results from comparing detection times for the proposed and comparison methods.Because all the competing methods are session-based IDSs,classification and detection were performed after the sessions ended.

    Figure 3:Experimental results using the CICIDS2017 dataset

    Figure 4:Experimental results using the ISCXIDS2012 dataset

    Accordingly,in Tab.7,the detection times of the session-based methods are expressed as the session duration,assuming no additional processing time existed.In an actual implementation,the comparison methods may take more time than the results shown in Tab.7.The proposed method indicates the time taken for accurate detection after the session started.

    As shown in Tab.7,the proposed method makes use of the CPC to detect attacks even before the session ends.Hence,the speed at which an attack is detected by the CPC is a valid metric to gauge the performance of the comparison methods.Tab.7 indicates that the proposed method can detect attacks significantly faster than the conventional methods.In particular,the (DT,BDT)method was at least five times faster than the (RF,BDT) method.The proposed method based on RF and BDT was almost three times faster than the conventional session-based methods.This clearly shows that the proposed method can provide detection speed that is not achievable with conventional methods.In particular,most session-based methods detect the session end using a timeout value.For the TCP,the session end time can be determined by detecting the FIN packet;however,in the other protocols,such as a UDP session,the IDS cannot accurately detect the session end time.Therefore,it needs to estimate the end time after no packets are transmitted for predefined duration,which is generally set at 30 s to 120 s.For session-based IDSs in a real environment,the sum of the session duration and the timeout value is defined as the total detection time.Thus,the gap in the actual detection speed between the proposed method and a conventional session-based method becomes larger than that shown in Tab.7.

    Table 7:Average detection time for each class in the CICIDS2017 dataset (in seconds)

    To compare detection speeds more accurately,it is necessary to compare the speed for each class.Tab.7 also shows those detection speeds,and the proposed method detects each class much faster than the conventional methods.In particular,the proposed method using (DT,BDT) can significantly reduce the detection time,compared to the proposed method using (RF,BDT).As seen in the previous experiment,the performance from (DT,BDT) is slightly lower than from (RF,BDT) in terms of detection rate.Therefore,it is advantageous to use (RF,BDT) when detection rate is more important than speed.Conversely,it is better to use (DT,BDT) when speed is more critical than detection rate.

    Tab.8 shows the average detection time for each class in the ISCXIDS2012 dataset.As with CICIDS2017,the detection time can be significantly reduced compared to the conventional session-based methods,so it is more suitable to use (DT,BDT) instead of (RF,BDT) if high detection speed is needed.

    The detection time is affected by the inter-packet time in a session.That is,with an increase in the inter-packet time in the same session,the detection time also increases.Therefore,instead of measuring the relative detection time,we can compare the performance more accurately by determining how many packets within each session are received before an attack is detected.Tab.9 summarizes the average number of packets required to detect each class type in CICIDS2017.

    Table 8:Average detection time for each class in the ISCXIDS2012 dataset (in seconds)

    Table 9:Average number of packets before detection of each class in CICIDS2017

    Tab.9 indicates that the proposed method requires considerably fewer packets to detect an attack than the conventional session-based methods.Moreover,we can see that the number of packets required for (RF,BDT) is not significantly different from (DT,BDT).Tab.10 summarizes the results using ISCXIDS2012,which are similar to those for CICIDS2017.

    Table 10:Average number of packets before detection of each class in ISCXIDS2012

    4.4 System Load

    The proposed NIDS should repeatedly classify the session whenever a new packet is received until the class type of a specific session is detected.That is,unlike the conventional session-based NIDS that requires a one-time classification for each session,the proposed NIDS performs more classifications.This can result in significantly higher overhead in the system,compared to the conventional method.Thus,such increased overhead can be an obstacle to real-time processing.The number of packets needed to classify each session becomes the most crucial factor,and should be minimized.

    For a more accurate analysis of system loads,the total number of packets included in a session,and the number of packets required before detection,are displayed for each session in Fig.5.The figure shows that the average number of packets required for detection is less than five in most cases.In particular,for the sessions in which the total number of packets is very high(>1000),the number of packets required for detection tends to stay consistently small,without a significant increase.

    Figure 5:Length of each session and the number of packets required before detecting an attack.Vertical lines indicate the range of the number of packets.(a) CICIDS2017 (DT,BDT),(b) CICIDS2017 (RF,BDT),(c) ISCXIDS2012 (DT,BDT) and (d) ISCXIDS2012 (RF,BDT)

    For example,when using (DT,BDT) for the CICIDS2017 dataset,we observed that,even for a session when the total number of packets was more than 100,000,it is possible to determine whether an attack has occurred with only the first two packets of the session.Thus,the proposed method can classify normal and attacked sessions while maintaining low system loads regardless of the session length.This is a significant characteristic for improving the performance of the NIDS.This characteristic demonstrates that real-time IPS development is a real possibility.

    5 Conclusion

    We proposed a new approach that can detect cyberattacks in real time.It is composed of two classifiers,one for processing packets in real time and the other for processing sessions in non-real time,so it can simultaneously increase detection performance in terms of speed and accuracy.In this research,we showed a promising solution enabling a machine learning-based real-time IPS rather than a machine learning-based non-real-time IDS by providing incomparable detection speed and accuracy.Of course,the proposed approach cannot process all the traffic and detect any kind of attack in real time.The hardware platform costs are higher than conventional IDSs since it requires almost twice the processing power,compared to the existing session-based approaches.However,despite these limitations,it is of great significance,showing that it is possible to implement real-time IPS-based rather than IDS-based machine learning algorithms.Future research will find solutions to the shortcomings revealed by this research.In doing so,we believe the proposed approach will improve so it is able to detect and defend against attacks in real time,even on 100-gigabit networks.We also expect that it can protect networks and users from malicious users and various network attacks.

    Funding Statement: This work was supported in part by the Information Technology Research Center (ITRC) Support Program supervised by the Institute for Information and Communications Technology Planning and Evaluation (IITP) (IITP-2020-2016-0-00313),and in part by and the 2021 Yeungnam University Research Grant.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    91久久精品国产一区二区成人| 亚洲综合色惰| 久久久久久久久久人人人人人人| 天天影视国产精品| 国产 精品1| 丝袜美足系列| 男女边吃奶边做爰视频| 99热国产这里只有精品6| 美女大奶头黄色视频| 伦理电影大哥的女人| 国产爽快片一区二区三区| 丰满少妇做爰视频| 在线观看三级黄色| 最近最新中文字幕免费大全7| 国产午夜精品久久久久久一区二区三区| 大香蕉久久网| 精品视频人人做人人爽| 新久久久久国产一级毛片| 热re99久久精品国产66热6| 99久久综合免费| 亚洲欧洲精品一区二区精品久久久 | 久久免费观看电影| 国产高清不卡午夜福利| 亚洲,欧美,日韩| 新久久久久国产一级毛片| 成人二区视频| a级毛片黄视频| 午夜福利视频精品| 男女高潮啪啪啪动态图| 国产伦精品一区二区三区视频9| 成人毛片a级毛片在线播放| 精品少妇黑人巨大在线播放| 国产色爽女视频免费观看| 亚洲av不卡在线观看| 在线观看www视频免费| 九色亚洲精品在线播放| 如何舔出高潮| 国产爽快片一区二区三区| 97在线人人人人妻| 十八禁高潮呻吟视频| 亚洲精品一区蜜桃| 香蕉精品网在线| 亚洲国产色片| 一二三四中文在线观看免费高清| 亚洲内射少妇av| 看非洲黑人一级黄片| 午夜日本视频在线| 午夜福利在线观看免费完整高清在| 婷婷色麻豆天堂久久| 国产 一区精品| 久久久久久久久久久久大奶| 在线看a的网站| 永久网站在线| 国产免费现黄频在线看| 三级国产精品欧美在线观看| 亚洲经典国产精华液单| 欧美人与善性xxx| 考比视频在线观看| 一区二区日韩欧美中文字幕 | 亚洲精品av麻豆狂野| 在线观看免费高清a一片| 精品久久久久久电影网| 五月玫瑰六月丁香| 亚洲欧美一区二区三区黑人 | 卡戴珊不雅视频在线播放| 国产一区二区三区av在线| 欧美精品一区二区免费开放| 国产精品国产三级专区第一集| 夜夜看夜夜爽夜夜摸| 97在线人人人人妻| 女性被躁到高潮视频| 国产精品久久久久成人av| 亚洲伊人久久精品综合| 久久久久久伊人网av| 亚洲欧美一区二区三区黑人 | 亚洲欧美中文字幕日韩二区| 亚洲av福利一区| 亚洲av中文av极速乱| 欧美人与性动交α欧美精品济南到 | 亚洲av成人精品一区久久| 大香蕉97超碰在线| 午夜激情av网站| 国产亚洲午夜精品一区二区久久| 一区二区av电影网| 欧美精品人与动牲交sv欧美| 中文欧美无线码| 色吧在线观看| 国产精品欧美亚洲77777| av天堂久久9| 国产高清有码在线观看视频| 插阴视频在线观看视频| 老司机亚洲免费影院| 插阴视频在线观看视频| 春色校园在线视频观看| 久久ye,这里只有精品| 亚洲高清免费不卡视频| 免费黄色在线免费观看| 日韩视频在线欧美| 夫妻性生交免费视频一级片| 国产 一区精品| av一本久久久久| 国产老妇伦熟女老妇高清| 高清在线视频一区二区三区| 看免费成人av毛片| 亚洲av国产av综合av卡| 大码成人一级视频| 国产免费一区二区三区四区乱码| 亚洲精品456在线播放app| 一区二区日韩欧美中文字幕 | 中文乱码字字幕精品一区二区三区| 18禁在线无遮挡免费观看视频| 美女cb高潮喷水在线观看| 中文字幕制服av| 大又大粗又爽又黄少妇毛片口| 成年人免费黄色播放视频| 波野结衣二区三区在线| 国产精品一国产av| 有码 亚洲区| 一级毛片我不卡| 亚洲av不卡在线观看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产精品一国产av| 国产亚洲午夜精品一区二区久久| 性色avwww在线观看| 欧美丝袜亚洲另类| av专区在线播放| 久久国产精品大桥未久av| 最新中文字幕久久久久| 亚洲情色 制服丝袜| 国产亚洲精品久久久com| 嘟嘟电影网在线观看| 啦啦啦啦在线视频资源| 国产黄色视频一区二区在线观看| 精品人妻熟女av久视频| 大香蕉97超碰在线| 日韩免费高清中文字幕av| 久久 成人 亚洲| 国产精品久久久久久av不卡| 99久久综合免费| 亚洲高清免费不卡视频| 一级黄片播放器| 大香蕉97超碰在线| 内地一区二区视频在线| 91精品三级在线观看| 午夜福利在线观看免费完整高清在| 男人操女人黄网站| 亚洲综合色网址| 爱豆传媒免费全集在线观看| 免费不卡的大黄色大毛片视频在线观看| 亚洲伊人久久精品综合| 我的女老师完整版在线观看| 精品国产乱码久久久久久小说| 日日撸夜夜添| 观看美女的网站| 日日爽夜夜爽网站| 国产乱来视频区| 亚洲欧美中文字幕日韩二区| 亚洲国产精品成人久久小说| 简卡轻食公司| 欧美精品亚洲一区二区| 成年人午夜在线观看视频| 国产精品久久久久成人av| 女性被躁到高潮视频| 曰老女人黄片| 国产在线一区二区三区精| tube8黄色片| 欧美精品高潮呻吟av久久| 国产成人精品一,二区| 亚洲少妇的诱惑av| 欧美精品高潮呻吟av久久| 免费人成在线观看视频色| 考比视频在线观看| 色5月婷婷丁香| 一个人看视频在线观看www免费| av专区在线播放| 精品一品国产午夜福利视频| 欧美+日韩+精品| 十八禁网站网址无遮挡| 欧美激情国产日韩精品一区| 国产成人freesex在线| 国产成人精品福利久久| 久久女婷五月综合色啪小说| 国产有黄有色有爽视频| 人成视频在线观看免费观看| 成人毛片a级毛片在线播放| 日韩av不卡免费在线播放| 日本色播在线视频| 欧美精品国产亚洲| 免费观看性生交大片5| 99久久综合免费| 女性被躁到高潮视频| 亚洲人与动物交配视频| 午夜精品国产一区二区电影| 亚洲不卡免费看| 80岁老熟妇乱子伦牲交| 午夜福利,免费看| 国产男女超爽视频在线观看| 精品人妻偷拍中文字幕| 久久99精品国语久久久| 久热这里只有精品99| 日韩欧美一区视频在线观看| 黄色一级大片看看| 人体艺术视频欧美日本| 亚洲av欧美aⅴ国产| 91aial.com中文字幕在线观看| 搡女人真爽免费视频火全软件| 中国国产av一级| 狂野欧美激情性xxxx在线观看| 久久午夜福利片| 女性被躁到高潮视频| 欧美xxxx性猛交bbbb| 三上悠亚av全集在线观看| 欧美97在线视频| 精品人妻在线不人妻| 99精国产麻豆久久婷婷| 男女啪啪激烈高潮av片| 免费观看a级毛片全部| xxx大片免费视频| 精品少妇久久久久久888优播| 香蕉精品网在线| 欧美老熟妇乱子伦牲交| 日韩av不卡免费在线播放| 美女主播在线视频| 99九九线精品视频在线观看视频| 国产精品久久久久久av不卡| 成年av动漫网址| 欧美+日韩+精品| 国产av精品麻豆| 国产精品无大码| 日日撸夜夜添| 一级毛片 在线播放| 久久久久久久久久成人| 国产欧美亚洲国产| 精品人妻熟女毛片av久久网站| 99re6热这里在线精品视频| 考比视频在线观看| 夜夜爽夜夜爽视频| 中文字幕人妻熟人妻熟丝袜美| 在线亚洲精品国产二区图片欧美 | 极品人妻少妇av视频| 高清av免费在线| 91久久精品国产一区二区成人| 丰满饥渴人妻一区二区三| 日韩精品免费视频一区二区三区 | 99久久人妻综合| 午夜免费男女啪啪视频观看| 寂寞人妻少妇视频99o| 久久精品国产自在天天线| 成人18禁高潮啪啪吃奶动态图 | 日韩,欧美,国产一区二区三区| 交换朋友夫妻互换小说| 成人国产av品久久久| 亚洲成色77777| 欧美日韩视频精品一区| 国产视频首页在线观看| 精品一区二区三区视频在线| 亚洲国产毛片av蜜桃av| 久久人妻熟女aⅴ| 汤姆久久久久久久影院中文字幕| 九色成人免费人妻av| 日韩欧美精品免费久久| 亚洲国产精品国产精品| 国产熟女欧美一区二区| 九九久久精品国产亚洲av麻豆| videossex国产| 十八禁高潮呻吟视频| 大香蕉久久网| av免费观看日本| 在线观看免费高清a一片| 久久人人爽人人片av| 久久久a久久爽久久v久久| 欧美xxⅹ黑人| 欧美人与性动交α欧美精品济南到 | 最新的欧美精品一区二区| 桃花免费在线播放| 国产高清有码在线观看视频| 日韩一区二区三区影片| 国产色婷婷99| 插逼视频在线观看| 国产精品成人在线| 久久久久人妻精品一区果冻| 欧美精品亚洲一区二区| 丝袜喷水一区| 国产高清不卡午夜福利| 亚洲熟女精品中文字幕| 热re99久久国产66热| 建设人人有责人人尽责人人享有的| 午夜视频国产福利| 制服丝袜香蕉在线| 精品久久久久久电影网| 热99国产精品久久久久久7| 国产精品人妻久久久久久| 永久网站在线| 久久久久久伊人网av| 91久久精品国产一区二区成人| 亚洲精品456在线播放app| .国产精品久久| 国产国语露脸激情在线看| 午夜福利视频精品| 老熟女久久久| 岛国毛片在线播放| 91aial.com中文字幕在线观看| 日韩成人av中文字幕在线观看| 日本免费在线观看一区| 丰满乱子伦码专区| 国产精品久久久久成人av| 亚洲av不卡在线观看| 免费av不卡在线播放| 亚洲国产av新网站| 高清不卡的av网站| 丝袜在线中文字幕| 午夜福利,免费看| 国产熟女午夜一区二区三区 | 国产色爽女视频免费观看| 九九在线视频观看精品| 亚洲av男天堂| 一本大道久久a久久精品| videos熟女内射| 欧美最新免费一区二区三区| 人人妻人人澡人人看| 高清不卡的av网站| 国产免费又黄又爽又色| 精品熟女少妇av免费看| 亚洲精品乱久久久久久| 免费日韩欧美在线观看| 久久久久久久亚洲中文字幕| 一级毛片黄色毛片免费观看视频| 亚洲av.av天堂| 99久久综合免费| 久久精品熟女亚洲av麻豆精品| 亚洲精品aⅴ在线观看| 一级片'在线观看视频| 色婷婷久久久亚洲欧美| 日韩视频在线欧美| 边亲边吃奶的免费视频| 免费大片18禁| 欧美丝袜亚洲另类| 国产成人一区二区在线| 欧美bdsm另类| 啦啦啦中文免费视频观看日本| 精品99又大又爽又粗少妇毛片| 免费av不卡在线播放| 中国三级夫妇交换| 成年人午夜在线观看视频| kizo精华| 欧美人与性动交α欧美精品济南到 | 一级毛片电影观看| 韩国av在线不卡| 欧美激情极品国产一区二区三区 | 少妇人妻 视频| 国产精品嫩草影院av在线观看| 免费少妇av软件| 国产永久视频网站| 99九九线精品视频在线观看视频| 国产精品久久久久久久久免| 九草在线视频观看| 极品人妻少妇av视频| 国产在视频线精品| 久久婷婷青草| 日产精品乱码卡一卡2卡三| 欧美日韩视频高清一区二区三区二| 国产乱来视频区| 欧美日本中文国产一区发布| 日韩不卡一区二区三区视频在线| 嫩草影院入口| 欧美变态另类bdsm刘玥| 国产精品成人在线| 日本av手机在线免费观看| 97在线人人人人妻| 肉色欧美久久久久久久蜜桃| 大码成人一级视频| 亚洲人与动物交配视频| 91精品三级在线观看| 久久精品国产自在天天线| 嫩草影院入口| av视频免费观看在线观看| 日本vs欧美在线观看视频| 高清欧美精品videossex| 午夜影院在线不卡| 欧美人与性动交α欧美精品济南到 | 一区二区三区四区激情视频| 欧美成人午夜免费资源| 人体艺术视频欧美日本| 多毛熟女@视频| 丰满饥渴人妻一区二区三| 久久鲁丝午夜福利片| 亚洲综合色惰| 在现免费观看毛片| 两个人免费观看高清视频| 欧美精品一区二区免费开放| 成人无遮挡网站| av黄色大香蕉| 大陆偷拍与自拍| 亚洲国产欧美在线一区| 三级国产精品片| 国产一区二区三区综合在线观看 | 永久免费av网站大全| a级毛片免费高清观看在线播放| 91精品国产九色| 国产男女超爽视频在线观看| 大片电影免费在线观看免费| 国产精品国产三级国产专区5o| 大香蕉久久网| 国产精品人妻久久久影院| 亚洲五月色婷婷综合| 不卡视频在线观看欧美| 中文精品一卡2卡3卡4更新| 久久精品国产亚洲网站| 黄色配什么色好看| 成人国产av品久久久| 尾随美女入室| 又大又黄又爽视频免费| 最近手机中文字幕大全| kizo精华| 菩萨蛮人人尽说江南好唐韦庄| 日韩亚洲欧美综合| av视频免费观看在线观看| 男人操女人黄网站| 午夜福利影视在线免费观看| 欧美+日韩+精品| 极品人妻少妇av视频| 下体分泌物呈黄色| 伦理电影大哥的女人| 精品久久蜜臀av无| 国产日韩欧美视频二区| 人妻制服诱惑在线中文字幕| 国产欧美另类精品又又久久亚洲欧美| 国产成人aa在线观看| 精品酒店卫生间| 一边亲一边摸免费视频| 人妻系列 视频| 黄色配什么色好看| 久久久久精品性色| 欧美人与善性xxx| 男女国产视频网站| 国产精品麻豆人妻色哟哟久久| 人妻夜夜爽99麻豆av| 综合色丁香网| 久久国产精品男人的天堂亚洲 | 高清黄色对白视频在线免费看| 国产亚洲最大av| 国产深夜福利视频在线观看| 亚洲精品aⅴ在线观看| 黄片播放在线免费| 亚洲国产毛片av蜜桃av| 26uuu在线亚洲综合色| 日本欧美国产在线视频| 欧美人与善性xxx| 国产国拍精品亚洲av在线观看| 久久久久网色| 少妇精品久久久久久久| 男女啪啪激烈高潮av片| 老司机影院成人| 久久精品国产亚洲av天美| 免费观看av网站的网址| 中文字幕最新亚洲高清| 婷婷成人精品国产| 欧美三级亚洲精品| 美女xxoo啪啪120秒动态图| 久久久久久久久久久丰满| 男女免费视频国产| 亚洲精品国产色婷婷电影| 国产在线一区二区三区精| 亚洲一区二区三区欧美精品| 亚洲婷婷狠狠爱综合网| 考比视频在线观看| 免费不卡的大黄色大毛片视频在线观看| 免费黄色在线免费观看| 亚洲av二区三区四区| 人人妻人人添人人爽欧美一区卜| 精品久久久噜噜| 免费观看a级毛片全部| 亚洲精品日本国产第一区| 最近中文字幕2019免费版| 亚洲国产精品一区三区| 一个人免费看片子| 日韩伦理黄色片| 人妻系列 视频| 肉色欧美久久久久久久蜜桃| 欧美日韩视频高清一区二区三区二| 免费人成在线观看视频色| 日韩中字成人| 黄色视频在线播放观看不卡| 亚洲人成77777在线视频| 搡老乐熟女国产| 涩涩av久久男人的天堂| 成人国产麻豆网| 婷婷色av中文字幕| 我的老师免费观看完整版| av卡一久久| 久久亚洲国产成人精品v| 五月玫瑰六月丁香| 18禁动态无遮挡网站| 亚洲激情五月婷婷啪啪| 在线 av 中文字幕| 国产熟女欧美一区二区| 黑人欧美特级aaaaaa片| 大又大粗又爽又黄少妇毛片口| 97超视频在线观看视频| 亚洲图色成人| av播播在线观看一区| 亚洲国产色片| 日本免费在线观看一区| 在线观看免费高清a一片| 日韩成人伦理影院| 欧美精品国产亚洲| 午夜福利视频在线观看免费| 精品一区二区免费观看| 香蕉精品网在线| 男人操女人黄网站| 久久精品夜色国产| 国产成人精品久久久久久| 校园人妻丝袜中文字幕| 精品一品国产午夜福利视频| 精品久久蜜臀av无| 国产亚洲av片在线观看秒播厂| 69精品国产乱码久久久| 热re99久久精品国产66热6| 制服诱惑二区| 国产欧美日韩一区二区三区在线 | 国产精品一区www在线观看| 男的添女的下面高潮视频| 简卡轻食公司| 交换朋友夫妻互换小说| 国产片特级美女逼逼视频| 成人毛片60女人毛片免费| 女性被躁到高潮视频| 成年美女黄网站色视频大全免费 | 亚洲成人av在线免费| 免费观看性生交大片5| 午夜福利,免费看| 久久人人爽av亚洲精品天堂| 伦精品一区二区三区| 青春草亚洲视频在线观看| 人妻 亚洲 视频| 一级片'在线观看视频| 精品久久久噜噜| 777米奇影视久久| 美女中出高潮动态图| 欧美精品国产亚洲| 亚洲第一av免费看| av免费在线看不卡| 涩涩av久久男人的天堂| 极品人妻少妇av视频| 99热这里只有精品一区| 婷婷色综合大香蕉| 精品99又大又爽又粗少妇毛片| 欧美bdsm另类| 女的被弄到高潮叫床怎么办| 只有这里有精品99| 国产日韩欧美视频二区| 国产黄频视频在线观看| 国产69精品久久久久777片| 国产黄频视频在线观看| 97精品久久久久久久久久精品| 国产黄色免费在线视频| 黄色视频在线播放观看不卡| 亚洲av欧美aⅴ国产| 免费日韩欧美在线观看| 午夜福利在线观看免费完整高清在| 热99国产精品久久久久久7| 成年美女黄网站色视频大全免费 | 国产一区二区三区综合在线观看 | 国产成人av激情在线播放 | 黄色毛片三级朝国网站| 高清视频免费观看一区二区| 9色porny在线观看| 欧美+日韩+精品| 最近中文字幕高清免费大全6| 亚洲,欧美,日韩| 天美传媒精品一区二区| 日韩,欧美,国产一区二区三区| 国产黄片视频在线免费观看| 精品酒店卫生间| 少妇猛男粗大的猛烈进出视频| 日韩,欧美,国产一区二区三区| 久久97久久精品| 免费大片黄手机在线观看| 国产高清有码在线观看视频| 国产成人精品福利久久| 美女福利国产在线| videosex国产| 国语对白做爰xxxⅹ性视频网站| 全区人妻精品视频| 亚洲综合精品二区| 免费观看在线日韩| 国产精品一区www在线观看| 91久久精品电影网| 韩国av在线不卡| 街头女战士在线观看网站| 亚洲精品中文字幕在线视频| 亚洲色图 男人天堂 中文字幕 | 久久久久久久精品精品| 在线精品无人区一区二区三| 亚洲av电影在线观看一区二区三区| 午夜影院在线不卡| 亚洲av.av天堂| 国产免费又黄又爽又色| 精品久久久久久久久av| 国产成人午夜福利电影在线观看| 欧美日韩视频高清一区二区三区二| 不卡视频在线观看欧美| 一二三四中文在线观看免费高清| 夫妻性生交免费视频一级片| 国模一区二区三区四区视频| 亚洲欧美一区二区三区黑人 | 在线观看免费日韩欧美大片 | 男人操女人黄网站| 国产在线一区二区三区精| xxx大片免费视频| 久久精品熟女亚洲av麻豆精品| 国产亚洲最大av| 免费看光身美女| 夜夜骑夜夜射夜夜干| 欧美精品一区二区大全|