z-logo
open-access-imgOpen Access
Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base
Author(s) -
Zhang BangCheng,
Hu GuanYu,
Zhou ZhiJie,
Zhang YouMin,
Qiao PeiLi,
Chang LeiLei
Publication year - 2017
Publication title -
etri journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.295
H-Index - 46
eISSN - 2233-7326
pISSN - 1225-6463
DOI - 10.4218/etrij.17.0116.0305
Subject(s) - directed acyclic graph , computer science , intrusion detection system , directed graph , constraint (computer aided design) , data mining , artificial intelligence , algorithm , mathematics , geometry
Intrusion detection is very important for network situation awareness. While a few methods have been proposed to detect network intrusion, they cannot directly and effectively utilize semi‐quantitative information consisting of expert knowledge and quantitative data. Hence, this paper proposes a new detection model based on a directed acyclic graph ( DAG ) and a belief rule base ( BRB ). In the proposed model, called DAG ‐ BRB , the DAG is employed to construct a multi‐layered BRB model that can avoid explosion of combinations of rule number because of a large number of types of intrusion. To obtain the optimal parameters of the DAG ‐ BRB model, an improved constraint covariance matrix adaption evolution strategy ( CMA ‐ ES ) is developed that can effectively solve the constraint problem in the BRB . A case study was used to test the efficiency of the proposed DAG ‐ BRB . The results showed that compared with other detection models, the DAG ‐ BRB model has a higher detection rate and can be used in real networks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here