Intelligent Network Awareness

In the network, different applications produce various traffic types with diverse features and service requirements. Therefore, in order to better manage and control networking, the intelligent awareness of network traffic plays a significant role. Network traffic information mainly includes service-level information (e.g., QoS/QoE), anomaly traffic detection information, etc. In this chapter, we first present a multi-level intrusion detection model framework named MSML to address these issues. The MSML framework includes four modules: pure cluster extraction, pattern discovery, fine-grained classification and model updating. Then, we propose a novel IDS framework called HMLD to address these issues, which is an exquisitely designed framework based on Hybrid Multi-Level Data Mining. In addition, we propose a new model based on big data analysis, which can avoid the influence brought by adjustment of network traffic distribution, increase detection accuracy and reduce the false negative rate. Finally, we propose an end-to-end IoT traffic classification method relying on deep learning aided capsule network for the sake of forming an efficient classification mechanism that integrates feature extraction, feature selection and classification model. Our proposed traffic classification method beneficially eliminates the process of manually selecting traffic features, and is particularly applicable to smart city scenarios.

[1]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[2]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[3]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[4]  Haipeng Yao,et al.  NetworkAI: An Intelligent Network Architecture for Self-Learning Control Strategies in Software Defined Networks , 2018, IEEE Internet of Things Journal.

[5]  Jie Wu,et al.  Robust Network Traffic Classification , 2015, IEEE/ACM Transactions on Networking.

[6]  Haipeng Yao,et al.  The Space-Terrestrial Integrated Network: An Overview , 2018, IEEE Communications Magazine.

[7]  Trevor Hastie,et al.  An Introduction to Statistical Learning , 2013, Springer Texts in Statistics.

[8]  J. Alberto Espinosa,et al.  Big Data: Issues and Challenges Moving Forward , 2013, 2013 46th Hawaii International Conference on System Sciences.

[9]  Victor C. M. Leung,et al.  Learning-Aided Network Association for Hybrid Indoor LiFi-WiFi Systems , 2018, IEEE Transactions on Vehicular Technology.

[10]  Keith W. Miller,et al.  Big Data: New Opportunities and New Challenges [Guest editors' introduction] , 2013, Computer.

[11]  Haipeng Yao,et al.  Virtual Network Embedding Based on the Degree and Clustering Coefficient Information , 2016, IEEE Access.

[12]  Ning Ge,et al.  Non-Orthogonal Multiple Access Based Integrated Terrestrial-Satellite Networks , 2017, IEEE Journal on Selected Areas in Communications.

[13]  Jianhua Lu,et al.  Two-Phase Task Scheduling in Data Relay Satellite Systems , 2018, IEEE Transactions on Vehicular Technology.

[14]  Xi Chen,et al.  Radio Resource Management in Future Terrestrial-Satellite Communication Networks , 2017, IEEE Wireless Communications.

[15]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[16]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[17]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[18]  Liang He,et al.  An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm , 2014, J. Networks.

[19]  Xu Chen,et al.  A novel reinforcement learning algorithm for virtual network embedding , 2018, Neurocomputing.

[20]  H. Vincent Poor,et al.  Community-Structured Evolutionary Game for Privacy Protection in Social Networks , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Wathiq Laftah Al-Yaseen,et al.  Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..

[22]  Haipeng Yao,et al.  Virtual network embedding based on modified genetic algorithm , 2019, Peer-to-Peer Netw. Appl..

[23]  Wei Fan,et al.  Mining big data: current status, and forecast to the future , 2013, SKDD.

[24]  Jun Du,et al.  Contract Design for Traffic Offloading and Resource Allocation in Heterogeneous Ultra-Dense Networks , 2017, IEEE Journal on Selected Areas in Communications.

[25]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[26]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[27]  Sam Kwong,et al.  Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.

[28]  Charles Elkan,et al.  Results of the KDD'99 classifier learning , 2000, SKDD.

[29]  Chunxiao Jiang,et al.  DYWAMIT: Asynchronous Wideband Dynamic Spectrum Sensing and Access System , 2017, IEEE Systems Journal.

[30]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[31]  Simon Fong,et al.  DBSCAN: Past, present and future , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).

[32]  Haipeng Yao,et al.  MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System , 2019, IEEE Internet of Things Journal.

[33]  Mark Goadrich,et al.  The relationship between Precision-Recall and ROC curves , 2006, ICML.

[34]  Xu Rongsheng,et al.  Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework , 2006, 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06).

[35]  Shankar Chakraborty,et al.  A knowledge-based system for end mill selection , 2016 .

[36]  Haipeng Yao,et al.  Virtual Network Embedding Using Node Multiple Metrics Based on Simplified ELECTRE Method , 2018, IEEE Access.

[37]  Haipeng Yao,et al.  A feature selection method based on synonym merging in text classification system , 2017, EURASIP J. Wirel. Commun. Netw..

[38]  Miran Brezocnik,et al.  Genetic Based Approach to Predicting the Elongation of Drawn Alloy , 2015 .

[39]  Bernhard Pfahringer,et al.  Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.

[40]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[41]  Zhu Han,et al.  Internet of Vehicles: Sensing-Aided Transportation Information Collection and Diffusion , 2018, IEEE Transactions on Vehicular Technology.

[42]  Jaideep Srivastava,et al.  Intrusion Detection: A Survey , 2005 .

[43]  Zhu Han,et al.  Taking Drones to the Next Level: Cooperative Distributed Unmanned-Aerial-Vehicular Networks for Small and Mini Drones , 2017, IEEE Vehicular Technology Magazine.

[44]  G. D. Yu,et al.  Multi-Objective Rescheduling Model for Product Collaborative Design Considering Disturbance , 2014 .

[45]  Nik Bessis,et al.  A Survey of Intrusion Detection Systems for Mobile Ad Hoc Networks , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[46]  Jugal K. Kalita,et al.  MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method , 2014, Comput. J..

[47]  Maurice K. Wong,et al.  Algorithm AS136: A k-means clustering algorithm. , 1979 .

[48]  Jianhua Lu,et al.  Cooperative Multigroup Multicast Transmission in Integrated Terrestrial-Satellite Networks , 2018, IEEE Journal on Selected Areas in Communications.

[49]  Lajos Hanzo,et al.  Vehicular Sensing Networks in a Smart City: Principles, Technologies and Applications , 2018, IEEE Wireless Communications.

[50]  Hari Om,et al.  A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).

[51]  Carey L. Williamson,et al.  Offline/realtime traffic classification using semi-supervised learning , 2007, Perform. Evaluation.

[52]  Jun Du,et al.  Secure Satellite-Terrestrial Transmission Over Incumbent Terrestrial Networks via Cooperative Beamforming , 2018, IEEE Journal on Selected Areas in Communications.

[53]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[54]  Michael Y. Hu,et al.  Forecasting with artificial neural networks: The state of the art , 1997 .

[55]  Sheng Wu,et al.  Topology based reliable virtual network embedding from a QoE perspective , 2018, China Communications.

[56]  Haipeng Yao,et al.  Big Data Analytics in Mobile Cellular Networks , 2016, IEEE Access.

[57]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..