Skip to main content

Hybrid Intrusion Detection System Supporting Dynamic Expansion

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1588))

Included in the following conference series:

  • 913 Accesses

Abstract

Aiming at the problem of unknown security threats facing smart grids, Hybrid intrusion detection system supporting dynamic expansion is proposed. In the network context, network attack behaviors are detected based on network speed, protocol handshake, quintuple and other dimensions, and security response strategy deployment is automatically generated. Go to the firewall to execute. A formal method is used to analyze the Hybrid intrusion detection system supporting dynamic expansion, which verifies the feasibility of supporting the Hybrid intrusion detection system supporting dynamic expansion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shafiq, M., Tian, Z., Bashir, A.K., Du, X., Guizani, M.: CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J. 8(5), 3242–3254 (2020)

    Article  Google Scholar 

  2. Shafiq, M., Tian, Z., Bashir, A.K., Jolfaei, A., Yu, X.: Data mining and machine learning methods for sustainable smart cities traffic classification: a survey. Sustain. Cities Soc. 60, 102177 (2020)

    Article  Google Scholar 

  3. Alhakami, W., Alharbi, A., Bourouis, S., Alroobaea, R., Bouguila, N.: Network anomaly intrusion detection using a nonparametric bayesian approach and feature selection. IEEE Access 7, 52181–52190 (2019)

    Article  Google Scholar 

  4. Ullah, I., Mahmoud, Q.: A two-level flow-based anomalous activity detection system for iot networks. Electronics 9(3), 530 (2020)

    Article  Google Scholar 

  5. Singh, P., Ranga, V.: Multilayer perceptron and genetic algorithm-based intrusion detection framework for cloud environment. IEEE Commun. Mag. 1(3), 475–485 (2021)

    Google Scholar 

  6. Nobakht, M., Sivaraman, V., Boreli, R.: A Host-based intrusion detection and mitigation framework for smart home iot using openflow. In: 11th International Conference on Availability, Reliability and Security (ARES), pp. 147–156 (2016)

    Google Scholar 

  7. Papamartzivanos, D., Mármol, F., Kambourakis, G.: Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7, 13546–13560 (2019)

    Article  Google Scholar 

  8. Khan, A.A.Z., Serpen, G.: Misuse intrusion detection using machine learning for gas pipeline scada networks. In: IEEE, Las Vegas, NV, USA (2019)

    Google Scholar 

  9. Hu, H., Liu, Y., Chen, C., Zhang, H., Liu, Y.: Optimal decision making approach for cyber security defense using evolutionary game. IEEE Trans. Netw. Serv. Manage. 17(3), 1683–1700 (2020)

    Article  Google Scholar 

  10. Vieira, K., Koch, F.L., Sobral, J.B.M., Westphall, C.B., Leão, J.L.D.S.: Autonomic intrusion detection and response using big data. IEEE Syst. J. 14(2), 1984–1991 (1984)

    Article  Google Scholar 

  11. Chkirbene, Z., Erbad, A., Hamila, R., Mohamed, A., Guizani, M., Hamdi, M.: TIDCS: a dynamic intrusion detection and classification system based feature selection. IEEE Access 8, 95864–95877 (2020)

    Article  Google Scholar 

  12. Sharma, R.K., Issac, B., Kalita, H.K.: Intrusion detection and response system inspired by the defense mechanism of plants. IEEE Access 7, 52427–52439 (2019)

    Article  Google Scholar 

  13. Pan, M., et al.: DHPA: dynamic human preference analytics framework-a case study on taxi drivers’ learning curve analysis. ACM Trans. Intell. Syst. Technol. 11(1), 1–19 (2020)

    Article  Google Scholar 

  14. Lu, H., Jin, C., Helu, X., Zhu, C., Guizani, N., Tian, Z.: AutoD: intelligent blockchain application unpacking based on jni layer deception call. IEEE Network 35(2), 215–221 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fanyao Meng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liang, H. et al. (2022). Hybrid Intrusion Detection System Supporting Dynamic Expansion. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2022. Communications in Computer and Information Science, vol 1588. Springer, Cham. https://doi.org/10.1007/978-3-031-06764-8_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06764-8_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06763-1

  • Online ISBN: 978-3-031-06764-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics