Abstract
Aiming at the problem of unknown security threats facing smart grids, Hybrid intrusion detection system supporting dynamic expansion is proposed. In the network context, network attack behaviors are detected based on network speed, protocol handshake, quintuple and other dimensions, and security response strategy deployment is automatically generated. Go to the firewall to execute. A formal method is used to analyze the Hybrid intrusion detection system supporting dynamic expansion, which verifies the feasibility of supporting the Hybrid intrusion detection system supporting dynamic expansion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shafiq, M., Tian, Z., Bashir, A.K., Du, X., Guizani, M.: CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J. 8(5), 3242–3254 (2020)
Shafiq, M., Tian, Z., Bashir, A.K., Jolfaei, A., Yu, X.: Data mining and machine learning methods for sustainable smart cities traffic classification: a survey. Sustain. Cities Soc. 60, 102177 (2020)
Alhakami, W., Alharbi, A., Bourouis, S., Alroobaea, R., Bouguila, N.: Network anomaly intrusion detection using a nonparametric bayesian approach and feature selection. IEEE Access 7, 52181–52190 (2019)
Ullah, I., Mahmoud, Q.: A two-level flow-based anomalous activity detection system for iot networks. Electronics 9(3), 530 (2020)
Singh, P., Ranga, V.: Multilayer perceptron and genetic algorithm-based intrusion detection framework for cloud environment. IEEE Commun. Mag. 1(3), 475–485 (2021)
Nobakht, M., Sivaraman, V., Boreli, R.: A Host-based intrusion detection and mitigation framework for smart home iot using openflow. In: 11th International Conference on Availability, Reliability and Security (ARES), pp. 147–156 (2016)
Papamartzivanos, D., Mármol, F., Kambourakis, G.: Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7, 13546–13560 (2019)
Khan, A.A.Z., Serpen, G.: Misuse intrusion detection using machine learning for gas pipeline scada networks. In: IEEE, Las Vegas, NV, USA (2019)
Hu, H., Liu, Y., Chen, C., Zhang, H., Liu, Y.: Optimal decision making approach for cyber security defense using evolutionary game. IEEE Trans. Netw. Serv. Manage. 17(3), 1683–1700 (2020)
Vieira, K., Koch, F.L., Sobral, J.B.M., Westphall, C.B., Leão, J.L.D.S.: Autonomic intrusion detection and response using big data. IEEE Syst. J. 14(2), 1984–1991 (1984)
Chkirbene, Z., Erbad, A., Hamila, R., Mohamed, A., Guizani, M., Hamdi, M.: TIDCS: a dynamic intrusion detection and classification system based feature selection. IEEE Access 8, 95864–95877 (2020)
Sharma, R.K., Issac, B., Kalita, H.K.: Intrusion detection and response system inspired by the defense mechanism of plants. IEEE Access 7, 52427–52439 (2019)
Pan, M., et al.: DHPA: dynamic human preference analytics framework-a case study on taxi drivers’ learning curve analysis. ACM Trans. Intell. Syst. Technol. 11(1), 1–19 (2020)
Lu, H., Jin, C., Helu, X., Zhu, C., Guizani, N., Tian, Z.: AutoD: intelligent blockchain application unpacking based on jni layer deception call. IEEE Network 35(2), 215–221 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Liang, H. et al. (2022). Hybrid Intrusion Detection System Supporting Dynamic Expansion. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2022. Communications in Computer and Information Science, vol 1588. Springer, Cham. https://doi.org/10.1007/978-3-031-06764-8_54
Download citation
DOI: https://doi.org/10.1007/978-3-031-06764-8_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06763-1
Online ISBN: 978-3-031-06764-8
eBook Packages: Computer ScienceComputer Science (R0)