Skip to main content

Campus Network Intrusion Detection Method Based on Convolutional Neural Network in Big Data Environment

  • Conference paper
  • First Online:
  • 1049 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 136))

Abstract

In the big data (BD) environment, network intrusion detection (NID) technology has become a research hotspot at home and abroad. As one of the important components of the computer system network, the campus network (CN) has attracted more and more attention to its security risks. How to effectively prevent CN viruses from invading other places and ensuring normal operation has become one of the current topics that need to be solved and valued urgently. With the rapid development of computer technology, CN is essential for teachers and students to study and live in school. There are a large number of information resources in the campus, various professional classrooms and other public areas for information sharing through the CN. As a deep learning algorithm, convolutional neural network (CCN) can simulate the multi-layer neural network structure of the human brain to understand complex information. This paper adopts experimental analysis method and data analysis method, and intends to construct a CN intrusion detection (CNID) model CNN-IDM based on CCN through experimental research, so as to improve the efficiency of CNID. According to the experimental results, the model detection accuracy rate of this experiment is higher than other methods and models, and the false alarm rate is also far lower than other methods. It has good detection performance and can meet the basic needs of CNID.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Farahat, A., Reichert, C., Sweeney-Reed, C.M., et al.: Convolutional neural networks for decoding of covert attention focus and saliency Maps for EEG feature visualization. J. Neural Eng. 16(6), 066010.1–066010.14 (2019)

    Google Scholar 

  2. Kanji, T.: Deformable map matching to handle uncertain loop-less maps. J. Adv. Comput. Intell. Intell. Inf. 22(6), 915–923 (2018)

    Article  Google Scholar 

  3. Chowdary, V.S., Teja, G.P.S., Mounesh, D., et al.: Sign board recognition based on convolutional neural network using Yolo-3. J. Comput. Theor. Nanosci. 17(8), 3478–3483 (2020)

    Article  Google Scholar 

  4. Hatano, K., et al.: Classification of osteoporosis from phalanges computed radiography images based on convolutional neural network. Med. Imaging Inf. Sci. 36(2), 72–76 (2019)

    Google Scholar 

  5. Majeed, H.D.: Text detection on images using region-based convolutional neural network. UHD J. Sci. Technol. 4(2), 40 (2020)

    Article  Google Scholar 

  6. Kim, M., Shin, J.H.: A development of vision-based defect detection methodology using transfer learning of convolutional neural network. Korean J. Comput. Des. Eng. 25(3), 246–255 (2020)

    Article  Google Scholar 

  7. Basumallik, S., Ma, R., Eftekharnejad, S.: Packet-data anomaly detection in PMU-based state estimator using convolutional neural network. Int. J. Electr. Power Energy Syst. 107(MAY), 690–702 (2018)

    Google Scholar 

  8. Mondaeev, M., Anker, T., Meyouhas, Y.: Method and apparatus for deep packet inspection for network intrusion detection. Water Air Soil Pollut. 156(1), 163–193 (2018)

    Google Scholar 

  9. Aziz, A.S.A., Sanaa, E.L., Hassanien, A.E.: comparison of classification techniques applied for network intrusion detection and classification. J. Appl. Logic 24(pt.a),109–118 (2017)

    Google Scholar 

  10. Alagrash, Y., Drebee, A., Zirjawi, N.: Comparing the area of data mining algorithms in network intrusion detection. J. Inf. Secur. 11(1), 1–18 (2020)

    Google Scholar 

  11. Fahad, A.M., Ahmed, A.A., Kahar, M.N.M.: Network intrusion detection framework based on whale swarm algorithm and artificial neural network in cloud computing. In: Vasant, P., Zelinka, I., Weber, G.-W. (eds.) ICO 2018. AISC, vol. 866, pp. 56–65. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-00979-3_6

    Chapter  Google Scholar 

  12. Ashiku, L., Dagli, C.: Network intrusion detection system using deep learning. Procedia Comput. Sci. 185(1), 239–247 (2021)

    Article  Google Scholar 

  13. Molina-Coronado, B., Mori, U., Mendiburu, A., et al.: Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process. IEEE Trans. Network Serv. Manage. (99), 1 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Yuan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yuan, C., Wang, Y. (2022). Campus Network Intrusion Detection Method Based on Convolutional Neural Network in Big Data Environment. In: Sugumaran, V., Sreedevi, A.G., Xu, Z. (eds) Application of Intelligent Systems in Multi-modal Information Analytics. ICMMIA 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 136. Springer, Cham. https://doi.org/10.1007/978-3-031-05237-8_117

Download citation

Publish with us

Policies and ethics