Paper
11 October 2023 Research on network intrusion detection based on SMOTEENN and improved CatBoost algorithm
Huoming Zhang, Yinhui Zhang, Pinglan Lu, Cheng Wang
Author Affiliations +
Proceedings Volume 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023); 128001U (2023) https://doi.org/10.1117/12.3003918
Event: 6th International Conference on Computer Information Science and Application Technology (CISAT 2023), 2023, Hangzhou, China
Abstract
To address the problems of network intrusion data imbalance and prediction accuracy, a network intrusion detection model based on SMOTEENN (Synthetic Minority Oversampling Technique Edited Nearest Neighbor) and improved CatBoost algorithm is proposed, and SMOTEENN sampling is used to solve the data imbalance problem from the data level. The original CatBoost algorithm loss function is replaced with focal loss function to enhance the classification performance of CatBoost algorithm from the level of sample classification difficulty. And the Bayesian optimization algorithm is used to realize the CatBoost hyperparameter combination seeking. The network intrusion dataset NSL-KDD (National Security Letter Knowledge Discovery in Database) is input to the improved model and compared with other similar algorithms. The results show that the proposed method in this paper is optimal in terms of accuracy, F1-sacore, and AP value, To provide new ideas for network intrusion algorithm research.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Huoming Zhang, Yinhui Zhang, Pinglan Lu, and Cheng Wang "Research on network intrusion detection based on SMOTEENN and improved CatBoost algorithm", Proc. SPIE 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), 128001U (11 October 2023); https://doi.org/10.1117/12.3003918
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Mathematical optimization

Performance modeling

Education and training

Computer intrusion detection

Statistical modeling

Detection and tracking algorithms

Back to Top