Effective Intrusion Detection System Using XGBoost

被引:256
作者
Dhaliwal, Sukhpreet Singh [1 ]
Abdullah-Al Nahid [1 ]
Abbas, Robert [1 ]
机构
[1] Macquarie Univ, Sch Engn, Sydney, NSW 2109, Australia
关键词
classifiers; eXtreme Gradient Boosting (XGBoost); intrusion detection system (IDS); network socket layer-knowledge discovery in databases (NSL-KDD);
D O I
10.3390/info9070149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the world is on the verge of venturing into fifth-generation communication technology and embracing concepts such as virtualization and cloudification, the most crucial aspect remains "security", as more and more data get attached to the internet. This paper reflects a model designed to measure the various parameters of data in a network such as accuracy, precision, confusion matrix, and others. XGBoost is employed on the NSL-KDD (network socket layer-knowledge discovery in databases) dataset to get the desired results. The whole motive is to learn about the integrity of data and have a higher accuracy in the prediction of data. By doing so, the amount of mischievous data floating in a network can be minimized, making the network a secure place to share information. The more secure a network is, the fewer situations where data is hacked or modified. By changing various parameters of the model, future research can be done to get the most out of the data entering and leaving a network. The most important player in the network is data, and getting to know it more closely and precisely is half the work done. Studying data in a network and analyzing the pattern and volume of data leads to the emergence of a solid Intrusion Detection System (IDS), that keeps the network healthy and a safe place to share confidential information.
引用
收藏
页数:24
相关论文
共 33 条
[1]  
[Anonymous], 2013, DETAILED ANAL NSL KD
[2]  
Ardjani F., 2010, INT J MODERN ED COMP
[3]  
Brownlee J, GENTLE INTRO XGBOOST
[4]  
Brownlee J, 2016, MACHINE LEARNING MAS, Vfirst
[5]   Automatic network intrusion detection: Current techniques and open issues [J].
Catania, Carlos A. ;
Garcia Garino, Carlos .
COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) :1062-1072
[6]  
Chauhan H., 2013, P 2013 INT S COMP BU
[7]  
Chen T., 2016, P 22 ACM SIGKDD INT, DOI [10.1145/2939672.2939785, DOI 10.1145/2939672.2939785]
[8]  
Chiu C., 2010, P IND C DAT MIN BERL
[9]  
Cisco, 2010, ZON BAS POL FIR DES
[10]  
Ektefa Mohammadreza, 2010, Proceedings of the 2010 International Conference on Information Retrieval and Knowledge Management (CAMP 2010), P200, DOI 10.1109/INFRKM.2010.5466919