A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection

被引:1
|
作者
Patel, N. D. [1 ,2 ]
Mehtre, B. M. [1 ]
Wankar, Rajeev [2 ]
机构
[1] Inst Dev & Res Banking Technol IDRBT, Ctr Excellence Cyber Secur CoECS, Castle Hills,Rd 1,Masab Tank, Hyderabad 500057, Telangana, India
[2] Univ Hyderabad, Sch Comp & Informat Sci SCIS, Hyderabad 500046, Telangana, India
关键词
Network Intrusion Detection; Dimensionality Reduction; IDS Datasets; Feature Selection; Classification; Supervised Learning; DEEP LEARNING APPROACH; ANOMALY DETECTION;
D O I
10.1007/s10207-023-00792-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An intrusion detection system (IDS) is a system that monitors network traffic for malicious activity and generates alerts. In anomaly-based detection, machine learning (ML) algorithms exploit various statistical and probabilistic methods to learn from past or historical experience and detect valuable patterns from large, unstructured, and complex datasets. ML-based network intrusion detection aims to identify malicious behavior and alert a system administrator when an intruder tries to penetrate the network. This paper deals with the study, strategic construction, and implementation of a network intrusion detection model based on ML methods. Among the available IDS datasets, five of the most relevant are chosen for the experimental analysis, which are NSL-KDD-2009, CIC-IDS2017, CIC-IDS2018, IoTID20, and UNSW-NB15 datasets. In order to reduce the computation time in the training sample and achieve computational complexity O(N2.38 +/-delta)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(N<^>{2.38 \pm \delta })$$\end{document}, we propose a computationally efficient and feasible algorithmic framework for analyzing the network traffic data. The developed approach mainly consists of two phases, i.e., "Scatter Matrices and Eigenvalue Computation based feature Selection" and "Classification procedure for the reduced dimension data." Experimental evaluation of various test case scenarios for the chosen datasets is carried out in the simulation setting. It is observed that the test results outperform the existing intrusion detection methods for detecting certain attack categories.
引用
收藏
页码:2457 / 2487
页数:31
相关论文
共 50 条
  • [1] Dimensionality Reduction and Visualization of Network Intrusion Detection Data
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 441 - 455
  • [2] NETWORK INTRUSION DETECTION SYSTEMS USING SUPERVISED MACHINE LEARNING CLASSIFICATION AND DIMENSIONALITY REDUCTION TECHNIQUES: A SYSTEMATIC REVIEW
    Ashi, Zein
    Aburashed, Laila
    Al-Qudah, Mahmoud
    Qusef, Abdallah
    JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2021, 7 (04): : 373 - 390
  • [3] A Hybrid Metaheuristic Algorithm for Features Dimensionality Reduction in Network Intrusion Detection System
    Balogun, Bukola Fatimah
    Gbolagade, Kazeem Alagbe
    Arowolo, Micheal Olaolu
    Saheed, Yakub Kayode
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT IX, 2021, 12957 : 101 - 114
  • [4] Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
    Salo, Fadi
    Nassif, Ali Bou
    Essex, Aleksander
    COMPUTER NETWORKS, 2019, 148 : 164 - 175
  • [5] Reduction of false positives in network intrusion detection using a hybrid classification approach
    Shreevyas H.M.
    Ravikumar G.K.
    Shobha B.N.
    International Journal of Vehicle Information and Communication Systems, 2022, 7 (02) : 199 - 209
  • [6] Use of dimensionality reduction for intrusion detection
    Dash, Subrat Kumar
    Rawat, Sanjay
    Pujari, Arun K.
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 306 - +
  • [7] IoT Bonet and Network Intrusion Detection using Dimensionality Reduction and Supervised Machine Learning
    Desai, Madhuri Gurunathrao
    Shi, Yong
    Suo, Kun
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 316 - 322
  • [8] A computationally efficient engine for flexible intrusion detection
    Baker, ZK
    Prasanna, VK
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2005, 13 (10) : 1179 - 1189
  • [9] Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection
    Abdulhammed, Razan
    Musafer, Hassan
    Alessa, Ali
    Faezipour, Miad
    Abuzneid, Abdelshakour
    ELECTRONICS, 2019, 8 (03)
  • [10] A Feature Clustering Approach for Dimensionality Reduction and Classification
    VinayKumar, Kotte
    Srinivasan, R.
    Singh, Elijah Blessing
    MENDEL 2015: RECENT ADVANCES IN SOFT COMPUTING, 2015, 378 : 257 - 268