A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection

被引:1
|
作者
Patel, N. D. [1 ,2 ]
Mehtre, B. M. [1 ]
Wankar, Rajeev [2 ]
机构
[1] Inst Dev & Res Banking Technol IDRBT, Ctr Excellence Cyber Secur CoECS, Castle Hills,Rd 1,Masab Tank, Hyderabad 500057, Telangana, India
[2] Univ Hyderabad, Sch Comp & Informat Sci SCIS, Hyderabad 500046, Telangana, India
关键词
Network Intrusion Detection; Dimensionality Reduction; IDS Datasets; Feature Selection; Classification; Supervised Learning; DEEP LEARNING APPROACH; ANOMALY DETECTION;
D O I
10.1007/s10207-023-00792-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An intrusion detection system (IDS) is a system that monitors network traffic for malicious activity and generates alerts. In anomaly-based detection, machine learning (ML) algorithms exploit various statistical and probabilistic methods to learn from past or historical experience and detect valuable patterns from large, unstructured, and complex datasets. ML-based network intrusion detection aims to identify malicious behavior and alert a system administrator when an intruder tries to penetrate the network. This paper deals with the study, strategic construction, and implementation of a network intrusion detection model based on ML methods. Among the available IDS datasets, five of the most relevant are chosen for the experimental analysis, which are NSL-KDD-2009, CIC-IDS2017, CIC-IDS2018, IoTID20, and UNSW-NB15 datasets. In order to reduce the computation time in the training sample and achieve computational complexity O(N2.38 +/-delta)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(N<^>{2.38 \pm \delta })$$\end{document}, we propose a computationally efficient and feasible algorithmic framework for analyzing the network traffic data. The developed approach mainly consists of two phases, i.e., "Scatter Matrices and Eigenvalue Computation based feature Selection" and "Classification procedure for the reduced dimension data." Experimental evaluation of various test case scenarios for the chosen datasets is carried out in the simulation setting. It is observed that the test results outperform the existing intrusion detection methods for detecting certain attack categories.
引用
收藏
页码:2457 / 2487
页数:31
相关论文
共 50 条
  • [21] A Hybrid Approach for Network Intrusion Detection
    Mehmood, Mavra
    Javed, Talha
    Nebhen, Jamel
    Abbas, Sidra
    Abid, Rabia
    Bojja, Giridhar Reddy
    Rizwan, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 91 - 107
  • [22] An efficient network intrusion detection
    Chen, Chia-Mei
    Chen, Ya-Lin
    Lin, Hsiao-Chung
    COMPUTER COMMUNICATIONS, 2010, 33 (04) : 477 - 484
  • [23] A network intrusion detection framework on sparse deep denoising auto-encoder for dimensionality reduction
    B. A. Manjunatha
    K. Aditya Shastry
    E. Naresh
    Piyush Kumar Pareek
    Kadiri Thirupal Reddy
    Soft Computing, 2024, 28 : 4503 - 4517
  • [24] An efficient network intrusion detection approach based on deep learning
    Wang, Zhihao
    Jiang, Dingde
    Huo, Liuwei
    Yang, Wei
    WIRELESS NETWORKS, 2021,
  • [25] A network intrusion detection framework on sparse deep denoising auto-encoder for dimensionality reduction
    Manjunatha, B. A.
    Shastry, K. Aditya
    Naresh, E.
    Pareek, Piyush Kumar
    Reddy, Kadiri Thirupal
    SOFT COMPUTING, 2024, 28 (05) : 4503 - 4517
  • [26] Compression Based Classification Technique for Efficient Intrusion Detection
    Nivedha, D.
    Manikandan, G.
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 1277 - 1282
  • [27] Enhancing network intrusion detection by employing Mondrian forests to achieve multiple attack classification
    Chuang, Po-Jen
    Huang, Pang-Yu
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04)
  • [28] Adversarial Attack Detection Approach for Intrusion Detection Systems
    Degirmenci, Elif
    Ozcelik, Ilker
    Yazici, Ahmet
    IEEE ACCESS, 2024, 12 : 195996 - 196009
  • [29] Reduction Combination Determination for Efficient Microarray Data Classification with Three Stage Dimensionality Reduction Approach
    Dash, Rasmita
    Misra, B. B.
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 2, 2015, 32 : 695 - 703
  • [30] Convolutional neural network in network (CNNiN): hyperspectral image classification and dimensionality reduction
    Shamsolmoali, Pourya
    Zareapoor, Masoumeh
    Yang, Jie
    IET IMAGE PROCESSING, 2019, 13 (02) : 246 - 253