Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier

被引:6
作者
Chen, Zhiyan [1 ]
Simsek, Murat [1 ]
Kantarci, Burak [1 ]
Bagheri, Mehran [2 ]
Djukic, Petar [3 ]
机构
[1] Univ Ottawa, 800 King Edward Ave, Ottawa, ON K1N 6N5, Canada
[2] Ciena, 5050 Innovat Dr, Ottawa, ON K2K 0J2, Canada
[3] Nokia Bell Labs, 600 March Rd, Kanata, ON K2K 2T6, Canada
关键词
Machine learning; Network security; Network intrusion detection; Hybrid intrusion detection; Feature flattening; Collaborative classifier;
D O I
10.1016/j.comnet.2024.110576
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDS) have been extensively investigated by monitoring real network traffic and analyzing suspicious activities. However, there are limitations in detecting specific types of attacks with NIDS, such as Advanced Persistent Threats (APT). Additionally, NIDS is restricted in observing complete traffic information due to encrypted traffic or a lack of authority. To address these limitations, a Host-based Intrusion Detection system (HIDS) evaluates resources in the host, including logs, files, and folders, to identify APT attacks that routinely inject malicious files into victimized nodes. In this study, a hybrid network intrusion detection system that combines NIDS and HIDS is proposed to improve intrusion detection performance. The host data undergoes a Language Processing (NLP)-based Bidirectional Encoder Representations from Transformers (BERT) model from textual representation to a numerical one in order to process host data in a similar way to the network flow data through machine learning models. The feature flattening technique is applied to flatten two-dimensional host-based features that is provided by BERT into one-dimensional vectors so that host-based and network flow-based features can be processed by advanced Machine Learning (ML) models. In order to enhance HIDS effectiveness, a two-stage collaborative classifier is utilized, which applies two tiers of machine learning algorithms, binary and multi-class classifiers, to detect network intrusions. Once a binary classifier is used to detect benign samples to reduce the complexity of the original problem, the attack data are classified by a multi-class supervised learner to identify attack types. Hence, the overall performance of the two-stage collaborative model outperforms the baseline classifier, XGBoost. The proposed method is shown to generalize across two well-known datasets, CICIDS 2018 and NDSec-1. The performance of XGBoost, which represents conventional ML, is evaluated. Combining host and network features enhances attack detection performance (macro average F1 score) by 8.1% under the CICIDS 2018 dataset and 3.7% under the NDSec-1 dataset. Meanwhile, the two-stage collaborative classifier improves detection performance for most single classes, especially for DoS-LOIC-UDP and DoS-SlowHTTPTest, with improvements of 30.7% and 84.3%, respectively, when compared with the traditional ML models.
引用
收藏
页数:15
相关论文
共 64 条
[1]   Principal component analysis [J].
Abdi, Herve ;
Williams, Lynne J. .
WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (04) :433-459
[2]   Brain Tumor Classification Using Convolutional Neural Network [J].
Abiwinanda, Nyoman ;
Hanif, Muhammad ;
Hesaputra, S. Tafwida ;
Handayani, Astri ;
Mengko, Tati Rajab .
WORLD CONGRESS ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING 2018, VOL 1, 2019, 68 (01) :183-189
[3]  
Abu Al-haija Qasem, 2022, Soft Computing for Security Applications: Proceedings of ICSCS 2021. Advances in Intelligent Systems and Computing (1397), P27, DOI 10.1007/978-981-16-5301-8_3
[4]   An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning [J].
Abu Alghanam, Orieb ;
Almobaideen, Wesam ;
Saadeh, Maha ;
Adwan, Omar .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
[5]  
Albawi S, 2017, I C ENG TECHNOL
[6]  
[Anonymous], 1999, Random selection in politics
[7]  
Beer F., 2017, A new attack composition for network security, V10, P11
[8]  
Chen Z., 2021, 2021 IEEE GLOB COMM, P01
[9]   Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats [J].
Chen, Zhiyan ;
Liu, Jinxin ;
Shen, Yu ;
Simsek, Murat ;
Kantarci, Burak ;
Mouftah, Hussein T. ;
Djukic, Petar .
ACM COMPUTING SURVEYS, 2023, 55 (05)
[10]   Distributed denial of service attack prediction: Challenges, open issues and opportunities [J].
de Neira, Anderson Bergamini ;
Kantarci, Burak ;
Nogueira, Michele .
COMPUTER NETWORKS, 2023, 222