An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms

被引:3
作者
Arik, Ahmet Okan [1 ]
Cavdaroglu, Gulsum Cigdem [2 ]
机构
[1] Istanbul Univ, Istanbul, Turkiye
[2] Isik Univ, Fac Econ Adm & Social Sci, Dept Informat Technol, Istanbul, Turkiye
来源
ACTA INFOLOGICA | 2023年 / 7卷 / 01期
关键词
Machine learning; cyber security; intrusion detection system; imbalanced data; gradient boosting; SMOTE;
D O I
10.26650/acin.1222890
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security. As demand for cybersecurity assurance increases, the requirement for intrusion detection systems to meet current threats is also growing. However, network-based intrusion detection systems have several shortcomings due to the structure of the systems, the nature of the network data, and uncertainty related to future data. The imbalanced class problem is also crucial since it significantly negatively affects classification performance. Although high performance has been achieved in deep learning-based methodologies in recent years, machine learning techniques may also provide high performance in network intrusion detection. This study suggests a new intrusion detection system called ROGONG-IDS (Robust Gradient Boosting - Intrusion Detection System) which has a unique two-stage resampling model to solve the imbalanced class problem that produces high accuracy on the UNSW-NB15 dataset using machine learning techniques. ROGONG-IDS is based on gradient boosting. The system uses Synthetic Minority Over-Sampling Technique (SMOTE) and NearMiss-1 methods to handle the imbalanced class problem. The proposed model's performance on multi-class classification was tested with the UNSW-NB15, and then its robust structure was validated with the NSL-KDD dataset. ROGONG-IDS reached the highest attack detection rate and F1 score in the literature, with a 97.30% detection rate and 97.65% F1 score using the UNSW-NB15 dataset. ROGONG-IDS provides a robust, efficient intrusion detection system for the UNSW-NB15 dataset, which suffered from imbalanced class distribution. The proposed methodology outperforms state-of-the-art and intrusion detection methods.
引用
收藏
页码:125 / 138
页数:14
相关论文
共 31 条
[1]   Multi-Channel Deep Feature Learning for Intrusion Detection [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
Di Mauro, Nicola ;
Loglisci, Corrado ;
Malerba, Donato .
IEEE ACCESS, 2020, 8 :53346-53359
[2]  
[Anonymous], 2021, Ericsson Mobility Report
[3]   Performance evaluation of intrusion detection based on machine learning using Apache Spark [J].
Belouch, Mustapha ;
El Hadaj, Salah ;
Idhammad, Mohamed .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :1-6
[4]   Hyperopt: A Python library for model selection and hyperparameter optimization [J].
Bergstra, James ;
Komer, Brent ;
Eliasmith, Chris ;
Yamins, Dan ;
Cox, David D .
Computational Science and Discovery, 2015, 8 (01)
[5]  
Bergstra J., 2011, Advances in Neural Information Processing Systems, V24, P2546
[6]  
Bergstra J, 2012, J MACH LEARN RES, V13, P281
[7]   Network Intrusion Detection System Using Random Forest and Decision Tree Machine Learning Techniques [J].
Bhavani, T. Tulasi ;
Rao, M. Kameswara ;
Reddy, A. Manohar .
FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 :637-643
[8]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[9]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[10]  
Chkirbene Zina, 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), P163, DOI 10.1109/ICIoT48696.2020.9089575