Intrusion Detection System using Aggregation of Machine Learning Algorithms

被引:1
作者
Arivarasan, K. [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
机构
[1] Indian Inst Technol, Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad, Bihar, India
[2] Univ Texas Permian Basin, Dept Comp Sci, Odessa, TX 79762 USA
[3] Univ Texas Permian Basin, Cybersecur Ctr, Odessa, TX 79762 USA
[4] Univ Jordan, KASIT, Amman, Jordan
[5] Univ Sci & Technol Beijing, Beijing, Peoples R China
来源
2022 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS, CITS | 2022年
关键词
Intrusion Detection System; Machine Learning; Logistic Regression; Decision Tree; KNN; XGBoost; Multi-Layer Perceptron; Voting;
D O I
10.1109/CITS55221.2022.9832982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of internet technologies comes the need for systems that can ensure the security of a network. An intrusion Detection System (IDS) can detect and sometimes take action against malicious network traffic. There are different types of IDS. For example, based on the detection method, it can be Signature-based IDS or Anomaly-based IDS or Hybrid IDS. In this work, multiple models are trained using various machine learning algorithms on the NSL-KDD dataset to build an efficient anomaly-based IDS that can detect malicious traffic with utmost accuracy. Supervised Learning algorithms like Logistic Regression, Decision Tree, K-Nearest Neighbour (KNN), XGBoost, Random Forest and Multilayer Perceptron (MLP) are used. At last, the Hard Voting technique is employed to increase efficiency.
引用
收藏
页码:123 / 130
页数:8
相关论文
共 22 条
[1]  
Abrar Iram, 2020, 2020 International Conference on Smart Electronics and Communication (ICOSEC), P919, DOI 10.1109/ICOSEC49089.2020.9215232
[2]  
Alotaibi B, 2016, 2016 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT)
[3]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[4]  
Committee on National Security Systems, 2015, CNSSI No. 4009
[5]   Effective Intrusion Detection System Using XGBoost [J].
Dhaliwal, Sukhpreet Singh ;
Abdullah-Al Nahid ;
Abbas, Robert .
INFORMATION, 2018, 9 (07)
[6]  
Esmaily J, 2015, 2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT)
[7]   IoT Intrusion Detection System Using Deep Learning and Enhanced Transient Search Optimization [J].
Fatani, Abdulaziz ;
Abd Elaziz, Mohamed ;
Dahou, Abdelghani ;
Al-Qaness, Mohammed A. A. ;
Lu, Songfeng .
IEEE ACCESS, 2021, 9 :123448-123464
[8]   Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset [J].
Gad, Abdallah R. ;
Nashat, Ahmed A. ;
Barkat, Tamer M. .
IEEE ACCESS, 2021, 9 :142206-142217
[9]  
Ghosh P, 2015, 2015 THIRD INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT)
[10]  
Gopika N, 2018, PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), P692, DOI 10.1109/CESYS.2018.8723980