A feature selection-driven machine learning framework for anomaly-based intrusion detection systems

被引:0
作者
Emirmahmutoglu, Emre [1 ]
Atay, Yilmaz [2 ]
机构
[1] Natl Def Univ, Alparslan Def Sci & Natl Secur Inst, Dept Cyber Secur, Ankara, Turkiye
[2] Gazi Univ, Fac Engn, Dept Comp Engn, Ankara, Turkiye
关键词
Cyber Security; Intrusion Detection System; Machine Learning; Feature Selection; Computer Networks; Classification; OPTIMIZATION; SEARCH; MODEL;
D O I
10.1007/s12083-025-01947-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In light of rapid technological developments, a marked rise in global internet usage has contributed to increased sensitive data flow across networks. This increase leads to the diversification of malicious attacks and makes cyber security requirements more evident. In order to ensure network security, intrusion detection systems stand out as an essential component. Intrusion detection systems detect suspicious and malicious activities over network traffic, allowing network administrators and experts to monitor current threats continuously. In anomaly-based systems, machine learning approaches are applied to identify abnormal attempts in network traffic. This study presents a feature selection framework for anomaly-based attack detection systems by combining machine learning and heuristic algorithms. This proposed study aims to improve the performance of IDSs in terms of both time and attack detection by selecting features with heuristic approaches. In the proposed approach, PSO, FPA, DE feature selection methods and LR, DT, RF, KNN, NB, GB, LDA, QDA, AdaBoost, and NN machine learning algorithms are used to perform anomaly-based comparative analyses on KDDCup99, NSL-KDD, UNSW-NB15, CSE-CIS-IDS2018 datasets. Analyses conducted on these datasets with various features demonstrated that models employing feature selection achieved an approximate two-hundred-percent improvement in time efficiency compared to models that did not utilize feature selection. It has been determined that DE, PSO, and FPA, which are used for feature selection, provide high-accuracy outputs when combined with different classifiers. When the analysis results are assessed according to the specified criteria, the highest F1-Score values achieved are as follows: 0.9972 for the DE method in GB, 0.9969 for the PSO method in GB, and 0.9948 for the FPA method in GB, on the KDD CUP 99 dataset. In the NSL-KDD, used as the second dataset, the DE method achieved a score of 0.9713 in GB, the PSO method reached 0.9112 in DT, and the FPA method obtained 0.9894 in RF, respectively. In the third dataset, UNSW-NB15, the DE method achieved a score of 0.9507 in DT, the PSO method reached 0.9068 in DT, and the FPA method obtained 0.8924 in NN. Finally, in the CSE-CIC-IDS2018 dataset, the highest scores achieved using the RF algorithm were 0.99986 for the DE method, 0.99989 for the PSO method, and 0.99987 for the FPA method, based on feature selection. The obtained results underscore the critical role of dataset generation processes and network traffic dynamics in enhancing the performance of intrusion detection systems. Additionally, the significance of feature selection was highlighted. These findings offer valuable insights and present opportunities for further advancements in future research.
引用
收藏
页数:28
相关论文
共 77 条
  • [51] Performance of Machine Learning-Based Multi-Model Voting Ensemble Methods for Network Threat Detection in Agriculture 4.0
    Peppes, Nikolaos
    Daskalakis, Emmanouil
    Alexakis, Theodoros
    Adamopoulou, Evgenia
    Demestichas, Konstantinos
    [J]. SENSORS, 2021, 21 (22)
  • [52] Popoola Ebenezer, 2017, International Journal of Network Security, V19, P660, DOI 10.6633/IJNS.201709.19(5).02
  • [53] Qureshi AU, 2018, COMPUT SCI ELECTR, P50, DOI 10.1109/CEEC.2018.8674228
  • [54] Rao U. H., 2014, The InfoSec Handbook: An Introduction to Information Security, P225, DOI [10.1007/978-1-4302-6383-8_11, DOI 10.1007/978-1-4302-6383-811]
  • [55] Rokach L, 2005, DATA MINING AND KNOWLEDGE DISCOVERY HANDBOOK, P165, DOI 10.1007/0-387-25465-X_9
  • [56] ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems
    Saheed, Yakub Kayode
    Abdulganiyu, Oluwadamilare Harazeem
    Majikumna, Kaloma Usman
    Mustapha, Musa
    Workneh, Abebaw Degu
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 45
  • [57] Salek Z, 2013, INT ISC CONF INFO SE
  • [58] Firefly algorithm based feature selection for network intrusion detection
    Selvakumar, B.
    Muneeswaran, K.
    [J]. COMPUTERS & SECURITY, 2019, 81 : 148 - 155
  • [59] CONDITIONAL-PROBABILITY
    SHAFER, G
    SPEED, TP
    [J]. INTERNATIONAL STATISTICAL REVIEW, 1985, 53 (03) : 261 - 277
  • [60] Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
    Sharafaldin, Iman
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 108 - 116