Enhancing intrusion detection: combining LogitBoost algorithms and random forest

被引:0
作者
Kharwar, Ankit [1 ]
Vadhwani, Diya [2 ]
Dabhi, Dipak [3 ]
Jariwala, Vivaksha [1 ]
机构
[1] Sarvajanik Univ, Sarvajanik Coll Engn & Technol, Informat Technol, Surat, Gujarat, India
[2] Adani Univ, Adani Inst Infrastructure Engn, Comp Sci & Engn, Ahmadabad, Gujarat, India
[3] Kaushalya Skill Univ, Ahmadabad, Gujarat, India
关键词
LogitBoost algorithm; network security; anomaly detection; machine learning; intrusion detection; random forest; boosting algorithm; ensemble methods; DEEP LEARNING APPROACH; DETECTION SYSTEM; FEATURE-SELECTION; MODEL; TREE; REGRESSION; ADABOOST; MACHINE; SET;
D O I
10.1504/IJAHUC.2025.146425
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network data security is an issue that affects individuals, businesses, and governments worldwide. As attacks become more common and attackers' tactics evolve, it is important to implement advanced network security solutions such as an intrusion detection system (IDS) to detect unwanted and unexpected network activity. To that end, this article proposes a comprehensive strategy for improving detection performance through classification approaches. If only one classifier is utilised, the final decision may be erroneous, as incorrect classifier output may occur. The ensemble classification method combines multiple classifiers and produces better results than a single classifier. To improve classification accuracy, the proposed model incorporates random forest and LogitBoost. The proposed model has an accuracy of 95.89%, 99.91%, and 98.54% on the UNSW-NB15, CICIDS2017, and CICIDS2018 datasets, respectively, and outperforms other existing models in terms of accuracy, detection rate, and false alarm rate.
引用
收藏
页码:119 / 128
页数:11
相关论文
共 58 条
[1]   A Closer Look at Intrusion Detection System for Web Applications [J].
Agarwal, Nancy ;
Hussain, Syed Zeeshan .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[2]   A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer [J].
Alazzam, Hadeel ;
Sharieh, Ahmad ;
Sabri, Khair Eddin .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 148 (148)
[3]   The Influence of Salp Swarm Algorithm-Based Feature Selection on Network Anomaly Intrusion Detection [J].
Alsaleh, Alanoud ;
Binsaeedan, Wojdan .
IEEE ACCESS, 2021, 9 :112466-112477
[4]  
Amudha P., 2013, International Journal of Computer Applications, V76, P33, DOI [10.5120/13334-0928, DOI 10.5120/13334-0928]
[5]  
[Anonymous], 2021, National College of Ireland Victim of a Ransomware Attack
[6]  
Azizjon Meliboev, 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), P218, DOI 10.1109/ICAIIC48513.2020.9064976
[7]   Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Shi, Yong .
KNOWLEDGE-BASED SYSTEMS, 2017, 126 :113-126
[8]   An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Tian Yingjie ;
Shi, Yong .
NEUROCOMPUTING, 2016, 199 :90-102
[9]   Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach [J].
Binbusayyis, Adel ;
Vaiyapuri, Thavavel .
IEEE ACCESS, 2019, 7 :106495-106513
[10]   Improving network intrusion detection system performance through quality of service configuration and parallel technology [J].
Bul'ajoul, Waleed ;
James, Anne ;
Pannu, Mandeep .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (06) :981-999