A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks

被引:0
作者
Nathaniel, Dhinakaran [1 ]
Soosai, Anto [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
computer networks; computer security; machine learning; firewalls; intrusion detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, machine learning (ML) has had a significant influence on the discipline of computer security. In network security, intrusion detection systems increasingly employ machine learning techniques. Approaches based on machine learning have substantially improved the efficacy of intrusion detection. Adaptive adversaries who comprehend the underlying principles of ML techniques can initiate attacks against the classification engine of an intrusion detection system. Malicious actors exploit machine learning model vulnerabilities. Network security, specifically intrusion detection systems, requires the development of defensive strategies to combat this threat. The RF-RSE (Random Forest based Random Subspace Ensemble) and RF-RSE-AT (RFRSE-Adversarial Training) methods are proposed as network intrusion detection systems to defend against adversarial attacks. The methodologies proposed are evaluated using the NSL-KDD dataset. The RF-RSE method demonstrates remarkable resistance to adversary attacks. The RF-RSE-AT method performs exceptionally well in correctly identifying network traffic classes when presented with adversarial attacks, and it maintains its accuracy even when no attack is present.
引用
收藏
页码:81 / 88
页数:8
相关论文
共 30 条
  • [11] Ever Yoney Kirsal, 2019, Mobile Web and Intelligent Information Systems. 16th International Conference (MobiWIS 2019). Proceedings: Lecture Notes in Computer Science (LNCS 11673), P111, DOI 10.1007/978-3-030-27192-3_9
  • [12] An Adaptive Ensemble Machine Learning Model for Intrusion Detection
    Gao, Xianwei
    Shan, Chun
    Hu, Changzhen
    Niu, Zequn
    Liu, Zhen
    [J]. IEEE ACCESS, 2019, 7 : 82512 - 82521
  • [13] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [14] Goodfellow I. J., 2015, 3 INT C LEARN REPR I, DOI DOI 10.48550/ARXIV.1412.6572
  • [15] Ho TK, 1998, IEEE T PATTERN ANAL, V20, P832, DOI 10.1109/34.709601
  • [16] A novel intrusion detection system based on hierarchical clustering and support vector machines
    Horng, Shi-Jinn
    Su, Ming-Yang
    Chen, Yuan-Hsin
    Kao, Tzong-Wann
    Chen, Rong-Jian
    Lai, Jui-Lin
    Perkasa, Citra Dwi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (01) : 306 - 313
  • [17] Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
    Injadat, Mohammad Noor
    Moubayed, Abdallah
    Nassif, Ali Bou
    Shami, Abdallah
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1803 - 1816
  • [18] Kurakin A., 2017, Artificial intelligence safety and security
  • [19] AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks
    Li, Jiaqi
    Zhao, Zhifeng
    Li, Rongpeng
    Zhang, Honggang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 2093 - 2102
  • [20] Intrusion detection system: A comprehensive review
    Liao, Hung-Jen
    Lin, Chun-Hung Richard
    Lin, Ying-Chih
    Tung, Kuang-Yuan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 16 - 24