An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques

被引:10
作者
Keserwani, Pankaj Kumar [1 ]
Govil, Mahesh Chandra [1 ]
Pilli, Emmanuel S. [2 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Burfang Block Ravangla, South Sikkim 737139, India
[2] Malaviya Natl Inst Technol Jaipur, Dept Comp Sci & Engn, JLN Marg, Jaipur 737139, Rajasthan, India
关键词
Intrusion detection; Machine learning; Attacks; Feature optimization; Deep learning; INTRUSION DETECTION SYSTEM; NETWORK ANOMALY DETECTION; FEATURE-SELECTION APPROACH; SUPPORT VECTOR MACHINE; GENETIC-ALGORITHM; NEURAL-NETWORK; ENSEMBLE; FILTER; MODEL; PCA;
D O I
10.1007/s00521-021-06093-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The technological advancement leads to an increase in the usage of the Internet with many applications and connected devices. This increased network size causes increased complexity and creating rooms for the attackers to explore and exploit vulnerabilities to carry out various attacks. As a result upsurge of network attacks can be realized in recent years and is diversified, which can be affirmed by the admittance of various organizations. Varieties of intrusion detection systems (IDSs) have been designed and proposed to tackle such issues based on the misuse-based, anomaly based, and sometimes hybrid techniques. The high rate of network data generation and its enormous volume makes it challenging for IDSs to maintain their efficacy and reliability. This paper discusses a comprehensive understanding of IDS types, six benchmark network datasets, high distributed dimensionality reduction techniques, and classification approaches based on machine learning and deep learning for intrusion detection with their importance to ascertain the efficacy and reliability of IDSs. Furthermore, based on the literature review, a general framework for NIDS has been proposed. At last model for network IDS (NIDS) is designed by following the proposed framework. Achieved accuracy and detection rate of the proposed NIDS model on the UNSW-NB15 dataset are 98.11% and 97.81%, respectively, and achieving better performance than other approaches comparatively.
引用
收藏
页码:4993 / 5013
页数:21
相关论文
共 125 条
  • [91] Panigrahi R., 2018, INT J ENG TECHNOLOGY, V7, P479, DOI [10.14419/ijet.v7i3.24.22797, DOI 10.14419/IJET.V7I3.24.22797]
  • [92] Dendron: Genetic trees driven rule induction for network intrusion detection systems
    Papamartzivanos, Dimitrios
    Gomez Marmol, Felix
    Kambourakis, Georgios
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 558 - 574
  • [93] DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection
    Parker, Luke R.
    Yoo, Paul D.
    Asyhari, Taufiq A.
    Chermak, Lounis
    Jhi, Yoonchan
    Taha, Kamal
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [94] Designing an efficient security framework for detecting intrusions in virtual network of cloud computing
    Patil, Rajendra
    Dudeja, Harsha
    Modi, Chirag
    [J]. COMPUTERS & SECURITY, 2019, 85 : 402 - 422
  • [95] A Survey on Deep Learning: Algorithms, Techniques, and Applications
    Pouyanfar, Samira
    Sadiq, Saad
    Yan, Yilin
    Tian, Haiman
    Tao, Yudong
    Reyes, Maria Presa
    Shyu, Mei-Ling
    Chen, Shu-Ching
    Iyengar, S. S.
    [J]. ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [96] An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine
    Raman, M. R. Gauthama
    Somu, Nivethitha
    Kirthivasan, Kannan
    Liscano, Ramiro
    Sriram, V. S. Shankar
    [J]. KNOWLEDGE-BASED SYSTEMS, 2017, 134 : 1 - 12
  • [97] Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms
    Ren, Jiadong
    Guo, Jiawei
    Qian, Wang
    Yuan, Huang
    Hao, Xiaobing
    Hu Jingjing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [98] Roesch M, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), P229
  • [99] Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
    Salo, Fadi
    Nassif, Ali Bou
    Essex, Aleksander
    [J]. COMPUTER NETWORKS, 2019, 148 : 164 - 175
  • [100] Firefly algorithm based feature selection for network intrusion detection
    Selvakumar, B.
    Muneeswaran, K.
    [J]. COMPUTERS & SECURITY, 2019, 81 : 148 - 155