Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

被引:6
作者
Almomani, Ammar [1 ,2 ]
Akour, Iman [3 ]
Manasrah, Ahmed M. [4 ,5 ]
Almomani, Omar [6 ]
Alauthman, Mohammad [7 ]
Abdullah, Esra'a [1 ]
Al Shwait, Amaal [1 ]
Al Sharaa, Razan [1 ]
机构
[1] Univ City Sharjah, Skyline Univ Coll, Sch Comp, POB 1797, Sharjah, U Arab Emirates
[2] Al Balqa Appl Univ, IT Dept Al Huson Univ Coll, POB 50, Irbid, Jordan
[3] Univ Sharjah, Coll Comp & Informat, Informat Syst Dept, Sharjah, U Arab Emirates
[4] Higher Coll Technol, Comp Info Sci CIS Div, Sharjah, U Arab Emirates
[5] Yarmouk Univ, Comp Sci Dept, Irbid, Jordan
[6] World Islamic Sci & Educ Univ, Comp Network & Informat Syst Dept, Amman 11947, Jordan
[7] Univ Petra, Fac Informat Technol, Dept Informat Secur, Amman, Jordan
关键词
Intrusion detection system (IDS); machine learning techniques; stacking ensemble; random forest; decision tree; k; -nearest; -neighbor; DETECTION SYSTEM; MACHINE; MODEL;
D O I
10.32604/iasc.2023.039687
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). The proposed system employs pre-processing techniques to enhance classification efficiency and integrates seven machine learning algorithms. The stacking ensemble technique increases performance by incorporating three base models (Random Forest, Decision Tree, and k-Nearest-Neighbors) and a meta-model represented by the Logistic Regression algorithm. Evaluated using the UNSW-NB15 dataset, the pro-posed IDS gained an accuracy of 96.16% in the training phase and 97.95% in the testing phase, with precision of 97.78%, and 98.40% for taring and testing, respectively. The obtained results demonstrate improvements in other measurement criteria.
引用
收藏
页码:2499 / 2517
页数:19
相关论文
共 38 条
[1]   Building an Ensemble Learning Based Algorithm for Improving Intrusion Detection System [J].
Abirami, M. S. ;
Yash, Umaretiya ;
Singh, Sonal .
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 :635-649
[2]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[3]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[4]   An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Tian Yingjie ;
Shi, Yong .
NEUROCOMPUTING, 2016, 199 :90-102
[5]  
Bishop Christopher M., 2006, Pattern recognition and machine learning
[6]  
Bisong E., 2019, BUILDING MACHINE LEA
[7]  
Ceballos F, 2022, STACKING CLASSIFIERS
[8]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[9]   Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique [J].
Disha, Raisa Abedin ;
Waheed, Sajjad .
CYBERSECURITY, 2022, 5 (01)
[10]  
Dong B, 2016, I C COMM SOFTW NET, P581, DOI 10.1109/ICCSN.2016.7586590