Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction

被引:34
作者
Talukder, Md. Alamin [1 ,7 ]
Islam, Md. Manowarul [1 ]
Uddin, Md Ashraf [2 ]
Hasan, Khondokar Fida [3 ]
Sharmin, Selina [1 ]
Alyami, Salem A. [4 ]
Moni, Mohammad Ali [5 ,6 ]
机构
[1] Jagannath Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Deakin Univ, Sch Informat Technol, Waurn Ponds Campus, Geelong, Australia
[3] Univ New South Wales UNSW, Sch Profess Studies, 37 Constitut Ave, Canberra, ACT 2601, Australia
[4] Imam Mohammad Ibn Saud Islamic Univ IMSIU, Fac Sci, Dept Math & Stat, Riyadh 11432, Saudi Arabia
[5] Charles Sturt Univ, Artificial Intelligence & Cyber Futures Inst, AI & Digital Hlth Technol, Bathurst, NSW 2795, Australia
[6] Charles Sturt Univ, Rural Hlth Res Inst, AI & Digital Hlth Technol, Orange, NSW 2800, Australia
[7] Int Univ Business Agr & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
关键词
Intrusion detection system; Feature extraction; Random oversampling; Principal component analysis; Machine learning; FEATURE-SELECTION; DETECTION SYSTEM;
D O I
10.1186/s40537-024-00886-w
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities. Machine Learning (ML)-based behavior analysis within the IDS has considerable potential for detecting dynamic cyber threats, identifying abnormalities, and identifying malicious conduct within the network. However, as the number of data grows, dimension reduction becomes an increasingly difficult task when training ML models. Addressing this, our paper introduces a novel ML-based network intrusion detection model that uses Random Oversampling (RO) to address data imbalance and Stacking Feature Embedding based on clustering results, as well as Principal Component Analysis (PCA) for dimension reduction and is specifically designed for large and imbalanced datasets. This model's performance is carefully evaluated using three cutting-edge benchmark datasets: UNSW-NB15, CIC-IDS-2017, and CIC-IDS-2018. On the UNSW-NB15 dataset, our trials show that the RF and ET models achieve accuracy rates of 99.59% and 99.95%, respectively. Furthermore, using the CIC-IDS2017 dataset, DT, RF, and ET models reach 99.99% accuracy, while DT and RF models obtain 99.94% accuracy on CIC-IDS2018. These performance results continuously outperform the state-of-art, indicating significant progress in the field of network intrusion detection. This achievement demonstrates the efficacy of the suggested methodology, which can be used practically to accurately monitor and identify network traffic intrusions, thereby blocking possible threats.
引用
收藏
页数:44
相关论文
共 67 条
  • [1] Adeyemo VE, 2019, INT J ADV COMPUT SC, V10
  • [2] Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set
    Ahmad, Muhammad
    Riaz, Qaiser
    Zeeshan, Muhammad
    Tahir, Hasan
    Haider, Syed Ali
    Khan, Muhammad Safeer
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [3] A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models
    Ahmim, Ahmed
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Derdour, Makhlouf
    Janicke, Helge
    [J]. 2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 228 - 233
  • [4] Akhter A., 2023, Natural Language Processing Journal, V4, P100027, DOI [DOI 10.1016/J.NLP.2023.100027, 10.1016/j.nlp.2023.100027]
  • [5] STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment
    Al, Samed
    Dener, Murat
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [6] Aleesa AM, 2021, J ENG SCI TECHNOL, V16, P711
  • [7] Improved Intrusion Detection Algorithm based on TLBO and GA Algorithms
    Aljanabi, Mohammad
    Ismail, MohdArfian
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (02) : 170 - 179
  • [8] Allahrakha N., 2023, Legal Issues in the Digital Age, V2, P78
  • [9] Bhardwaj A, 2021, Intelligent systems, technologies and applications, P71
  • [10] Intrusion detection technique using Coarse Gaussian SVM
    Bhati, Bhoopesh Singh
    Rai, C. S.
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (01) : 27 - 32