Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction

被引:34
作者
Talukder, Md. Alamin [1 ,7 ]
Islam, Md. Manowarul [1 ]
Uddin, Md Ashraf [2 ]
Hasan, Khondokar Fida [3 ]
Sharmin, Selina [1 ]
Alyami, Salem A. [4 ]
Moni, Mohammad Ali [5 ,6 ]
机构
[1] Jagannath Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Deakin Univ, Sch Informat Technol, Waurn Ponds Campus, Geelong, Australia
[3] Univ New South Wales UNSW, Sch Profess Studies, 37 Constitut Ave, Canberra, ACT 2601, Australia
[4] Imam Mohammad Ibn Saud Islamic Univ IMSIU, Fac Sci, Dept Math & Stat, Riyadh 11432, Saudi Arabia
[5] Charles Sturt Univ, Artificial Intelligence & Cyber Futures Inst, AI & Digital Hlth Technol, Bathurst, NSW 2795, Australia
[6] Charles Sturt Univ, Rural Hlth Res Inst, AI & Digital Hlth Technol, Orange, NSW 2800, Australia
[7] Int Univ Business Agr & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
关键词
Intrusion detection system; Feature extraction; Random oversampling; Principal component analysis; Machine learning; FEATURE-SELECTION; DETECTION SYSTEM;
D O I
10.1186/s40537-024-00886-w
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities. Machine Learning (ML)-based behavior analysis within the IDS has considerable potential for detecting dynamic cyber threats, identifying abnormalities, and identifying malicious conduct within the network. However, as the number of data grows, dimension reduction becomes an increasingly difficult task when training ML models. Addressing this, our paper introduces a novel ML-based network intrusion detection model that uses Random Oversampling (RO) to address data imbalance and Stacking Feature Embedding based on clustering results, as well as Principal Component Analysis (PCA) for dimension reduction and is specifically designed for large and imbalanced datasets. This model's performance is carefully evaluated using three cutting-edge benchmark datasets: UNSW-NB15, CIC-IDS-2017, and CIC-IDS-2018. On the UNSW-NB15 dataset, our trials show that the RF and ET models achieve accuracy rates of 99.59% and 99.95%, respectively. Furthermore, using the CIC-IDS2017 dataset, DT, RF, and ET models reach 99.99% accuracy, while DT and RF models obtain 99.94% accuracy on CIC-IDS2018. These performance results continuously outperform the state-of-art, indicating significant progress in the field of network intrusion detection. This achievement demonstrates the efficacy of the suggested methodology, which can be used practically to accurately monitor and identify network traffic intrusions, thereby blocking possible threats.
引用
收藏
页数:44
相关论文
共 67 条
  • [21] Gorunescu F, 2011, INTEL SYST REF LIBR, P1, DOI 10.1007/978-3-642-19721-5
  • [22] A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    Khurram, Shahzada
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [23] T-SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems
    Hammad, Mohamed
    Hewahi, Nabil
    Elmedany, Wael
    [J]. IET INFORMATION SECURITY, 2021, 15 (02) : 178 - 190
  • [24] A hybrid deep learning model for efficient intrusion detection in big data environment
    Hassan, Mohammad Mehedi
    Gumaei, Abdu
    Alsanad, Ahmed
    Alrubaian, Majed
    Fortino, Giancarlo
    [J]. INFORMATION SCIENCES, 2020, 513 : 386 - 396
  • [25] Machine Learning in IoT Security: Current Solutions and Future Challenges
    Hussain, Fatima
    Hussain, Rasheed
    Hassan, Syed Ali
    Hossain, Ekram
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1686 - 1721
  • [26] Istiaque SM., 2021, Eur J Eng Technol Res, V6, P148, DOI [DOI 10.24018/EJENG.2021.6.2.2371, 10.24018/ejeng.2021.6.2.2371]
  • [27] Jayalaxmi PLS, 2022, IEEE Access
  • [28] Kafi M.A., 2023, Am. J. Trade Policy, V10, P15, DOI DOI 10.18034/AJTP.V10I1.659
  • [29] Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset
    Kasongo, Sydney M.
    Sun, Yanxia
    [J]. JOURNAL OF BIG DATA, 2020, 7 (01)
  • [30] A deep learning method with wrapper based feature extraction for wireless intrusion detection system
    Kasongo, Sydney Mambwe
    Sun, Yanxia
    [J]. COMPUTERS & SECURITY, 2020, 92 (92)