cFEM: a cluster based feature extraction method for network intrusion detection

被引:0
作者
Mazumder, Md. Mumtahin Habib Ullah [1 ]
Kadir, Md. Eusha [2 ]
Sharmin, Sadia [3 ]
Islam, Md. Shariful [4 ]
Alam, Muhammad Mahbub [3 ]
机构
[1] United Int Univ, Dept CSE, Dhaka, Bangladesh
[2] Noakhali Sci & Technol Univ, Inst Informat Technol, Noakhali, Bangladesh
[3] Islamic Univ Technol, Dept CSE, Gazipur, Bangladesh
[4] Univ Dhaka, Inst Informat Technol, Dhaka, Bangladesh
关键词
Anomaly detection; Clustering; Feature extraction; Mahalanobis distance; DEEP LEARNING APPROACH; FEATURE-SELECTION; SPARSE AUTOENCODER; ALGORITHM; MECHANISM; SYSTEMS;
D O I
10.1007/s10207-023-00694-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent trend in network intrusion detection leverages key features of machine learning (ML) algorithms to detect network traffic anomalies. Network traffic flows contain high dimensional features which significantly affect data-driven approaches. Therefore, the performance of ML-based approaches mainly depends on the appropriate set of features of network data. Different feature selection and extraction methods are extensively employed to attain the informative and compact set of features. Existing methods often suffer from achieving the expected performance due to the lacking of effectively removing redundant features as well as incorporating features with complementary information. In this paper, we present a cluster-based feature extraction method using Mahalanobis distance (cFEM) that clusters the correlated features and extracts new feature representations based on a distance metric. The extracted features on the transformed dimensions are employed to train different machine learning classifiers. We conducted extensive experiments using three renowned datasets. The results show that cFEM outperforms the state-of-the-art intrusion detection methods in several performance metrics such as detection rate (99.61%) and false alarm rate (0.26%). Further experiments on extracted features show that our extracted features are discriminative, free of redundancy, and able to capture complementary information.
引用
收藏
页码:1355 / 1369
页数:15
相关论文
共 72 条
  • [1] Abdullah M., 2018, International Journal of Computer Science and Information Security IJCSIS, V16, P48
  • [2] Aburomman AA, 2016, Adv Inform Managemen, P636, DOI 10.1109/IMCEC.2016.7867287
  • [3] Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
    Al-Qatf, Majjed
    Yu Lasheng
    Al-Habib, Mohammed
    Al-Sabahi, Kamal
    [J]. IEEE ACCESS, 2018, 6 : 52843 - 52856
  • [4] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998
  • [5] Hidden Markov models for malware classification
    Annachhatre, Chinmayee
    Austin, Thomas H.
    Stamp, Mark
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02): : 59 - 73
  • [6] [Anonymous], 2021, CYBER SECURITY REPOR
  • [7] Ashok R, 2011, 2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), P23, DOI 10.1109/ICoAC.2011.6165213
  • [8] Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning
    Ayub, Md Ahsan
    Johnson, William A.
    Talbert, Douglas A.
    Siraj, Ambareen
    [J]. 2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 324 - 329
  • [9] Aziz MN., 2019, INT J INTELL ENG SYS, V12, P233
  • [10] Beqiri E, 2009, COMM COM INF SC, V45, P156