Optimizing anomaly-based attack detection using classification machine learning

被引:2
作者
Gouda, Hany Abdelghany [1 ]
Ahmed, Mohamed Abdelslam [1 ]
Roushdy, Mohamed Ismail [2 ]
机构
[1] Helwan Univ, Fac Commerce & Business Adm, Dept Informat Syst, Cairo, Egypt
[2] Future Univ Egypt, Fac Comp & Informat Technol, Comp Sci Dept, Cairo, Egypt
关键词
Intrusion detection; Detection techniques and methodologies; Classical Machine learning algorithms; Neural network and dataset;
D O I
10.1007/s00521-023-09309-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the significant aspects of our digital world is that data are literally everywhere, and it is increasing. On the other hand, the number of cyberattacks aiming to seize this data and use it illegally is increasing at an exponential rate, and this is the challenge. Therefore, intrusion detection systems (IDS) have attracted considerable interest from researchers and industries. In this regard, machine learning (ML) techniques are playing a pivotal role as they put the responsibility of analyzing enormous amounts of data, finding patterns, classifying intrusions, and solving issues on computers instead of humans. This paper implements two separate classification layers of ML-based algorithms with the recently published NF-UQ-NIDS-v2 dataset, preprocessing two volumes of sample records (100 k and 10 million), utilizing MinMaxScaler, LabelEncoder, selecting superlative features by recursive feature elimination, normalizing the data, and optimizing hyper-parameters for classical algorithms and neural networks. With a small dataset volume, the results of the classical algorithms layer show high detection accuracy rates for support vector (98.26%), decision tree (98.78%), random forest (99.07%), K-nearest neighbors (98.16%), CatBoost (99.04%), and gradient boosting (98.80%). In addition, the layer of neural network algorithms has proven to be a very powerful technology when using deep learning, particularly due to its unique ability to effectively handle enormous amounts of data and detect hidden correlations and patterns; it showed high detection results, which were (98.87%) for long short-term memory and (98.56%) for convolutional neural networks.
引用
收藏
页码:3239 / 3257
页数:19
相关论文
共 50 条
  • [31] Anomaly-Based Intrusion Detection System for Ad hoc Networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghamri-Doudane, Yacine
    [J]. 2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,
  • [32] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [33] ADroid: anomaly-based detection of malicious events in Android platforms
    Ruiz-Heras, A.
    Garcia-Teodoro, P.
    Sanchez-Casado, L.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (04) : 371 - 384
  • [34] An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    [J]. 2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 99 - 104
  • [35] Anomaly-based Intrusion Detection using Multiclass-SVM with Parameters Optimized by PSO
    Wang, GuiPing
    Chen, ShuYu
    Liu, Jun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 227 - 242
  • [36] Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network
    Lai, Yingxu
    Zhang, Jingwen
    Liu, Zenghui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [37] Poster: Design of an Anomaly-based Threat Detection & Explication System
    Luh, Robert
    Schrittwieser, Sebastian
    Marschalek, Stefan
    Janicke, Helge
    Weippl, Edgar
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 119 - 120
  • [38] A Hybrid Model for Anomaly-based Intrusion Detection in SCADA Networks
    Ullah, Imtiaz
    Mahmoud, Qusay H.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2160 - 2167
  • [39] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
    Nikolova, Evgeniya
    Jecheva, Veselina
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41
  • [40] Anomaly-based intrusion detection: privacy concerns and other problems
    Lundin, E
    Jonsson, E
    [J]. COMPUTER NETWORKS, 2000, 34 (04) : 623 - 640