Intrusion detection based on ensemble learning for big data classification

被引:19
作者
Jemili, Farah [1 ]
Meddeb, Rahma [1 ]
Korbaa, Ouajdi [1 ]
机构
[1] Univ Sousse, MARS Res Lab, ISITCom, Hammam Sousse 17ES054011, LR, Tunisia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 03期
关键词
Intrusion detection system; Ensemble learning; Homogeneous ensemble; Heterogeneous ensemble; Big data; DETECTION SYSTEM; ALGORITHMS; MACHINE; FOREST; TREE; KNN;
D O I
10.1007/s10586-023-04168-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The escalating frequency and sophistication of cyber threats pose significant challenges to traditional intrusion detection methods. Signature-based misuse detection, hybrid detection, and anomaly detection, while effective in isolation, often struggle to keep pace with the ever-evolving tactics employed by attackers. This research stems from the pressing need to develop intrusion detection models that offer improved accuracy, adaptability, and robustness in the face of rapidly changing attack vectors. Our study leverages a comprehensive set of experiments conducted on diverse datasets, including N-BaIoT, NSL-KDD, and CICIDS2017. The primary focus is on the evaluation and comparison of machine learning algorithms such as Random Forest, XGBoost, and decision trees. Notably, our research culminates in the development of a hybrid intrusion detection model that combines the strengths of these algorithms. The results of our experiments indicate that the hybrid model, particularly when combining Random Forest and XGBoost, exhibits exceptional accuracy. This approach outperforms individual algorithms, achieving an accuracy rate of 97% in certain cases. We attribute this success to the ensemble learning approach, which capitalizes on the consensus of diverse classifiers. In conclusion, our research not only demonstrates the effectiveness of ensemble learning in enhancing intrusion detection but also underscores the importance of continuous adaptation in the face of evolving threats. By leveraging network traffic data, our hybrid model offers a promising avenue for bolstering intrusion classification in Big Data environments.
引用
收藏
页码:3771 / 3798
页数:28
相关论文
共 88 条
[1]  
Abid Ahlem, 2020, Procedia Computer Science, V176, P572, DOI [10.1016/j.procs.2020.08.059, 10.1016/j.procs.2020.08.059]
[2]   A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models [J].
Ahmim, Ahmed ;
Maglaras, Leandros ;
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Janicke, Helge .
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, :228-233
[3]   An Intelligent Tree-Based Intrusion Detection Model for Cyber Security [J].
Al-Omari, Mohammad ;
Rawashdeh, Majdi ;
Qutaishat, Fadi ;
Alshira'H, Mohammad ;
Ababneh, Nedal .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (02)
[4]   Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things [J].
Alharbi, Abdullah ;
Alosaimi, Wael ;
Alyami, Hashem ;
Rauf, Hafiz Tayyab ;
Damasevicius, Robertas .
ELECTRONICS, 2021, 10 (11)
[5]  
Artur Mechetin., 2021, Procedia Computer Science, V190, P564, DOI DOI 10.1016/J.PROCS.2021.06.066
[6]  
Attou H., 2023, APPL SCI J
[7]   Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques [J].
Attou, Hanaa ;
Guezzaz, Azidine ;
Benkirane, Said ;
Azrour, Mourade ;
Farhaoui, Yousef .
BIG DATA MINING AND ANALYTICS, 2023, 6 (03) :311-320
[8]   An empirical comparison of voting classification algorithms: Bagging, boosting, and variants [J].
Bauer, E ;
Kohavi, R .
MACHINE LEARNING, 1999, 36 (1-2) :105-139
[9]   Performance evaluation of intrusion detection based on machine learning using Apache Spark [J].
Belouch, Mustapha ;
El Hadaj, Salah ;
Idhammad, Mohamed .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :1-6
[10]   Optimum-path forest stacking-based ensemble for intrusion detection [J].
Bertoni, Mateus A. ;
de Rosa, Gustavo H. ;
Brega, Jose R. F. .
EVOLUTIONARY INTELLIGENCE, 2022, 15 (03) :2037-2054