HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering

被引:33
作者
Zou, Li [1 ]
Luo, Xuemei [1 ]
Zhang, Yan [1 ]
Yang, Xiao [1 ]
Wang, Xiangwen [2 ]
机构
[1] Gansu Prov Meteorol Informat & Tech Support & Equi, Gansu Meteorol Bur, Lanzhou 730020, Peoples R China
[2] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
关键词
Network intrusion detection; Decision trees; Security; Support vector machines; Machine learning algorithms; Cyberspace; Training; twin support vector machine; hierarchical clustering; decision tree; DETECTION SYSTEM;
D O I
10.1109/ACCESS.2023.3251354
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection is an important technology in national cyberspace security strategy and has become a research hotspot in various cyberspace security issues in recent years. The development of effective and efficient intelligent network intrusion detection methods using advanced machine learning algorithms is of great importance for defending against various network intrusions in complex network environments. In this study, a network intrusion detection method based on decision tree twin support vector machine and hierarchical clustering, named HC-DTTWSVM, is proposed, which can effectively detect different categories of network intrusion. First, the hierarchical clustering algorithm is applied to construct the decision tree for network traffic data, where the bottom-up merging approach is used to maximize the separation of the upper nodes of the decision tree, which reduces the error accumulation in the construction of the decision tree. Then, twin support vector machines are embedded in the constructed decision tree to implement the network intrusion detection model, which can effectively detect the network intrusion category in a top-down manner. The detection performance of the proposed HC-DTTWSVM method is evaluated on NSL-KDD and UNSW-NB15 intrusion detection benchmark datasets. Experimental results show that HC-DTTWSVM can effectively detect different categories of network intrusion and achieves comparable detection performance compared to some of the recently proposed network intrusion detection methods.
引用
收藏
页码:21404 / 21416
页数:13
相关论文
共 63 条
[1]   A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
INFORMATION SCIENCES, 2017, 414 :225-246
[2]   Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Idrees, Ali Kadhum ;
Almasoudy, Faezah Hamad .
PATTERN RECOGNITION, 2022, 132
[3]   Network Intrusion Detection Model Based on CNN and GRU [J].
Cao, Bo ;
Li, Chenghai ;
Song, Yafei ;
Qin, Yueyi ;
Chen, Chen .
APPLIED SCIENCES-BASEL, 2022, 12 (09)
[4]   Biomedical Classification Problems Automatically Solved by Computational Intelligence Methods [J].
Carlos Padierna, Luis ;
Villasenor-Mora, Carlos ;
Lopez Juarez, Silvia Alejandra .
IEEE ACCESS, 2020, 8 :101104-101117
[5]   A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection [J].
Das, Anurag ;
Ajila, Samuel A. ;
Lung, Chung-Horng .
MACHINE LEARNING FOR NETWORKING (MLN 2019), 2020, 12081 :40-57
[6]   A review on multi-class TWSVM [J].
Ding, Shifei ;
Zhao, Xingyu ;
Zhang, Jian ;
Zhang, Xiekai ;
Xue, Yu .
ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (02) :775-801
[7]   Twin support vector machine: theory, algorithm and applications [J].
Ding, Shifei ;
Zhang, Nan ;
Zhang, Xiekai ;
Wu, Fulin .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (11) :3119-3130
[8]   An overview on twin support vector machines [J].
Ding, Shifei ;
Yu, Junzhao ;
Qi, Bingjuan ;
Huang, Huajuan .
ARTIFICIAL INTELLIGENCE REVIEW, 2014, 42 (02) :245-252
[9]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[10]   RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Janicke, Helge .
FUTURE INTERNET, 2020, 12 (03)