A Fused Machine Learning Approach for Intrusion Detection System

被引:16
作者
Farooq, Muhammad Sajid [1 ]
Abbas, Sagheer [1 ]
Sultan, Kiran [3 ]
Atta-ur-Rahman, Muhammad Adnan [2 ]
Khan, Muhammad Adnan [4 ]
Mosavi, Amir [5 ,6 ,7 ]
机构
[1] Natl Coll Business Adm & Econ, Sch Comp Sci, Lahore 54000, Pakistan
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[3] King Abdulaziz Univ, Appl Coll, Dept CIT, Jeddah 21589, Saudi Arabia
[4] Gachon Univ, Dept Software, Seongnam 13120, South Korea
[5] Obuda Univ, John von Neumann Fac Informat, H-1034 Budapest, Hungary
[6] Slovak Univ Technol Bratislava, Inst Informat Engn Automat & Math, Bratislava 81107, Slovakia
[7] Tech Univ Dresden, Fac Civil Engn, D-01062 Dresden, Germany
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Fused machine learning; heterogeneous network; intrusion detection; NETWORK; OPTIMIZATION;
D O I
10.32604/cmc.2023.032617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet. The interconnec-tivity of networks has brought various complexities in maintaining network availability, consistency, and discretion. Machine learning based intrusion detection systems have become essential to monitor network traffic for mali-cious and illicit activities. An intrusion detection system controls the flow of network traffic with the help of computer systems. Various deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network traffic. For this purpose, when the network traffic encounters known or unknown intrusions in the network, a machine-learning framework is needed to identify and/or verify network intrusion. The Intrusion detection scheme empowered with a fused machine learning technique (IDS-FMLT) is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious attacks. The proposed IDS-FMLT system model obtained 95.18% validation accuracy and a 4.82% miss rate in intrusion detection.
引用
收藏
页码:2607 / 2623
页数:17
相关论文
共 41 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[3]   A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization [J].
Ali, Mohammed Hasan ;
Al Mohammed, Bahaa Abbas Dawood ;
Ismail, Alyani ;
Zolkipli, Mohamad Fadli .
IEEE ACCESS, 2018, 6 :20255-20261
[4]  
Alshinina R., 2018, WIREL TELECOMM SYMP, P1
[5]   A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios [J].
Bovenzi, Giampaolo ;
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Persico, Valerio ;
Pescape, Antonio .
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
[6]   A method of virtual machine placement for fault-tolerant cloud applications [J].
Chen, Xiao ;
Jiang, Jian-Hui .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (04) :587-597
[7]   Machine Learning Based Cloud Computing Anomalies Detection [J].
Chkirbene, Zina ;
Erbad, Aiman ;
Hamila, Ridha ;
Gouissem, Ala ;
Mohamed, Amr ;
Hamdi, Mounir .
IEEE NETWORK, 2020, 34 (06) :178-183
[8]  
Farhan AM, 2017, CMC-COMPUT MATER CON, V53, P129
[9]   An Adaptive Ensemble Machine Learning Model for Intrusion Detection [J].
Gao, Xianwei ;
Shan, Chun ;
Hu, Changzhen ;
Niu, Zequn ;
Liu, Zhen .
IEEE ACCESS, 2019, 7 :82512-82521
[10]   Extreme learning machine: Theory and applications [J].
Huang, Guang-Bin ;
Zhu, Qin-Yu ;
Siew, Chee-Kheong .
NEUROCOMPUTING, 2006, 70 (1-3) :489-501