A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection

被引:13
作者
Nkenyereye, Lewis [1 ]
Tama, Bayu Adhi [2 ]
Lim, Sunghoon [3 ]
机构
[1] Sejong Univ, Dept Comp & Informat Secur, Seoul 05006, South Korea
[2] Inst Basic Sci IBS, Data Sci Grp, Daejeon 34126, South Korea
[3] Ulsan Natl Inst Sci & Technol, Dept Ind Engn, Ulsan 44919, South Korea
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 66卷 / 02期
基金
新加坡国家研究基金会;
关键词
Anomaly detection; deep neural network; intrusion detection system; stacking ensemble; INTRUSION DETECTION SYSTEM; FEATURE-SELECTION; LEARNING APPROACH; DETECTION MODEL; MACHINE; ENSEMBLE;
D O I
10.32604/cmc.2020.012432
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An anomaly-based intrusion detection system (A-IDS) provides a critical aspect in a modern computing infrastructure since new types of attacks can be discovered. It prevalently utilizes several machine learning algorithms (ML) for detecting and classifying network traffic. To date, lots of algorithms have been proposed to improve the detection performance of A-IDS, either using individual or ensemble learners. In particular, ensemble learners have shown remarkable performance over individual learners in many applications, including in cybersecurity domain. However, most existing works still suffer from unsatisfactory results due to improper ensemble design. The aim of this study is to emphasize the effectiveness of stacking ensemble-based model for A-IDS, where deep learning (e.g., deep neural network [DNN]) is used as base learner model. The effectiveness of the proposed model and base DNN model are benchmarked empirically in terms of several performance metrics, i.e., Matthew's correlation coefficient, accuracy, and false alarm rate. The results indicate that the proposed model is superior to the base DNN model as well as other existing ML algorithms found in the literature.
引用
收藏
页码:2217 / 2227
页数:11
相关论文
共 38 条
[1]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[2]   Semi-supervised multi-layered clustering model for intrusion detection [J].
Al-Jarrah, Omar Y. ;
Al-Hammdi, Yousof ;
Yoo, Paul D. ;
Muhaidat, Sami ;
Al-Qutayri, Mahmoud .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (04) :277-286
[3]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[4]  
Alrowaily Mohammed, 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage. 12th International Conference, SpaCCS 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11611), P277, DOI 10.1007/978-3-030-24907-6_21
[5]   Intrusion detection system based on a modified binary grey wolf optimisation [J].
Alzubi, Qusay M. ;
Anbar, Mohammed ;
Alqattan, Zakaria N. M. ;
Al-Betar, Mohammed Azmi ;
Abdullah, Rosni .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (10) :6125-6137
[6]  
[Anonymous], 1996, BIAS VARIANCE ARCING
[7]  
[Anonymous], 2019, J KING SAUD U COMPUT
[8]  
[Anonymous], 2017, 2017 INT C DAT SOFTW
[9]   Performance evaluation of intrusion detection based on machine learning using Apache Spark [J].
Belouch, Mustapha ;
El Hadaj, Salah ;
Idhammad, Mohamed .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :1-6
[10]  
Chapaneri Radhika, 2019, Smart Intelligent Computing and Applications. Proceedings of the Second International Conference on SCI 2018. Smart Innovation, Systems and Technologies (SIST 104), P345, DOI 10.1007/978-981-13-1921-1_35