A novel method for feature learning and network intrusion classification

被引:7
作者
Alzahrani, Ahmed S. [1 ]
Shah, Reehan Ali [2 ]
Qian, Yuntao [3 ]
Ali, Munwar [4 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Comp Sci Dept, Jeddah, Saudi Arabia
[2] Islamia Univ, Fac Engn & Technol, Dept Comp Syst Engn, Bahawalpur, Pakistan
[3] Zhejiang Univ, Coll Comp Sci, Inst Artificial Intelligence, Hangzhou 310027, Peoples R China
[4] Shaheed Benazir Bhutto Univ, Dept Informat Technol, Sindh, Pakistan
关键词
Structural sparse modelling; Feature selection (FS); IDS; Machine learning (ML); Network security; SELECTION; REGRESSION; HYBRID; SYSTEM; ATTACKS;
D O I
10.1016/j.aej.2020.01.021
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid advancement in technology, network systems are becoming prone to more sophisticated types of intrusions. However, machine learning (ML) based strategies are among the most efficient and popular methods to identify the network intrusions or attacks. In this study, we examined the important and discriminative features, in order to recognize the various attacks by applying the Structural Sparse Logistic Regression (SSPLR) and Support Vector Machine (SVMs) methods. The SVMs are standard ML-based techniques, which provide the reasonable performance, however, they have few shortcomings, such as, interpretability and huge computational cost. On the other hand, the sparse modeling (SSPLR) is considered as the advanced method for the data examination and processing through regularization. The structural sparse modeling can be used to simultaneously select the distinct features or the group of discriminative features from the repository of the data set to determine the coefficient of the linear classifier, where, prior information of the feature's structure can be mapped on various sparsity-inducing regularizations. In this way, the particular group of features yielded by the most significant network attacks are selected and potentially identified. The experiments and discussion, show that the proposed techniques have improved performance compared to the most state-of-the-art techniques, used for the Intrusion Detection System (IDS). (C) 2020 The Authors. Published by Elsevier B.V. on behalf of Faculty of Engineering, Alexandria University.
引用
收藏
页码:1159 / 1169
页数:11
相关论文
共 45 条
[1]  
Abonazel M.R., 2018, J STAT APPL PROBABIL, V7
[2]  
Al-mamory S. O., 2015, Karbala International Journal of Modern Science, V1, P15
[3]  
[Anonymous], 2010, INT J NETW SECUR ITS, DOI DOI 10.5121/IJNSA.2010.2202
[4]  
[Anonymous], 2006, Journal of the Royal Statistical Society, Series B
[5]  
Bahloul M.R., 2016, J COMPUT THEOR NANOS, V13, P7879
[6]   Modulation classification for MIMO systems: State of the art and research directions [J].
Bahloul, Mohammad Rida ;
Yusoff, Mohd Zuki ;
Abdel-Aty, Abdel-Haleem ;
Saad, M. Naufal M. ;
Al-Jemeli, Marwan .
CHAOS SOLITONS & FRACTALS, 2016, 89 :497-505
[7]  
Brifcani A., 2011, Eng. Tech. Journal, V29, P368
[8]  
Cateni S., 2016, INT J COMPUT INF SYS
[9]   A Fuzzy System for Combining Filter Features Selection Methods [J].
Cateni, Silvia ;
Colla, Valentina ;
Vannucci, Marco .
INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2017, 19 (04) :1168-1180
[10]  
Chellam Aditya, 2018, Procedia Computer Science, V132, P928, DOI 10.1016/j.procs.2018.05.108