Ensemble of Classifiers Based Network Intrusion Detection System Performance Bound

被引:0
作者
Mkuzangwe, Nenekazi N. P. [1 ,2 ]
Nelwamondo, Fulufhelo [1 ,2 ]
机构
[1] CSIR, Modelling & Digital Sci Unit, Pretoria, South Africa
[2] Univ Johannesburg, Dept Elect & Elect Engn, Jonannesburg, South Africa
来源
2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI) | 2017年
关键词
Network intrusion detection system; network intrusion detection system performance bound; AdaBoost; ensemble; intrusion detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance of such NIDS. Therefore the knowledge of this bound would help researchers estimate the performance of their ensemble of classifiers based network intrusion detection systems (NIDSs) before they even implement them. The performance bound is defined in terms of the average information gain associated with the features used in building the ensemble and is obtained by Adaboosting a decision stump which is the weak classifier in the ensemble. Different proportions of the NSL KDD dataset that was filtered for Neptune and normal connections were used as different datasets in this study for observing the performance behaviour of the ensemble. The bound is based on the performance of this ensemble in classifying the normal and Neptune connections. Classification accuracy was used as the performance measure in this study. From the experimental results, we therefore deduce that, if the average information gain value amongst features used in the ensemble lies between 0.045651 and 0.25615 then the classification accuracy of the ensemble will be at most 0.9.
引用
收藏
页码:970 / 974
页数:5
相关论文
共 18 条
[1]  
[Anonymous], APPL COMPUT INTELL S
[2]  
[Anonymous], 2004, Intrusion detection and correlation: challenges and solutions
[3]  
BORJI A, 2007, P ANN AS COMP SCI C, V4846, P254
[4]  
Freund Y., 1996, Machine Learning. Proceedings of the Thirteenth International Conference (ICML '96), P148
[5]  
Govindarajan M., 2012, P WORLD C ENG COMP S, V1, P459
[6]  
HU W, 2005, P IEEE WIC ACM INT C, P712
[7]  
Mokarian A, 2013, INT J COMPUT SCI NET, V13, P128
[8]  
Natesan P., 2012, J INFORM COMPUTATION, V8, P2239
[9]  
Prusti D., 2015, An efficient intrusion detection model using ensemble methods
[10]  
Schapire R. E., 2013, Empirical Inference, P37, DOI [DOI 10.1007/978-3-642-41136-65, 10.1007/978-3-642-41136-65, DOI 10.1007/978-3-642-41136-6_5]