An intrusion detection scheme based on the ensemble of discriminant classifiers

被引:32
作者
Bhati, Bhoopesh Singh [1 ]
Rai, C. S. [2 ]
Balamurugan, B. [3 ]
Al-Turjman, Fadi [4 ]
机构
[1] Govt NCT Delhi, Ambedkar Inst Adv Commun Technol & Res, Delhi, India
[2] Guru Gobind Singh Indraprastha Univ, Univ Sch Informat Commun & Technol, New Delhi, India
[3] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, India
[4] Near East Univ, Res Ctr AI & IoT, Artificial Intelligence Engn Dept, Mersin 10, Nicosia, Turkey
关键词
Embedded systems - Cybersecurity - Intrusion detection - Denial-of-service attack - Learning systems - Network security;
D O I
10.1016/j.compeleceng.2020.106742
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber-physical system and modern technology are useful in various applications of the network. However, various types of bugs and vulnerabilities are also brought along with modern technologies. The attacks caused by vulnerabilities create huge losses, necessitating the need to detect these attacks. Although, considerable work has been done by the researchers so far, but novel attacks are yet to be detected. Existing schemes are suitable for denial of service (DOS) type of attack class. However, these schemes are not efficiently detecting other types of attack classes such as Probing, Remote to User (R2L) and User to Root (U2R). In view of this, a new intrusion detection scheme based on ensemble of discriminant classifiers is proposed in this paper. In ensemble of discriminant classifier method, weak learners are converted into strong learners. KDDcup99 dataset has been used in the proposed scheme for empirical evaluation. The results show that the proposed scheme is superior in detecting all types of attack classes by achieving 98.9% overall accuracy. Network security, Cyber-physical system, Intrusion detection, Ensemble methods, Discriminant classifier, Denial of service (DOS) (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:9
相关论文
共 18 条
[1]  
AbdElrahman SM, 2014, 2014 14TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), P181, DOI 10.1109/HIS.2014.7086194
[2]   Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems [J].
Achbarou, Omar ;
El Kiram, My Ahmed ;
El Bouanani, Salim .
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (03) :61-64
[3]  
[Anonymous], 2002, Workshop on information assurance
[4]  
Bhati Bhoopesh Singh, 2016, International Journal of Critical Computer-Based Systems, V6, P173
[5]   Incorporating soft computing techniques into a probabilistic intrusion detection system [J].
Cho, SB .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2002, 32 (02) :154-160
[6]   Ensemble of Machine Learning Algorithms for Intrusion Detection [J].
Chou, Te-Shun ;
Fan, Jeffrey ;
Fan, Sharon ;
Makki, Kia .
2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, :3976-+
[7]   An ensemble-based evolutionary framework for coping with distributed intrusion detection [J].
Folino, Gianluigi ;
Pizzuti, Clara ;
Spezzano, Giandomenico .
GENETIC PROGRAMMING AND EVOLVABLE MACHINES, 2010, 11 (02) :131-146
[8]   A decision-theoretic generalization of on-line learning and an application to boosting [J].
Freund, Y ;
Schapire, RE .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1997, 55 (01) :119-139
[9]  
Gogoi P, 2013, INFORM-J COMPUT INFO, V37, P93
[10]   Anomaly based Intrusion Detection using Modified Fuzzy Clustering [J].
Harish, B. S. ;
Kumar, S. V. Aruna .
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06) :54-59