A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM

被引:81
作者
Wisanwanichthan, Treepop [1 ]
Thammawichai, Mason [1 ]
机构
[1] Navaminda Kasatriyadhiraj Royal Air Force Acad, Bangkok 10220, Thailand
关键词
Feature extraction; Support vector machines; Machine learning; Probes; Radio frequency; Principal component analysis; Correlation; Correlation feature selection; double-layered hybrid approach; machine learning; Naive Bayes; intrusion detection system; network security; NSL-KDD; SVM; DEEP LEARNING APPROACH; FEATURE-SELECTION; SECURITY APPROACH; DETECTION MODEL; RANDOM FOREST; MACHINE; CLASSIFIER; ALGORITHM; ENSEMBLE; COLONY;
D O I
10.1109/ACCESS.2021.3118573
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A pattern matching method (signature-based) is widely used in basic network intrusion detection systems (IDS). A more robust method is to use a machine learning classifier to detect anomalies and unseen attacks. However, a single machine learning classifier is unlikely to be able to accurately detect all types of attacks, especially uncommon attacks e.g., Remote2Local (R2L) and User2Root (U2R) due to a large difference in the patterns of attacks. Thus, a hybrid approach offers more promising performance. In this paper, we proposed a Double-Layered Hybrid Approach (DLHA) designed specifically to address the aforementioned problem. We studied common characteristics of different attack categories by creating Principal Component Analysis (PCA) variables that maximize variance from each attack type, and found that R2L and U2R attacks have similar behaviour to normal users. DLHA deploys Naive Bayes classifier as Layer 1 to detect DoS and Probe, and adopts SVM as Layer 2 to distinguish R2L and U2R from normal instances. We compared our work with other published research articles using the NSL-KDD data set. The experimental results suggest that DLHA outperforms several existing state-of-the-art IDS techniques, and is significantly better than any single machine learning classifier by large margins. DLHA also displays an outstanding performance in detecting rare attacks by obtaining a detection rate of 96.67% and 100% from R2L and U2R respectively.
引用
收藏
页码:138432 / 138450
页数:19
相关论文
共 90 条
[1]   Principal component analysis [J].
Abdi, Herve ;
Williams, Lynne J. .
WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (04) :433-459
[2]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[3]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[4]  
Alfantookh AA, 2006, J KING SAUD UNIV-COM, V18, P27
[5]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[6]  
[Anonymous], 2015, International Journal of Advanced Research in Computer and Communication Engineering
[7]  
[Anonymous], 2013, IAENG T ENG TECHNOLO
[8]  
[Anonymous], 2011, Acm T. Intel. Syst. Tec., DOI DOI 10.1145/1961189.1961199
[9]   A hybrid method consisting of GA and SVM for intrusion detection system [J].
Aslahi-Shahri, B. M. ;
Rahmani, R. ;
Chizari, M. ;
Maralani, A. ;
Eslami, M. ;
Golkar, M. J. ;
Ebrahimi, A. .
NEURAL COMPUTING & APPLICATIONS, 2016, 27 (06) :1669-1676
[10]   SoftSwitch: a centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks [J].
Baykara, Muhammet ;
Das, Resul .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (05) :3309-3325