Ensemble classification for intrusion detection via feature extraction based on deep Learning

被引:32
作者
Yousefnezhad, Maryam [1 ]
Hamidzadeh, Javad [1 ]
Aliannejadi, Mohammad [2 ]
机构
[1] Sadjad Univ Technol, Fac Comp Engn & Informat Technol, Mashhad, Razavi Khorasan, Iran
[2] Univ Amsterdam, IRLab, Amsterdam, Netherlands
关键词
Intrusion detection system; Dempster-Shafer; Deep learning; Ensemble margin; Classification; NEURAL-NETWORKS; REPRESENTATION; PREDICTION; MODEL;
D O I
10.1007/s00500-021-06067-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An intrusion detection system is a security system that aims to detect sabotage and intrusions on networks to inform experts of the attack and abuse of the network. Different classification methods have been used in the intrusion detection systems such as fuzzy, genetic algorithms, decision trees, artificial neural networks, and support vector machines. Moreover, ensemble classifiers have shown more robust and effective performance for various tasks in the field. In this paper, we adopt ensemble models in order to improve the performance of intrusion detection and, at the same time, decrease the false alarm rate. We use kNN for multi-class classification, as well as SVM to approach the classification problem in normal-based detection. In order to combine multiple outputs, we use the Dempster-Shafer method in which there is the possibility of explicit retrieval of uncertainty. Moreover, we utilize deep learning for extracting features to train the samples, selected by the sample selection algorithm based on ensemble margin. We compare our results with state-of-the-art methods on benchmarking datasets such as UNSW-NB15, CICIDS2017, and NSL-KDD. Our proposed method indicates the superiority in terms of prominent metrics Accuracy, Precision, Recall, and F-measure.
引用
收藏
页码:12667 / 12683
页数:17
相关论文
共 50 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[3]  
ALENEZI KA, 2014, INT C ADV COMP SCI A
[4]   An enhanced J48 classification algorithm for the anomaly intrusion detection systems [J].
Aljawarneh, Shadi ;
Yassein, Muneer Bani ;
Aljundi, Mohammed .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5) :10549-10565
[5]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[6]  
Anderson, 1908, INT J COMPUT SCI MOB
[7]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[8]  
Breiman L., 1984, CLASSIFICATION REGRE, V37, P237, DOI [DOI 10.1201/9781315139470, 10.1201/9781315139470-8, DOI 10.1201/9781315139470-8]
[9]   NEAREST NEIGHBOR PATTERN CLASSIFICATION [J].
COVER, TM ;
HART, PE .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1967, 13 (01) :21-+
[10]  
Demsar J, 2006, J MACH LEARN RES, V7, P1