Ensemble classification for intrusion detection via feature extraction based on deep Learning

被引:32
作者
Yousefnezhad, Maryam [1 ]
Hamidzadeh, Javad [1 ]
Aliannejadi, Mohammad [2 ]
机构
[1] Sadjad Univ Technol, Fac Comp Engn & Informat Technol, Mashhad, Razavi Khorasan, Iran
[2] Univ Amsterdam, IRLab, Amsterdam, Netherlands
关键词
Intrusion detection system; Dempster-Shafer; Deep learning; Ensemble margin; Classification; NEURAL-NETWORKS; REPRESENTATION; PREDICTION; MODEL;
D O I
10.1007/s00500-021-06067-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An intrusion detection system is a security system that aims to detect sabotage and intrusions on networks to inform experts of the attack and abuse of the network. Different classification methods have been used in the intrusion detection systems such as fuzzy, genetic algorithms, decision trees, artificial neural networks, and support vector machines. Moreover, ensemble classifiers have shown more robust and effective performance for various tasks in the field. In this paper, we adopt ensemble models in order to improve the performance of intrusion detection and, at the same time, decrease the false alarm rate. We use kNN for multi-class classification, as well as SVM to approach the classification problem in normal-based detection. In order to combine multiple outputs, we use the Dempster-Shafer method in which there is the possibility of explicit retrieval of uncertainty. Moreover, we utilize deep learning for extracting features to train the samples, selected by the sample selection algorithm based on ensemble margin. We compare our results with state-of-the-art methods on benchmarking datasets such as UNSW-NB15, CICIDS2017, and NSL-KDD. Our proposed method indicates the superiority in terms of prominent metrics Accuracy, Precision, Recall, and F-measure.
引用
收藏
页码:12667 / 12683
页数:17
相关论文
共 50 条
[21]   Improved churn prediction in telecommunication industry using data mining techniques [J].
Keramati, A. ;
Jafari-Marandi, R. ;
Aliannejadi, M. ;
Ahmadian, I. ;
Mozaffari, M. ;
Abbasi, U. .
APPLIED SOFT COMPUTING, 2014, 24 :994-1012
[22]  
Khonde S. R., 2019, Journal of Cyber Security Technology, V3, P163, DOI 10.1080/23742917.2019.1623475
[23]  
Kubat Miroslav, 1999, The Knowledge Engineering Review, V13, P409, DOI DOI 10.1017/S0269888998214044
[24]  
Kumari VV, 2017, INT C ISMAC
[25]   Nearest neighbors based density peaks approach to intrusion detection [J].
Li, Lixiang ;
Zhang, Hao ;
Peng, Haipeng ;
Yang, Yixian .
CHAOS SOLITONS & FRACTALS, 2018, 110 :33-40
[26]   Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model [J].
Li, Wenjuan ;
Meng, Weizhi ;
Kwok, Lam-For ;
Ip, Horace H. S. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 :135-145
[27]   Use of K-Nearest Neighbor classifier for intrusion detection [J].
Liao, YH ;
Vemuri, VR .
COMPUTERS & SECURITY, 2002, 21 (05) :439-448
[28]   CANN: An intrusion detection system based on combining cluster centers and nearest neighbors [J].
Lin, Wei-Chao ;
Ke, Shih-Wen ;
Tsai, Chih-Fong .
KNOWLEDGE-BASED SYSTEMS, 2015, 78 :13-21
[29]  
Ludwig, 2019, J ARTIF INTEL SOFT C
[30]   New Hermite orthogonal polynomial kernel and combined kernels in Support Vector Machine classifier [J].
Moghaddam, Vahid Hooshmand ;
Hamidzadeh, Javad .
PATTERN RECOGNITION, 2016, 60 :921-935