A tree-based stacking ensemble technique with feature selection for network intrusion detection

被引:74
作者
Rashid, Mamunur [1 ]
Kamruzzaman, Joarder [2 ]
Imam, Tasadduq [3 ]
Wibowo, Santoso [1 ]
Gordon, Steven [1 ]
机构
[1] CQUniversity, Sch Engn & Technol, Rockhampton, Qld, Australia
[2] Federat Univ, Sch Engn & Informat Technol, Ballarat, Vic, Australia
[3] CQUniversity, Sch Business & Law, Melbourne, Vic, Australia
关键词
Machine learning; Ensemble techniques; Anomaly detection; Cybersecurity; Intrusion detection seystem; CLASSIFIER;
D O I
10.1007/s10489-021-02968-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Several studies have used machine learning algorithms to develop intrusion systems (IDS), which differentiate anomalous behaviours from the normal activities of network systems. Due to the ease of automated data collection and subsequently an increased size of collected data on network traffic and activities, the complexity of intrusion analysis is increasing exponentially. A particular issue, due to statistical and computation limitations, a single classifier may not perform well for large scale data as existent in modern IDS contexts. Ensemble methods have been explored in literature in such big data contexts. Although more complicated and requiring additional computation, literature has a note that ensemble methods can result in better accuracy than single classifiers in different large scale data classification contexts, and it is interesting to explore how ensemble approaches can perform in IDS. In this research, we introduce a tree-based stacking ensemble technique (SET) and test the effectiveness of the proposed model on two intrusion datasets (NSL-KDD and UNSW-NB15). We further enhance incorporate feature selection techniques to select the best relevant features with the proposed SET. A comprehensive performance analysis shows that our proposed model can better identify the normal and anomaly traffic in network than other existing IDS models. This implies the potentials of our proposed system for cybersecurity in Internet of Things (IoT) and large scale networks.
引用
收藏
页码:9768 / 9781
页数:14
相关论文
共 51 条
  • [1] A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
    Alazzam, Hadeel
    Sharieh, Ahmad
    Sabri, Khair Eddin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2020, 148 (148)
  • [2] Ali J., 2012, INT J COMPUT SCI APP, V9, P272
  • [3] [Anonymous], 2011, Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, DOI DOI 10.1145/1978672.1978676
  • [4] Bansal A., 2018, INT C ADV COMPUTING, P372, DOI DOI 10.1007/978-981-13-1810-8_37
  • [5] Decision-Tree, Rule-Based, and Random Forest Classification of High-Resolution Multispectral Imagery for Wetland Mapping and Inventory
    Berhane, Tedros M.
    Lane, Charles R.
    Wu, Qiusheng
    Autrey, Bradley C.
    Anenkhonov, Oleg A.
    Chepinoga, Victor V.
    Liu, Hongxing
    [J]. REMOTE SENSING, 2018, 10 (04)
  • [6] Biswas S., 2018, International Journal of Pure and Applied Mathematics, V118, P101
  • [7] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [8] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [9] XGBoost Classifier for DDoS Attack Detection and Analysis in SDN-based Cloud
    Chen, Zhuo
    Jiang, Fu
    Cheng, Yijun
    Gu, Xin
    Liu, Weirong
    Peng, Jun
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2018, : 251 - 256
  • [10] Effective Intrusion Detection System Using XGBoost
    Dhaliwal, Sukhpreet Singh
    Abdullah-Al Nahid
    Abbas, Robert
    [J]. INFORMATION, 2018, 9 (07)