A tree-based stacking ensemble technique with feature selection for network intrusion detection

被引:74
作者
Rashid, Mamunur [1 ]
Kamruzzaman, Joarder [2 ]
Imam, Tasadduq [3 ]
Wibowo, Santoso [1 ]
Gordon, Steven [1 ]
机构
[1] CQUniversity, Sch Engn & Technol, Rockhampton, Qld, Australia
[2] Federat Univ, Sch Engn & Informat Technol, Ballarat, Vic, Australia
[3] CQUniversity, Sch Business & Law, Melbourne, Vic, Australia
关键词
Machine learning; Ensemble techniques; Anomaly detection; Cybersecurity; Intrusion detection seystem; CLASSIFIER;
D O I
10.1007/s10489-021-02968-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Several studies have used machine learning algorithms to develop intrusion systems (IDS), which differentiate anomalous behaviours from the normal activities of network systems. Due to the ease of automated data collection and subsequently an increased size of collected data on network traffic and activities, the complexity of intrusion analysis is increasing exponentially. A particular issue, due to statistical and computation limitations, a single classifier may not perform well for large scale data as existent in modern IDS contexts. Ensemble methods have been explored in literature in such big data contexts. Although more complicated and requiring additional computation, literature has a note that ensemble methods can result in better accuracy than single classifiers in different large scale data classification contexts, and it is interesting to explore how ensemble approaches can perform in IDS. In this research, we introduce a tree-based stacking ensemble technique (SET) and test the effectiveness of the proposed model on two intrusion datasets (NSL-KDD and UNSW-NB15). We further enhance incorporate feature selection techniques to select the best relevant features with the proposed SET. A comprehensive performance analysis shows that our proposed model can better identify the normal and anomaly traffic in network than other existing IDS models. This implies the potentials of our proposed system for cybersecurity in Internet of Things (IoT) and large scale networks.
引用
收藏
页码:9768 / 9781
页数:14
相关论文
共 51 条
  • [41] TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System
    Tama, Bayu Adhi
    Comuzzi, Marco
    Rhee, Kyung-Hyune
    [J]. IEEE ACCESS, 2019, 7 : 94497 - 94507
  • [42] Tama BA, 2017, COMPUT SYST SCI ENG, V32, P149
  • [43] Taneja Mohit, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P1222, DOI 10.23919/INM.2017.7987464
  • [44] Tavallaee M., 2009, 2009 IEEE S COMP INT, P1, DOI DOI 10.1109/CISDA.2009.5356528
  • [45] TRP, 2015, Int. J. Comput. Commun. Eng, V4, P196, DOI [10.17148/ijarcce.2015.4142, DOI 10.17148/IJARCCE.2015.4142]
  • [46] Intrusion detection by machine learning: A review
    Tsai, Chih-Fong
    Hsu, Yu-Feng
    Lin, Chia-Ying
    Lin, Wei-Yang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (10) : 11994 - 12000
  • [47] STACKED GENERALIZATION
    WOLPERT, DH
    [J]. NEURAL NETWORKS, 1992, 5 (02) : 241 - 259
  • [48] Machine Learning and Deep Learning Methods for Cybersecurity
    Xin, Yang
    Kong, Lingshuang
    Liu, Zhi
    Chen, Yuling
    Li, Yanmiao
    Zhu, Hongliang
    Gao, Mingcheng
    Hou, Haixia
    Wang, Chunhua
    [J]. IEEE ACCESS, 2018, 6 : 35365 - 35381
  • [49] A New Metaheuristic Bat-Inspired Algorithm
    Yang, Xin-She
    [J]. NICSO 2010: NATURE INSPIRED COOPERATIVE STRATEGIES FOR OPTIMIZATION, 2010, 284 : 65 - 74
  • [50] An Overview of Overfitting and its Solutions
    Ying, Xue
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168