MLTs-ADCNs: Machine Learning Techniques for Anomaly Detection in Communication Networks

被引:20
作者
Oleiwi, Haider W. [1 ]
Mhawi, Doaa N. [2 ]
Al-Raweshidy, Hamed [1 ]
机构
[1] Brunel Univ London, Dept Elect & Elect Engn, London UB8 3PH, England
[2] Middle Tech Univ, Dept Comp Syst Tech, Baghdad 10010, Iraq
关键词
Feature extraction; Classification algorithms; Intrusion detection; Correlation; Support vector machines; Bagging; Anomaly detection; Machine learning; Communication networks; Adaboosting algorithm; Bagging algorithm; correlation feature selection; ensemble method; intrusion detection systems; FEATURE-SELECTION; DETECTION MODEL; ENSEMBLE;
D O I
10.1109/ACCESS.2022.3201869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
From a security perspective, the research of the jeopardized 6G wireless communications and its expected ultra-densified ubiquitous wireless networks urge the development of a robust intrusion detection system (IDS) with powerful capabilities which could not be sufficiently provided by the existing conventional systems. IDSs are still insufficient against continuous renewable unknown attacks on the wireless communication networks, especially with the new highly vulnerable networks, leading to low accuracy and detection rate with high (false-negative and false-positive) rates. To this end, this paper proposed a novel anomaly detection in communication networks by using an ensemble learning (EL) algorithm-based anomaly detection in communication networks (ADCNs). EL-ADCNs consists of four main stages; the first stage is the preprocessing steps. The feature selection method is the second stage. It adopts the proposed hybrid method using correlation with the random forest algorithm of ensemble learning (CFS-RF). It reduces dimensionality and retrieves the best subset feature of all the three datasets (NSL_KDD, UNSW_NB2015, and CIC_IDS2017) separately. The third stage is using hybrid EL algorithms to detect intrusions. It involves modifying two classifiers (i.e., random forest (RF), and support vector machine (SVM)) to apply them as adaboosting and bagging EL Algorithms; using the voting average technique as an aggregation process. The final stage is testing the proposal using binary and multi-class classification forms. The experimental results of applying 30, 35, and 40 features of the proposed system to the three datasets achieved the best results of a 99.6% accuracy with a 0.004 false-alarm rate for NSL_KDD, a 99.1% accuracy with a 0.008 false-alarm rate for UNSW_NB2015, and a 99.4% accuracy with a 0.0012 false-alarm rate for CIC_IDS2017.
引用
收藏
页码:91006 / 91017
页数:12
相关论文
共 43 条
  • [1] Profiling and classifying the behavior of malicious codes
    Alazab, Mamoun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 : 91 - 102
  • [2] A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns
    Creech, Gideon
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) : 807 - 819
  • [3] Hybrid approach to intrusion detection in fog-based IoT environments
    de Souza, Cristiano Antonio
    Westphall, Carlos Becker
    Machado, Renato Bobsin
    Mangueira Sobral, Joao Bosco
    Vieira, Gustavo dos Santos
    [J]. COMPUTER NETWORKS, 2020, 180 (180)
  • [4] Dovgal V. A., 2021, PROC CEUR WORKSHOP, V2914, P316
  • [5] DAREnsemble: Decision Tree and Rule Learner Based Ensemble for Network Intrusion Detection System
    Gaikwad, Dwarkoba
    Thool, Ravindra
    [J]. PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 185 - 193
  • [6] CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems
    Gupta, Neha
    Jindal, Vinita
    Bedi, Punam
    [J]. COMPUTERS & SECURITY, 2022, 112
  • [7] Hota H., 2014, Advanced Computing, Networking and Informatics-Volume, V1, P205, DOI DOI 10.1007/978
  • [8] Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models
    Ikram, Sumaiya Thaseen
    Cherukuri, Aswani Kumar
    Poorva, Babu
    Ushasree, Pamidi Sai
    Zhang, Yishuo
    Liu, Xiao
    Li, Gang
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (03) : 175 - 188
  • [9] Ikram ST, 2017, J KING SAUD UNIV-COM, V29, P462, DOI 10.1016/j.jksuci.2015.12.004
  • [10] Jabardi M., 2020, KARBALA INT J MOD SC, V6, P8, DOI [10.33640/2405-609X.2285, DOI 10.33640/2405-609X.2285]