Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection

被引:43
作者
Ayo, Femi Emmanuel [1 ]
Folorunso, Sakinat Oluwabukonla [2 ]
Abayomi-Alli, Adebayo A. [3 ]
Adekunle, Adebola Olayinka [4 ]
Awotunde, Joseph Bamidele [5 ]
机构
[1] McPherson Univ, Dept Phys & Comp Sci, Seriki Sotayo, Nigeria
[2] Olabisi Onabanjo Univ, Dept Math Sci, Ago Iwoye, Nigeria
[3] Fed Univ Agr, Dept Comp Sci, Abeokuta, Nigeria
[4] Adeyemi Coll Educ, Comp Sci Dept, Ondo, Nigeria
[5] Univ Ilorin, Dept Comp Sci, Ilorin, Nigeria
来源
INFORMATION SECURITY JOURNAL | 2020年 / 29卷 / 06期
关键词
NIDS; feature selection; deep learning; rule learning; UNSW-NB15; data; DETECTION SYSTEM; ROUTING ALGORITHM; ANOMALY DETECTION; INTERNET; MACHINE; ATTACKS; ENSEMBLE; TAXONOMY; CLUSTER; THINGS;
D O I
10.1080/19393555.2020.1767240
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection System (NIDS) is often used to classify network traffic in an attempt to protect computer systems from various network attacks. A major component for building an efficient intrusion detection system is the preprocessing of network traffic and identification of essential features which is essential for building robust classifier. In this study, a NIDS based on deep learning model optimized with rule-based hybrid feature selection is proposed. The architecture is divided into three phases namely: hybrid feature selection, rule evaluation and detection. Several search methods and attribute evaluators were combined for features selection to enhance experimentation and comparison. The results obtained showed that the number of selected features will not affect the detection accuracy of the feature selection algorithms, but directly proportional to the performance of the base classifier. Results from the performance comparison proved that the proposed method outperforms other related methods with reduction of false alarm rate, high accuracy rate, reduced training and testing time of 1.2%, 98.8%, 7.17s and 3.11s, respectively. Finally, the simulation experiments on standard evaluation metrics showed that the proposed method is suitable for attack classification in NIDS.
引用
收藏
页码:267 / 283
页数:17
相关论文
共 77 条
[21]  
Enache AC, 2014, 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM)
[22]   Revisiting Evolutionary Fuzzy Systems: Taxonomy, applications, new trends and challenges [J].
Fernandez, Alberto ;
Lopez, Victoria ;
Jose del Jesus, Maria ;
Herrera, Francisco .
KNOWLEDGE-BASED SYSTEMS, 2015, 80 :109-121
[23]  
Folorunso O., 2016, J INF PRIV SECUR, V12, P181, DOI DOI 10.1080/15536548.2016.1257680
[24]  
Ganapathy S, 2016, INT ARAB J INF TECHN, V13, P44
[25]  
Gautam S., 2010, 2010 International Conference on Power, Control and Embedded Systems, P1
[26]  
Goldber D. E., 1988, Machine Learning, V3, P95, DOI 10.1023/A:1022602019183
[27]   A feature cluster taxonomy based feature selection technique [J].
Goswami, Saptarsi ;
Das, Amit Kumar ;
Chakrabarti, Amlan ;
Chakraborty, Basabi .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 79 :76-89
[28]   Reducing false positives of network anomaly detection by local adaptive multivariate smoothing [J].
Grill, Martin ;
Pevny, Tomas ;
Rehak, Martin .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 83 (01) :43-57
[29]  
Haykin S., 1999, Neural Networks: A Comprehensive Foundation, V2
[30]   Conversion methods for symbolic features: A comparison applied to an intrusion detection problem [J].
Hernandez-Pereira, E. ;
Suarez-Romero, J. A. ;
Fontenla-Romero, O. ;
Alonso-Betanzos, A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (07) :10612-10617