TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection

被引:39
作者
Chkirbene, Zina [1 ]
Erbad, Aiman [1 ]
Hamila, Ridha [1 ]
Mohamed, Amr [1 ]
Guizani, Mohsen [1 ]
Hamdi, Mounir [2 ]
机构
[1] Qatar Univ, Coll Engn, Doha, Qatar
[2] HBK Univ, Coll Sci Engn & Technol, Doha, Qatar
关键词
Feature extraction; Intrusion detection; Heuristic algorithms; Cloud computing; Machine learning; Computational modeling; Machine learning algorithms; Cloud security; node past behavior; feature selection; trustworthiness; system cleansing; machine learning techniques;
D O I
10.1109/ACCESS.2020.2994931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. However, high dimensional data present a significant challenge for machine learning techniques. Processing similar features that provide redundant information increases the computational time, which is a critical problem especially for users with constrained resources (battery, energy). In this paper, we propose two models for intrusion detection and classification scheme Trust-based Intrusion Detection and Classification System (TIDCS) and Trust-based Intrusion Detection and Classification System- Accelerated (TIDCS-A) for secure network. TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. Initially, the features are grouped randomly to increase the probability of making them participating in the generation of different groups, and sorted based on their accuracy scores. Only the high ranked features are then selected to obtain a classification for any received packet from the nodes in the network, which is saved as part of the node & x2019;s past performance. TIDCS proposes a periodic system cleansing where trust relationships between participant nodes are evaluated and renewed periodically. TIDCS-A proposes a dynamic algorithm to compute the exact time for nodes cleansing states and restricts the exposure window of the nodes. The final classification decision for both models is estimated by incorporating the node & x2019;s past behavior with the machine learning algorithm. Any detected attack reduces the trustworthiness of the nodes involved, leading to a dynamic system cleansing. An evaluation of TIDCS and TIDCS-A using the NSL-KDD and UNSW datasets shows that both models can detect malicious behaviors providing higher accuracy, detection rates, and lower false alarm than state-of-art techniques. For instance, for UNSW dataset, the accuracy detection is 91 & x0025; for TICDS, 83.47 & x0025;by using online AODE, 88 & x0025; for CADF, 90 & x0025; for EDM, 90 & x0025; for TANN and 69.6 & x0025; for NB. Consequently, TICDS has better performance than the state of art techniques in terms of accuracy detection, while providing good detection and false alarm rates.
引用
收藏
页码:95864 / 95877
页数:14
相关论文
共 40 条
[1]  
Aljumah A, 2018, 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), P237, DOI 10.1109/ICCCC.2018.8390464
[2]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[3]   Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection [J].
An, Xingshuo ;
Lu, Xing ;
Yang, Lei ;
Zhou, Xianwei ;
Lin, Fuhong .
IEEE ACCESS, 2019, 7 :21879-21888
[4]   Cybersecurity for industrial control systems: A survey [J].
Bhamare, Deval ;
Zolanvari, Maede ;
Erbad, Aiman ;
Jain, Raj ;
Khan, Khaled ;
Meskin, Nader .
COMPUTERS & SECURITY, 2020, 89
[5]   Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers [J].
Bilal, Kashif ;
Khalid, Osman ;
Erbad, Aiman ;
Khan, Samee U. .
COMPUTER NETWORKS, 2018, 130 :94-120
[6]  
Bilbao Imanol, 2017, 2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS). Proceedings, P173, DOI 10.1109/INTELCIS.2017.8260032
[7]   A review of feature selection methods on synthetic data [J].
Bolon-Canedo, Veronica ;
Sanchez-Marono, Noelia ;
Alonso-Betanzos, Amparo .
KNOWLEDGE AND INFORMATION SYSTEMS, 2013, 34 (03) :483-519
[8]  
Borkar A, 2017, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), P949, DOI 10.1109/ICICI.2017.8365277
[9]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[10]   A survey on feature selection methods [J].
Chandrashekar, Girish ;
Sahin, Ferat .
COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) :16-28