Machine learning approaches to network intrusion detection for contemporary internet traffic

被引:19
作者
Ilyas, Muhammad U. [1 ]
Alharbi, Soltan Abed [1 ,2 ]
机构
[1] Univ Jeddah, Coll Comp Sci & Engn, Dept Comp & Network Engn, Jeddah, Saudi Arabia
[2] Univ Jeddah, Coll Engn, Dept Elect & Elect Engn, Jeddah, Saudi Arabia
关键词
Machine learning; Network intrusion detection system; CSE-CIC-IDS2018; Malware;
D O I
10.1007/s00607-021-01050-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
All organizations, be they businesses, governments, infrastructure or utility providers, depend on the availability and functioning of their computers, computer networks and data centers for all or part of their operations. Network intrusion detection systems are the first line of defense that protect computing infrastructure from external attacks. In this study we develop five different Machine Learning classifiers for a number of attacks. We used the CSE-CIC-IDS2018 dataset, developed in a collaborative effort between the Communications Security Establishment and the Canadian Institute for Cybersecurity. It is an extensive network traffic trace dataset that captures multiple attacks and has become available relatively recently. The previous major dataset used for the development of network intrusion detection systems is the KDD Cup'99 dataset, now going on 22 years, which predates mobile computing, Web 2.0/3.0, social media, streaming video and widespread use of SSL. These significant Internet trends of the last two decades demand a reevaluation and redevelopment of intrusion detectors. Prior studies that designed Machine Learning classifiers using the CSE-CIC-IDS2018 dataset use a large and rich set of features, of which at least one is not dataset-invariant. Almost none have explored the appropriateness of using all available features with datasets containing only a few hundred attack class samples. The classifiers developed in this study rely on a justifiable number of features and their performance is reviewed for stability and generalization by reporting not just average performance over 10 fold cross-validation but also the degree of variation from one fold to the next.
引用
收藏
页码:1061 / 1076
页数:16
相关论文
共 20 条
[1]   A comprehensive survey on machine learning for networking: evolution, applications and research opportunities [J].
Boutaba, Raouf ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Ayoubi, Sara ;
Shahriar, Nashid ;
Estrada-Solano, Felipe ;
Caicedo, Oscar M. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9 (01)
[2]  
Catillo Marta, 2020, Web, Artificial Intelligence and Network Applications. Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020). Advances in Intelligent Systems and Computing (AISC 1150), P687, DOI 10.1007/978-3-030-44038-1_63
[3]   Contemporary Sequential Network Attacks Prediction using Hidden Markov Model [J].
Chadza, Timothy ;
Kyriakopoulos, Konstantinos G. ;
Lambotharan, Sangarapillai .
2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, :333-335
[4]  
Chastikova V. A., 2019, Journal of Physics: Conference Series, V1353, DOI 10.1088/1742-6596/1353/1/012133
[5]   FORMULA FOR THE GINI COEFFICIENT [J].
DORFMAN, R .
REVIEW OF ECONOMICS AND STATISTICS, 1979, 61 (01) :146-149
[6]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[7]  
for Cybersecurity CI, 2021, GITH COM CICFL CICFL
[8]  
kim jiyeon, 2019, Journal of Multimedia Information System, V6, P165
[9]   Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset [J].
Koroniotis, Nickolaos ;
Moustafa, Nour ;
Sitnikova, Elena ;
Turnbull, Benjamin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :779-796
[10]   Dynamic Network Anomaly Detection System by Using Deep Learning Techniques [J].
Lin, Peng ;
Ye, Kejiang ;
Xu, Cheng-Zhong .
CLOUD COMPUTING - CLOUD 2019, 2019, 11513 :161-176