The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems

被引:93
作者
Iwendi, Celestine [1 ]
Khan, Suleman [2 ]
Anajemba, Joseph Henry [3 ]
Mittal, Mohit [4 ]
Alenezi, Mamdouh [5 ]
Alazab, Mamoun [6 ]
机构
[1] BCC Cent South Univ Forestry & Tech, Dept Elect, Changsha 410004, Peoples R China
[2] Air Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[3] Hohai Univ, Dept Commun Engn, Changzhou 211100, Peoples R China
[4] Kyoto Sangyo Univ, Dept Informat Sci & Engn, Kyoto 6038555, Japan
[5] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh 12435, Saudi Arabia
[6] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0800, Australia
关键词
intrusion detection system; ensemble methods; feature selection; machine learning; false positive rate; artificial intelligence; FEATURE-SELECTION; FOREST;
D O I
10.3390/s20092559
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides many researchers have applied machine learning around this area. Obviously, a single classifier alone in the classifications seems impossible to control network intruders. This limitation is what led us to perform dimensionality reduction by means of correlation-based feature selection approach (CFS approach) in addition to a refined ensemble model. The paper aims to improve the Intrusion Detection System (IDS) by proposing a CFS + Ensemble Classifiers (Bagging and Adaboost) which has high accuracy, high packet detection rate, and low false alarm rate. Machine Learning Ensemble Models with base classifiers (J48, Random Forest, and Reptree) were built. Binary classification, as well as Multiclass classification for KDD99 and NSLKDD datasets, was done while all the attacks were named as an anomaly and normal traffic. Class labels consisted of five major attacks, namely Denial of Service (DoS), Probe, User-to-Root (U2R), Root to Local attacks (R2L), and Normal class attacks. Results from the experiment showed that our proposed model produces 0 false alarm rate (FAR) and 99.90% detection rate (DR) for the KDD99 dataset, and 0.5% FAR and 98.60% DR for NSLKDD dataset when working with 6 and 13 selected features.
引用
收藏
页数:37
相关论文
共 54 条
[1]   A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
INFORMATION SCIENCES, 2017, 414 :225-246
[2]   Feature Selection Using Particle Swarm Optimization in Intrusion Detection [J].
Ahmad, Iftikhar .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[3]   An intrusion detection system based on combining probability predictions of a tree of classifiers [J].
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Ferrag, Mohamed Amine .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (09)
[4]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[5]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[6]   Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation [J].
Anajemba, Joseph Henry ;
Yue, Tang ;
Iwendi, Celestine ;
Alenezi, Mamdouh ;
Mittal, Mohit .
IEEE ACCESS, 2020, 8 :53931-53941
[7]  
[Anonymous], INT J SCI RES PUBL
[8]  
[Anonymous], 2015, INT J COMPUT APPL
[9]   Synthesis and Reactions of Diazoketones [J].
Arora, Ritu ;
Kashyap, Kriti ;
Mittal, Anshika ;
Kakkar, Rita .
ORGANIC PREPARATIONS AND PROCEDURES INTERNATIONAL, 2019, 51 (02) :103-146
[10]   An optimal multitier resource allocation of cloud RAN in 5G using machine learning [J].
Bashir, Ali Kashif ;
Arul, Rajakumar ;
Basheer, Shakila ;
Raja, Gunasekaran ;
Jayaraman, Ramkumar ;
Qureshi, Nawab Muhammad Faseeh .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (08)