Machine Learning-Based Anomaly Detection Using K-Mean Array and Sequential Minimal Optimization

被引:26
作者
Gadal, Saad [1 ]
Mokhtar, Rania [2 ]
Abdelhaq, Maha [3 ]
Alsaqour, Raed [4 ]
Ali, Elmustafa Sayed [5 ]
Saeed, Rashid [2 ]
机构
[1] Sudan Univ Sci & Technol, Elect Engn Dept, Khartoum 11111, Sudan
[2] Taif Univ, Coll Comp & Informat Technol, Dept Comp Engn, POB 11099, Taif 21944, Saudi Arabia
[3] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[4] Saudi Elect Univ, Coll Comp & Informat, Dept Informat Technol, Riyadh 93499, Saudi Arabia
[5] Red Sea Univ, Dept Elect & Elect Engn, Port Sudan 33311, Sudan
关键词
anomaly detection; hybrid algorithm; data mining; sequential minimal optimization; k-mean clustering; network security; FRAMEWORK;
D O I
10.3390/electronics11142158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, artificial intelligence (AI) techniques have been used to describe the characteristics of information, as they help in the process of data mining (DM) to analyze data and reveal rules and patterns. In DM, anomaly detection is an important area that helps discover hidden behavior within the data that is most vulnerable to attack. It also helps detect network intrusion. Algorithms such as hybrid K-mean array and sequential minimal optimization (SMO) rating can be used to improve the accuracy of the anomaly detection rate. This paper presents an anomaly detection model based on the machine learning (ML) technique. ML improves the detection rate, reduces the false-positive alarm rate, and is capable of enhancing the accuracy of intrusion classification. This study used a dataset known as network security-knowledge and data discovery (NSL-KDD) lab to evaluate a proposed hybrid ML technology. K-mean cluster and SMO were used for classification. In the study, the performance of the proposed anomaly detection was tested, and results showed that the use of K-mean and SMO enhances the rate of positive detection besides reducing the rate of false alarms and achieving a high accuracy at the same time. Moreover, the proposed algorithm outperformed recent and close work related to using similar variables and the environment by 14.48% and decreased false alarm probability (FAP) by (12%) in addition to giving a higher accuracy by 97.4%. These outcomes are attributed to the common algorithm providing an appropriate number of detectors to be generated with an acceptable accurate detection and a trivial false alarm probability (FAP). The proposed hybrid algorithm could be considered for anomaly detection in future data mining systems, where processing in real-time is highly likely to be reduced dramatically. The justification is that the hybrid algorithm can provide appropriate detectors numbers that can be generated with an acceptable detection accuracy and trivial FAP. Given to the low FAP, it is highly expected to reduce the time of the preprocessing and processing compared with the other algorithms.
引用
收藏
页数:19
相关论文
共 42 条
[1]   Optimizing Energy Consumption for Cloud Internet of Things [J].
Ahmed, Zeinab E. ;
Hasan, Mohammad Kamrul ;
Saeed, Rashid A. ;
Hassan, Rosilah ;
Islam, Shayla ;
Mokhtar, Rania A. ;
Khan, Sheroz ;
Akhtaruzzaman .
FRONTIERS IN PHYSICS, 2020, 8
[2]   Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications [J].
Ali, Elmustafa Sayed ;
Hasan, Mohammad Kamrul ;
Hassan, Rosilah ;
Saeed, Rashid A. ;
Hassan, Mona Bakri ;
Islam, Shayla ;
Nafi, Nazmus Shaker ;
Bevinakoppa, Savitri .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[3]   Development of Self-Synchronized Drones' Network Using Cluster-Based Swarm Intelligence Approach [J].
Alsolami, Fawaz ;
Alqurashi, Fahad A. ;
Hasan, Mohammad Kamrul ;
Saeed, Rashid A. ;
Abdel-Khalek, S. ;
Ben Ishak, Anis .
IEEE ACCESS, 2021, 9 :48010-48022
[4]   A Theoretical Study of Anomaly Detection in Big Data Distributed Static and Stream Analytics [J].
Amen, Bakhtiar ;
Grigoris, Antonio .
IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, :1177-1182
[5]  
Anandharaj A., 2019, 2019 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA). Proceedings, P1287, DOI 10.1109/ICECA.2019.8821966
[6]  
Barbará D, 2001, SIGMOD RECORD, V30, P15, DOI 10.1145/604264.604268
[7]  
Cai SH, 2019, CHINA COMMUN, V16, P83, DOI 10.23919/JCC.2019.10.006
[8]   Voila: Visual Anomaly Detection and Monitoring with Streaming Spatiotemporal Data [J].
Cao, Nan ;
Lin, Chaoguang ;
Zhu, Qiuhan ;
Lin, Yu-Ru ;
Teng, Xian ;
Wen, Xidao .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2018, 24 (01) :23-33
[9]   HADIoT: A Hierarchical Anomaly Detection Framework for IoT [J].
Chang, Haotian ;
Feng, Jing ;
Duan, Chaofan .
IEEE ACCESS, 2020, 8 :154530-154539
[10]  
Chen Z, 2018, IEEE INT CONF BIG DA, P982, DOI 10.1109/BigData.2018.8622004