FSAFA-stacking2: An Effective Ensemble Learning Model for Intrusion Detection with Firefly Algorithm Based Feature Selection

被引:0
作者
Chen, Guo [1 ]
Zheng, Junyao [1 ]
Yang, Shijun [1 ]
Zhou, Jieying [1 ]
Wu, Weigang [1 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT II | 2022年 / 13156卷
关键词
Intrusion detection; Ensemble learning; Stacking; Feature selection; Firefly algorithm;
D O I
10.1007/978-3-030-95388-1_37
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a two-layer ensemble learning model stacking2 based on the Stacking framework to deal with the problems of lack of generalization ability and low detection rate of single model intrusion detection system. The stacking2 uses SAMME, GBDT, and RF to generate the primary learner in the first layer and constructs the meta learner using the logistic regression algorithm in the second layer. The meta learner learns from the class probability outputs produced by the primary learner. In order to solve "the curse of dimensionality" of intrusion detection dataset, this paper proposes the feature selection approach based on firefly algorithm (FSAFA), which is used to select the optimal feature subsets. Based on the selected optimal feature subsets, the training set and test set are reconstructed and then applied to stacking2. As a result, a FSAFA based stacking2 intrusion detection model is proposed. The UNSW-NB15 and NSL-KDD datasets are chosen to verify the effectiveness of the proposed model. The experiment results show that the stacking2 intrusion detection model has better generalization ability than the individual learner based intrusion detection models. Compared with other typical algorithms, the FSAFA based stacking2 intrusion detection model has good performance in detection rate.
引用
收藏
页码:555 / 570
页数:16
相关论文
共 25 条
[1]  
Anderson J.P., 1980, Computer Security Threat Monitoring and Surveillance
[2]  
Brugger T., 2007, KDD Cup 99 dataset (Network Intrusion) considered harmful (KDnuggets News 07:18, item 4, Features)
[3]   Modified stacking ensemble approach to detect network intrusion [J].
Demir, Necati ;
Dalkilic, Gokhan .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (01) :418-433
[4]  
Didaci L., 2002, WORKSH MACH LEARN ME
[5]  
El Farissi I, 2016, COLLOQ INF SCI TECH, P145, DOI 10.1109/CIST.2016.7805032
[6]   A novel intrusion detection system based on hierarchical clustering and support vector machines [J].
Horng, Shi-Jinn ;
Su, Ming-Yang ;
Chen, Yuan-Hsin ;
Kao, Tzong-Wann ;
Chen, Rong-Jian ;
Lai, Jui-Lin ;
Perkasa, Citra Dwi .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (01) :306-313
[7]  
Idowu R.K., 2016, P 2 INT C TASUED UCC, P1539
[8]  
Javaid A., 2016, P 9 EAI INT C BIOINS, P21, DOI [https://doi.org/10.4108/eai.3-12-2015.2262516, DOI 10.4108/EAI.3-12-2015.2262516]
[9]   An effective combining classifier approach using tree algorithms for network intrusion detection [J].
Kevric, Jasmin ;
Jukic, Samed ;
Subasi, Abdulhamit .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 :S1051-S1058
[10]   A GA-LR wrapper approach for feature selection in network intrusion detection [J].
Khammassi, Chaouki ;
Krichen, Saoussen .
COMPUTERS & SECURITY, 2017, 70 :255-277