Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset

被引:45
作者
Mahfouz, Ahmed [1 ]
Abuhussein, Abdullah [2 ]
Venugopal, Deepak [1 ]
Shiva, Sajjan [1 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[2] St Cloud State Univ, Dept Informat Syst, St Cloud, MN 56301 USA
关键词
IDS; ensemble classifier; intrusion detection; ML; GTCS dataset;
D O I
10.3390/fi12110180
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the extensive use of computer networks, new risks have arisen, and improving the speed and accuracy of security mechanisms has become a critical need. Although new security tools have been developed, the fast growth of malicious activities continues to be a pressing issue that creates severe threats to network security. Classical security tools such as firewalls are used as a first-line defense against security problems. However, firewalls do not entirely or perfectly eliminate intrusions. Thus, network administrators rely heavily on intrusion detection systems (IDSs) to detect such network intrusion activities. Machine learning (ML) is a practical approach to intrusion detection that, based on data, learns how to differentiate between abnormal and regular traffic. This paper provides a comprehensive analysis of some existing ML classifiers for identifying intrusions in network traffic. It also produces a new reliable dataset called GTCS (Game Theory and Cyber Security) that matches real-world criteria and can be used to assess the performance of the ML classifiers in a detailed experimental evaluation. Finally, the paper proposes an ensemble and adaptive classifier model composed of multiple classifiers with different learning paradigms to address the issue of the accuracy and false alarm rate in IDSs. Our classifiers show high precision and recall rates and use a comprehensive set of features compared to previous work.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 75 条
  • [1] Ahmae KA, 2018, INT J INTEGR ENG, V10, P48
  • [2] [Anonymous], 2013, INT J ADV RES COMPUT
  • [3] [Anonymous], 1994, MACHINE LEARNING
  • [4] [Anonymous], 2014, ARXIV14020856
  • [5] Araujo Nelcileno, 2010, 2010 17th International Conference on Telecommunications (ICT 2010), P552, DOI 10.1109/ICTEL.2010.5478852
  • [6] Arzhakov A.V., 2016, INT J ELECT COMPUT E, V6, P1681
  • [7] Azeez N.A., 2019, INTRUSION DETECTION, P685
  • [8] Balaganesh D, 2018, EJERS, V3, P7
  • [9] Beck JE, 2000, LECT NOTES COMPUT SC, V1839, P584
  • [10] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123