TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System

被引:213
作者
Tama, Bayu Adhi [1 ]
Comuzzi, Marco [1 ]
Rhee, Kyung-Hyune [2 ]
机构
[1] Ulsan Natl Inst Sci & Technol, Sch Management Engn, Ulsan 44919, South Korea
[2] Pukyong Natl Univ, Dept IT Convergence & Applicat Engn, Busan 48513, South Korea
来源
IEEE ACCESS | 2019年 / 7卷
基金
新加坡国家研究基金会;
关键词
Two-stage meta classifier; network anomaly detection; hybrid feature selection; intrusion detection system; statistical significance test; MACHINE; INTERNET; THINGS; SECURITY; FOREST; MODEL;
D O I
10.1109/ACCESS.2019.2928048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering and repealing malicious activities in computer networks. Anomaly-based IDS, in particular, rely on classification models trained using historical data to discover such malicious activities. In this paper, an improved IDS based on hybrid feature selection and two-level classifier ensembles are proposed. A hybrid feature selection technique comprising three methods, i.e., particle swarm optimization, ant colony algorithm, and genetic algorithm, is utilized to reduce the feature size of the training datasets (NSL-KDD and UNSW-NB15 are considered in this paper). Features are selected based on the classification performance of a reduced error pruning tree (REPT) classifier. Then, a two-level classifier ensemble based on two meta learners, i.e., rotation forest and bagging, is proposed. On the NSL-KDD dataset, the proposed classifier shows 85.8% accuracy, 86.8% sensitivity, and 88.0% detection rate, which remarkably outperform other classification techniques recently proposed in the literature. The results regarding the UNSW-NB15 dataset also improve the ones achieved by several state-of-the-art techniques. Finally, to verify the results, a two-step statistical significance test is conducted. This is not usually considered by the IDS research thus far and, therefore, adds value to the experimental results achieved by the proposed classifier.
引用
收藏
页码:94497 / 94507
页数:11
相关论文
共 67 条
  • [1] Abu Taher K, 2019, 2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), P643, DOI [10.1109/ICREST.2019.8644161, 10.1109/icrest.2019.8644161]
  • [2] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [3] [Anonymous], 2012, ENSEMBLE METHODS FDN
  • [4] [Anonymous], NEURAL COMPUT APPL
  • [5] [Anonymous], 2015, PROCEEDINGSOF INT WO
  • [6] [Anonymous], 2015, Nature, DOI [10.1038/nature14539, DOI 10.1038/NATURE14539]
  • [7] [Anonymous], P AUSTR COMP SCI WEE
  • [8] [Anonymous], 2017, 2017 INT C DAT SOFTW
  • [9] [Anonymous], 2018, P INNOVATIVE SECURIT
  • [10] [Anonymous], 1999, Swarm intelligence