An effective intrusion detection approach using SVM with naive Bayes feature embedding

被引:190
作者
Gu, Jie [1 ,2 ]
Lu, Shan [3 ]
机构
[1] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[2] Agr Bank China, Postdoctoral Res Stn, Beijing 100005, Peoples R China
[3] Cent Univ Finance & Econ, Sch Math & Stat, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
Intrusion detection; Feature embedding; Network security; Support vector machine; SUPPORT VECTOR MACHINE; ANOMALY DETECTION SYSTEMS; SELF-ORGANIZING MAP; FEATURE-SELECTION; CLASSIFIER; ENSEMBLE; TAXONOMY;
D O I
10.1016/j.cose.2020.102158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security has become increasingly important in recent decades, while intrusion detection system plays a critical role in protecting it. Various machine learning techniques have been applied to intrusion detection, among which SVM has been considered as an effective method. However, existing studies rarely take the data quality into consideration, which is essential for constructing a well-performed intrusion detection system beyond machine learning techniques. In this paper, we propose an effective intrusion detection framework based on SVM with naiv e Bayes featur e embedding. Specificall y, the naiv e Bayes feature transformation technique is implemented on the original features to generate new data with high quality; then, an SVM classifier is trained using the transformed data to build the intrusion detection model. Experiments on multiple datasets in intrusion detection domain validate that the proposed detection method can achieve good and robust performances, with 93.75% accuracy on UNSW-NB15 dataset, 98.92% accuracy on CICIDS2017 dataset, 99.35% accuracy on NSL-KDD dataset and 98.58% accuracy on Kyoto 2006+ dataset. Furthermore, our method possesses huge advantages in terms of accuracy, detection rate and false alarm rate when compared to other methods. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:19
相关论文
共 83 条
[1]   Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection [J].
Abdulhammed, Razan ;
Musafer, Hassan ;
Alessa, Ali ;
Faezipour, Miad ;
Abuzneid, Abdelshakour .
ELECTRONICS, 2019, 8 (03)
[2]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[3]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[4]   A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models [J].
Ahmim, Ahmed ;
Maglaras, Leandros ;
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Janicke, Helge .
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, :228-233
[5]   Robust adaptive multivariate Hotelling's T2 control chart based on kernel density estimation for intrusion detection system [J].
Ahsan, Muhammad ;
Mashuri, Muhammad ;
Lee, Muhammad Hisyam ;
Kuswanto, Heri ;
Prastyo, Dedy Dwi .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 145
[6]   Intrusion detection taxonomy and data preprocessing mechanisms [J].
Al-Utaibi, Khaled A. ;
El-Alfy, El-Sayed M. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) :1369-1383
[7]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[8]   One-class support vector classifiers: A survey [J].
Alam, Shamshe ;
Sonbhadra, Sanjay Kumar ;
Agarwal, Sonali ;
Nagabhushan, P. .
KNOWLEDGE-BASED SYSTEMS, 2020, 196
[9]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[10]   MaldomDetector: A system for detecting algorithmically generated domain names with machine learning [J].
Almashhadani, Ahmad O. ;
Kaiiali, Mustafa ;
Carlin, Domhnall ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 93