Intrusion detection in cyber-physical environment using hybrid Naive Bayes-Decision table and multi-objective evolutionary feature selection

被引:33
作者
Panigrahi, Ranjit [1 ]
Borah, Samarjeet [1 ]
Pramanik, Moumita [1 ]
Bhoi, Akash Kumar [2 ,3 ,4 ,5 ]
Barsocchi, Paolo [5 ]
Nayak, Soumya Ranjan [6 ]
Alnumay, Waleed [7 ]
机构
[1] Sikkim Manipal Univ, Sikkim Manipal Inst Technol, Dept Comp Applicat, Majitar 737136, Sikkim, India
[2] Delhi NCR, KIET Grp Inst, Ghaziabad 201206, India
[3] Sikkim Manipal Univ, Directorate Res, Gangtok 737102, Sikkim, India
[4] AB Tech eRes ABTeR, Burla 768018, Sambalpur, India
[5] CNR, Inst Informat Sci & Technol, I-56124 Pisa, Italy
[6] Amity Univ Uttar Pradesh, Amity Sch Engn & Technol, Noida, India
[7] King Saud Univ, Dept CS, Riyadh, Saudi Arabia
关键词
Intrusion detection; DTNB; Signature-based; Botnet detection; Denial of Service (DoS) attacks; Distributed Denial of Service (DDoS) attacks; Web attacks; Class imbalance; NETWORK; SCHEME;
D O I
10.1016/j.comcom.2022.03.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers are motivated to build effective Intrusion Detection Systems because of the implications of malicious actions in computing, communication, and cyber-physical systems (IDSs). In order to develop signature-based intrusion detection techniques that are suitable for use in cyber-physical environments, stateof-the-art supervised learning algorithms are devised. The main contribution of this research is the introduction of a signature-based intrusion detection model that is based on a hybrid Decision Table and Naive Bayes technique. In addition, the contribution of the suggested method is evaluated by comparing it to the existing literature in the field. In the preprocessing stage, Multi-Objective Evolutionary Feature Selection (MOEFS) feature selection has been used to select only five attack features from the recent CICIDS017 dataset. Keeping in view the class imbalance nature of CICIDS2017 dataset, adequate attack samples has been selected with more weightage to the attack classes having a smaller number of instances in the dataset. A hybrid of Decision Table and Naive Bayes models were combined to train and detect intrusions. Detection of botnets, port scans, Denial of Service (DoS)/Distributed Denial of Service (DDoS) attacks, such as Golden-Eye, Hulk, Slow httptest, slowloris, Heartbleed, Brute Force attacks, such as Patator (FTP), Patator (SSH), and Web attacks such as Infiltration, Web Brute Force, SQL Injection, and XSS, are all successfully detected by the proposed hybrid detection model. The proposed approach shows an accuracy of 96.8% using five features of CICIDS2017, which is higher than the accuracy of methods discussed in the literatures.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 47 条
[1]   A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models [J].
Ahmim, Ahmed ;
Maglaras, Leandros ;
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Janicke, Helge .
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, :228-233
[2]   Design of Multilevel Hybrid Classifier with Variant Feature Sets for Intrusion Detection System [J].
Akyol, Aslihan ;
Hacibeyoglu, Mehmet ;
Karlik, Bekir .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (07) :1810-1821
[3]   An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system [J].
Al-Daweri, Muataz Salam ;
Abdullah, Salwani ;
Ariffin, Khairul Akram Zainol .
COMPUTER COMMUNICATIONS, 2021, 180 :57-76
[4]  
Alenezi M., 2018, 5 INT S DAT MIN APPL, V753
[5]   Cascaded hybrid intrusion detection model based on SOM and RBF neural networks [J].
Almiani, Muder ;
AbuGhazleh, Alia ;
Al-Rahayfeh, Amer ;
Razaque, Abdul .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (21)
[6]  
Almutairi Abdullah H., 2017, 2017 International Conference on the Frontiers and Advances in Data Science (FADS). Proceedings, P114, DOI 10.1109/FADS.2017.8253208
[7]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[8]  
Ammar A., 2015, Journal of Computer and Communications, V3, P52
[9]  
Amor NB, 2004, P 2004 ACM S APPL CO, P420
[10]  
[Anonymous], 2008, P FLAIRS C