Intrusion detection in cyber-physical environment using hybrid Naive Bayes-Decision table and multi-objective evolutionary feature selection

被引:33
作者
Panigrahi, Ranjit [1 ]
Borah, Samarjeet [1 ]
Pramanik, Moumita [1 ]
Bhoi, Akash Kumar [2 ,3 ,4 ,5 ]
Barsocchi, Paolo [5 ]
Nayak, Soumya Ranjan [6 ]
Alnumay, Waleed [7 ]
机构
[1] Sikkim Manipal Univ, Sikkim Manipal Inst Technol, Dept Comp Applicat, Majitar 737136, Sikkim, India
[2] Delhi NCR, KIET Grp Inst, Ghaziabad 201206, India
[3] Sikkim Manipal Univ, Directorate Res, Gangtok 737102, Sikkim, India
[4] AB Tech eRes ABTeR, Burla 768018, Sambalpur, India
[5] CNR, Inst Informat Sci & Technol, I-56124 Pisa, Italy
[6] Amity Univ Uttar Pradesh, Amity Sch Engn & Technol, Noida, India
[7] King Saud Univ, Dept CS, Riyadh, Saudi Arabia
关键词
Intrusion detection; DTNB; Signature-based; Botnet detection; Denial of Service (DoS) attacks; Distributed Denial of Service (DDoS) attacks; Web attacks; Class imbalance; NETWORK; SCHEME;
D O I
10.1016/j.comcom.2022.03.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers are motivated to build effective Intrusion Detection Systems because of the implications of malicious actions in computing, communication, and cyber-physical systems (IDSs). In order to develop signature-based intrusion detection techniques that are suitable for use in cyber-physical environments, stateof-the-art supervised learning algorithms are devised. The main contribution of this research is the introduction of a signature-based intrusion detection model that is based on a hybrid Decision Table and Naive Bayes technique. In addition, the contribution of the suggested method is evaluated by comparing it to the existing literature in the field. In the preprocessing stage, Multi-Objective Evolutionary Feature Selection (MOEFS) feature selection has been used to select only five attack features from the recent CICIDS017 dataset. Keeping in view the class imbalance nature of CICIDS2017 dataset, adequate attack samples has been selected with more weightage to the attack classes having a smaller number of instances in the dataset. A hybrid of Decision Table and Naive Bayes models were combined to train and detect intrusions. Detection of botnets, port scans, Denial of Service (DoS)/Distributed Denial of Service (DDoS) attacks, such as Golden-Eye, Hulk, Slow httptest, slowloris, Heartbleed, Brute Force attacks, such as Patator (FTP), Patator (SSH), and Web attacks such as Infiltration, Web Brute Force, SQL Injection, and XSS, are all successfully detected by the proposed hybrid detection model. The proposed approach shows an accuracy of 96.8% using five features of CICIDS2017, which is higher than the accuracy of methods discussed in the literatures.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 47 条
[11]   Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Shi, Yong .
KNOWLEDGE-BASED SYSTEMS, 2017, 126 :113-126
[12]  
Bouckaert R.R., 2016, WEKA Manual for Version 3-8-1
[13]   Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge [J].
Casas, Pedro ;
Mazel, Johan ;
Owezarski, Philippe .
COMPUTER COMMUNICATIONS, 2012, 35 (07) :772-783
[14]   A trust enhanced secure clustering framework for wireless ad hoc networks [J].
Chatterjee, Pushpita ;
Ghosh, Uttam ;
Sengupta, Indranil ;
Ghosh, Soumya K. .
WIRELESS NETWORKS, 2014, 20 (07) :1669-1684
[15]   Modified stacking ensemble approach to detect network intrusion [J].
Demir, Necati ;
Dalkilic, Gokhan .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (01) :418-433
[16]   A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks [J].
Dey, Saurabh ;
Ye, Qiang ;
Sampalli, Srinivas .
INFORMATION FUSION, 2019, 49 :205-215
[17]   Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices [J].
Eskandari, Mojtaba ;
Janjua, Zaffar Haider ;
Vecchio, Massimo ;
Antonelli, Fabio .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) :6882-6897
[18]  
Gharib A., 2016, 2016 INT C INF SCI S, P1, DOI DOI 10.1109/ICISSEC.2016.7885840
[19]   A Secure Addressing Scheme for Large-Scale Managed MANETs [J].
Ghosh, Uttam ;
Datta, Raja .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2015, 12 (03) :483-495
[20]  
Gross G., 2019, INTRUSION DETECTION