An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis

被引:12
作者
Chowdhury, Ratul [1 ]
Sen, Shibaprasad [2 ]
Roy, Arindam [3 ]
Saha, Banani [3 ]
机构
[1] Future Inst Engn & Management, Kolkata, India
[2] Univ Engn & Management, Kolkata, India
[3] Univ Calcutta, Kolkata, India
关键词
Intrusion detection system; NSL-KDD dataset; Moth-flame optimization; Bagging ensemble method; Real-time test-bed; MOTH-FLAME OPTIMIZATION; ALGORITHM;
D O I
10.1007/s11042-022-12330-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The enormous growth of cyber threats has become a calamitous issue in today's technically advanced world where data and information play a crucial role in identifying patterns and automatic predictive analysis. Network packet analysis is a pivotal technique in cybersecurity to protect our network and computer from unauthorized access. A network intrusion detection system (NIDS) is a network packet monitoring tool that intently inspects all the incoming and outgoing packets passing through a network and recognizes malicious incidents. This paper proposes a novel NIDS using the decision tree-based Bagging ensemble method, where the NSL-KDD dataset has been used for experimental purposes. The optimal features from the mentioned dataset have been filtered through the application of the wrapper-based Moth Flame optimization (MFO) technique and the effectiveness of the selected features has been evaluated using various machine learning, deep learning, and ensemble learning frameworks. All the experiments have been conducted in accordance with both binary and multiclass categories. Exhaustive performance evaluation confirms that the proposed MFO-ENSEMBLE method achieves an 87.43% detection rate and incurs minimal time overhead amongst all classification techniques. Practical implementation of the proposed methodology in a custom-built real-time test-bed confirms both the novelty as well as the feasibility of this work.
引用
收藏
页码:41225 / 41247
页数:23
相关论文
共 37 条
[1]   Whale Optimization Algorithm and Moth-Flame Optimization for multilevel thresholding image segmentation [J].
Abd El Aziz, Mohamed ;
Ewees, Ahmed A. ;
Hassanien, Aboul Ella .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 83 :242-256
[2]  
Aburomman AA, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, ELECTRONIC AND SYSTEMS ENGINEERING (ICAEES), P362, DOI 10.1109/ICAEES.2016.7888070
[3]  
Akinbo Racheal S., 2021, MACHINE LEARNING ALG
[4]  
Bajaj K., 2013, INT J COMPUTER APPL, P5
[5]  
Bhlmann P, 2012, HDB COMPUTATIONAL ST
[6]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[7]   An efficient network intrusion detection [J].
Chen, Chia-Mei ;
Chen, Ya-Lin ;
Lin, Hsiao-Chung .
COMPUTER COMMUNICATIONS, 2010, 33 (04) :477-484
[8]  
Chowdhury R., 2021, DATA DRIVEN APPROACH, P337
[9]  
Esmaily J, 2015, 2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT)
[10]  
Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688