MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems

被引:9
作者
Hammad, Mohamed [1 ]
Hewahi, Nabil [1 ]
Elmedany, Wael [1 ]
机构
[1] Univ Bahrain, Coll Informat Technol, Zallaq, Bahrain
关键词
Intrusion detection; Statistics; Network traffic; Multinomial mixture model; Computer security; ANOMALY DETECTION; RANDOM FOREST; PERFORMANCE; MACHINE; GA;
D O I
10.1016/j.cose.2022.102777
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of malicious practice in network traffic is one of the most noticeable issues in network security. This practice is negatively impacting the productivity of various organizations and end-users. In this paper, a novel approach called Multinomial Mixture Modeling with Median Absolute Deviation and Random Forest Algorithm (MMM-RF) is proposed for the classification of network attacks. Conducted with a three fold objective, this paper aims to use Correlation Feature Selection (CFS) to perform analysis on the most prominent factors involved in network traffic, focuses on using T-Distributed Stochastic Neighbor Embedding (T-SNE) to minimize data dimension, and finally, the study explores the use of Synthetic Minority Oversampling Technique (SMOTE) coupled with random under-sampling in controlling imbalance in the CSE-CIC-IDS2018 dataset. The use of Multinomial Mixture Modeling (MMM) in this study is coupled with the Expectation-Maximization (EM) algorithm and Median Absolute Deviation (MAD). This precedes the use of the Random Forest (RF) classification algorithm on the CSE-CIC-IDS2018 dataset experiment. The outcome showed a high detection accuracy of 99 . 98% and a very low False Positive Rate (FPR) of 0 . 02% .(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 62 条
[1]   Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI) [J].
Adadi, Amina ;
Berrada, Mohammed .
IEEE ACCESS, 2018, 6 :52138-52160
[2]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[3]   Feature Selection Using Information Gain for Improved Structural-Based Alert Correlation [J].
Alhaj, Taqwa Ahmed ;
Siraj, Maheyzah Md ;
Zainal, Anazida ;
Elshoush, Huwaida Tagelsir ;
Elhaj, Fatin .
PLOS ONE, 2016, 11 (11)
[4]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[5]   Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Khan, Asif Irshad ;
Alzahrani, Nouf ;
Bakhsh, Sheikh Tahir ;
Alassafi, Madini O. ;
Alshdadi, Abdulrahman ;
Qaiyum, Sana .
ELECTRONICS, 2020, 9 (06) :1-20
[6]  
[Anonymous], 1980, Probability and Mathematical Statistics
[7]   Automated optimized parameters for T-distributed stochastic neighbor embedding improve visualization and analysis of large datasets [J].
Belkina, Anna C. ;
Ciccolella, Christopher O. ;
Anno, Rina ;
Halpert, Richard ;
Spidlen, Josef ;
Snyder-Cappione, Jennifer E. .
NATURE COMMUNICATIONS, 2019, 10 (1)
[8]   Multi-Measure Multi-Weight Ranking Approach for the Identification of the Network Features for the Detection of DoS and Probe Attacks [J].
Bhattacharya, Sangeeta ;
Selvakumar, S. .
COMPUTER JOURNAL, 2016, 59 (06) :923-943
[9]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[10]  
Boujnouni M.E., 2018, INT J NETW SECUR, V20