Cascaded Multi-Class Network Intrusion Detection With Decision Tree and Self-attentive Model

被引:5
作者
Lan, Yuchen [1 ,2 ]
Truong-Huu, Tram [3 ]
Wu, Jiyan [2 ]
Teo, Sin G. [2 ]
机构
[1] Natl Univ Singapore NUS, Singapore, Singapore
[2] Agcy Sci Technol & Res STAR, Inst Infocomm Res I2R, Singapore, Singapore
[3] Singapore Inst Technol SIT, Singapore, Singapore
来源
2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW | 2022年
关键词
Intrusion detection; decision tree; transformer; classification; network attack detection; deep learning;
D O I
10.1109/ICDMW58026.2022.00081
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network intrusion has become a leading threat to breaching the security of Internet applications. With the re-emergence of artificial intelligence, deep neural networks (DNN) have been widely used for network intrusion detection. However, one main problem with the DNN models is the dependency on sufficient high-quality labeled data to train the model to achieve decent accuracy. DNN models may incur many false predictions on the imbalanced intrusion datasets, especially on the minority classes. While we continue advocating for using machine learning and deep learning for network intrusion detection, we aim at addressing the drawback of existing DNN models by effectively integrating decision tree and feature tokenizer (FT)-transformer. First, the decision tree algorithm is used for the binary classification of regular (normal) traffic and malicious traffic. Second, FT-transformer performs the multi-category classification on that malicious traffic to identify the type of attacking traffic. We conduct the performance evaluation using three publicly available datasets: CIC-IDS 2017, UNSW-NB15, and Kitsune datasets. Experimental results show that among three datasets, the proposed technique achieves the best performance on the CIC-IDS 2017 dataset with the macro precision, recall, and F1-score of 84.6%, 83.6%, and 93.2%, respectively.
引用
收藏
页码:586 / 592
页数:7
相关论文
共 50 条
  • [31] Identifying False Alarm for Network Intrusion Detection System Using Data Mining and Decision Tree
    Anuar, Nor Badrul
    Sallehudin, Hasimi
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON DATA NETWORKS, COMMUNICATIONS, COMPUTERS (DNCOCO '08): RECENT ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS, 2008, : 22 - 28
  • [32] Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic
    Manderna, Ankit
    Kumar, Sushil
    Dohare, Upasana
    Aljaidi, Mohammad
    Kaiwartya, Omprakash
    Lloret, Jaime
    SENSORS, 2023, 23 (21)
  • [33] The best separating decision tree twin support vector machine for multi-class classification
    Shao, Yuan-Hai
    Chen, Wei-Jie
    Huang, Wen-Biao
    Yang, Zhi-Min
    Deng, Nai-Yang
    FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2013, 17 : 1032 - 1038
  • [34] A New SVM Decision Tree Multi-class Classification Algorithm Based on Mahalanobis Distance
    Diao Zhihua
    Wu Yuanyuan
    2011 30TH CHINESE CONTROL CONFERENCE (CCC), 2011, : 3124 - 3127
  • [35] A genetically optimized neural network model for multi-class classification
    Bhardwaj, Arpit
    Tiwari, Aruna
    Bhardwaj, Harshit
    Bhardwaj, Aditi
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 60 : 211 - 221
  • [36] Multi-Class Plant Leaf Disease Detection Using a Deep Convolutional Neural Network
    Jadhav, Shriya
    Lal, Anisha M.
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2022, 13 (01)
  • [37] A novel multi-scale network intrusion detection model with transformer
    Xi, Chiming
    Wang, Hui
    Wang, Xubin
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [38] Network Intrusion Detection System Using J48 Decision Tree
    Sahu, Shailendra
    Mehtre, B. M.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2023 - 2026
  • [39] Decision Tree with Sensitive Pruning in Network-based Intrusion Detection System
    Chew, Yee Jian
    Ooi, Shih Yin
    Wong, Kok-Seng
    Pang, Ying Han
    COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 : 1 - 10
  • [40] L2D2: A Novel LSTM Model for Multi-Class Intrusion Detection Systems in the Era of IoMT
    Akar, Gokhan
    Sahmoud, Shaaban
    Onat, Mustafa
    Cavusoglu, Unal
    Malondo, Emmanuel
    IEEE ACCESS, 2025, 13 : 7002 - 7013