Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection

被引:16
作者
Rashid, A. N. M. Bazlur [1 ]
Ahmed, Mohiuddin [1 ]
Sikos, Leslie F. [1 ]
Haskell-Dowland, Paul [1 ]
机构
[1] Edith Cowan Univ, Sch Sci, 270 Joondalup Dr, Joondalup, WA 6027, Australia
关键词
Anomaly detection; feature selection; cybersecurity; Big Data; cooperative co-evolution; machine learning; INTRUSION DETECTION; OPTIMIZATION; COEVOLUTION; NETWORK; COMPUTATION; ALGORITHM;
D O I
10.1145/3495165
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very challenging and computationally expensive task. Feature selection (FS) is an approach to remove irrelevant and redundant features and select a subset of features, which can improve the machine learning algorithms' performance. In fact, FS is an effective preprocessing step of anomaly detection techniques. This article's main objective is to improve and quantify the accuracy and scalability of both supervised and unsupervised anomaly detection techniques. In this effort, a novel anomaly detection approach using FS, called Anomaly Detection Using Feature Selection (ADUFS), has been introduced. Experimental analysis was performed on five different benchmark cybersecurity datasets with and without feature selection and the performance of both supervised and unsupervised anomaly detection techniques were investigated. The experimental results indicate that instead of using the original dataset, a dataset with a reduced number of features yields better performance in terms of true positive rate (TPR) and false positive rate (FPR) than the existing techniques for anomaly detection. For example, with FS, a supervised anomaly detection technique, multilayer perception increased the TPR by over 200% and decreased the FPR by about 97% for the KDD99 dataset. Similarly, with FS, an unsupervised anomaly detection technique, local outlier factor increased the TPR by more than 40% and decreased the FPR by 15% and 36% for Windows 7 and NSL-KDD datasets, respectively. In addition, all anomaly detection techniques require less computational time when using datasets with a suitable subset of features rather than entire datasets. Furthermore, the performance results have been compared with six other state-of-the-art techniques based on a decision tree (J48).
引用
收藏
页数:39
相关论文
共 57 条
  • [1] Intelligent Big Data Summarization for Rare Anomaly Detection
    Ahmed, Mohiuddin
    [J]. IEEE ACCESS, 2019, 7 : 68669 - 68677
  • [2] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [3] A survey of anomaly detection techniques in financial domain
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Islam, Md. Rafiqul
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 278 - 288
  • [4] Ahmed Usman, 2021, ICDCN '21: Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking, P43, DOI 10.1145/3427477.3429990
  • [5] Alabdel Abass Ahmed A., 2016, 2016 Annual Conference on Information Science and Systems (CISS), P36, DOI 10.1109/CISS.2016.7460473
  • [6] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998
  • [7] [Anonymous], 2019, ACM Trans. Intell. Syst. Technol., DOI DOI 10.1145/3298981
  • [8] Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset
    Bagui, Sikha
    Kalaimannan, Ezhil
    Bagui, Subhash
    Nandi, Debarghya
    Pinto, Anthony
    [J]. SECURITY AND PRIVACY, 2019, 2 (06)
  • [9] A Two-Phase Anomaly Detection Model for Secure Intelligent Transportation Ride-Hailing Trajectories
    Belhadi, Asma
    Djenouri, Youcef
    Srivastava, Gautam
    Djenouri, Djamel
    Cano, Alberto
    Lin, Jerry Chun-Wei
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) : 4496 - 4506
  • [10] Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach
    Binbusayyis, Adel
    Vaiyapuri, Thavavel
    [J]. IEEE ACCESS, 2019, 7 : 106495 - 106513