Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective

被引:0
作者
Amit Kumar Mishra
Shweta Paliwal
机构
[1] DIT University,School of Computing
来源
Cluster Computing | 2023年 / 26卷
关键词
Network security; Machine learning; Ensemble learning; Feature selection; Internet of things;
D O I
暂无
中图分类号
学科分类号
摘要
The network traffic has observed astounding expansion and is set to explode in the next few years. Security attacks are becoming more and more synchronized as attackers are involved in using new orchestrated techniques that are capable of initiating attacks such as zero-day vector and slow loris. These attacks are surpassing the current network analytic solutions employed in the infrastructure of the network. Machine learning (ML) based approaches are successfully quelling modern-day attacks by analyzing the patterns in the encrypted network traffic. Detection strategies based on labelled datasets that are a combination of synthesized attacks and modern normal attacks became the need of the hour. In this study, three benchmark datasets; UNSWNB15, NSL- KDD, and BoT-Internet of things are a combination of modern-day orchestrated security attacks. The datasets are processed and feature selection is performed using information gain and correlation coefficient (Pearson). Once the features are identified they are subjected to the following classifiers; stacking of light gradient boosting machine (LGBM) and random forest, stochastic gradient descent, Gaussian Naive Bayes (GNB), support vector machine (SVM), bagging + reduced error pruning, K nearest neighbour and AdaBoost. Thus it has been observed that stacking of LGBM and random forest has given the highest predictions for all three datasets.
引用
收藏
页码:2339 / 2350
页数:11
相关论文
共 102 条
[1]  
Panda M(2021)Developing an efficient feature engineering and machine learning model for detecting IoT-Botnet cyber attacks IEEE Access 9 91038-91052
[2]  
Abd Allah AM(2016)The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set Inf. Secur. J. A Glob. Perspect. 25 18-31
[3]  
Hassanien AE(2021)Machine learning methods for cyber security intrusion detection: datasets and comparative study Comput. Netw. 188 79-89
[4]  
Moustafa N(2018)Semi-supervised learning based distributed attack detection framework for IoT Appl. Soft Comput. 72 155-161
[5]  
Slay J(2017)A novel technique for intrusion detection system for network security using hybrid svm-cart Int. J. Eng. Dev. Res. 5 152-160
[6]  
Kilincer IF(2018)Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model J. Comput. Sci. 25 391-400
[7]  
Ertam F(2016)A two-level hybrid approach for intrusion detection Neurocomputing 214 420-432
[8]  
Sengur A(2016)Feature selection for intrusion detection system using ant colony optimization IJ Netw. Secur. 18 80-88
[9]  
Rathore S(2019)Cyber intrusion detection by combined feature selection algorithm J. Inf. Secur. Appl. 44 541-553
[10]  
Park JH(2019)Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms J. King Saud Univ.-Comput. Inf. Sci. 13 12060-12073