Multi-layer stacking ensemble learners for low footprint network intrusion detection

被引:0
作者
Saeed Shafieian
Mohammad Zulkernine
机构
[1] Queen’s University,School of Computing
来源
Complex & Intelligent Systems | 2023年 / 9卷
关键词
Network intrusion detection; Anomaly detection; Ensemble learning; Stacking ensemble learning; Low footprint intrusion;
D O I
暂无
中图分类号
学科分类号
摘要
Machine learning has become the standard solution to problems in many areas, such as image recognition, natural language processing, and spam detection. In the area of network intrusion detection, machine learning techniques have also been successfully used to detect anomalies in network traffic. However, there is less tolerance in the network intrusion detection domain in terms of errors, especially false positives. In this paper, we define strict acceptance criteria, and show that only very few ensemble learning classifiers are able to meet them in detecting low footprint network intrusions. We compare bagging, boosting, and stacking techniques, and show how methods such as multi-layer stacking can outperform other ensemble techniques and non-ensemble models in detecting such intrusions. We show how different variations on a stacking ensemble model can play a significant role on the classification performance. Malicious examples in our dataset are from the network intrusions that exfiltrate data from a target machine. The benign examples are captured by network taps in geographically different locations on a big corporate network. Among hundreds of ensemble models based on seven different base learners, only three multi-layer stacking models meet the strict acceptance criteria, and achieve an F1 score of 0.99, and a false-positive rate of 0.001. Furthermore, we show that our ensemble models outperform different deep neural network models in classifying low footprint network intrusions.
引用
收藏
页码:3787 / 3799
页数:12
相关论文
共 50 条
[21]   Latent Patterns Detection and Interpretation in Multi-Layer Temporal Network [J].
Han, Dongxuan ;
Lu, Dandan ;
Zheng, Sijie ;
Jiang, Hongyu ;
Wu, Yadong .
IEEE ACCESS, 2020, 8 :132786-132798
[22]   Multi-layer perceptron for network intrusion detection From a study on two recent data sets to deployment on automotive processor [J].
Rosay, Arnaud ;
Riou, Kevin ;
Carlier, Florent ;
Leroux, Pascal .
ANNALS OF TELECOMMUNICATIONS, 2022, 77 (5-6) :371-394
[23]   DSEM-NIDS: Enhanced Network Intrusion Detection System Using Deep Stacking Ensemble Model [J].
Mahmoud, Loreen ;
Liyanage, Madhusanka ;
Singla, Jitin ;
Gangopadhyay, Sugata .
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2025, 6 :955-967
[24]   ARMBoost plus : Empowering stacking, ensemble, and boosting models for network intrusion detection with dynamic rule repository [J].
Vivek, Vullikanti ;
Veeravalli, Bharadwaj .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 243
[25]   A stacked ensemble learning model for intrusion detection in wireless network [J].
Hariharan Rajadurai ;
Usha Devi Gandhi .
Neural Computing and Applications, 2022, 34 :15387-15395
[26]   A stacked ensemble learning model for intrusion detection in wireless network [J].
Rajadurai, Hariharan ;
Gandhi, Usha Devi .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (18) :15387-15395
[27]   APPLYING A NEURAL NETWORK ENSEMBLE TO INTRUSION DETECTION [J].
Ludwig, Simone A. .
JOURNAL OF ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING RESEARCH, 2019, 9 (03) :177-188
[28]   A multi-layer model for anomaly intrusion detection using program sequences of system calls [J].
Hoang, XD ;
Hu, H ;
Bertok, P .
ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, :531-536
[29]   An adaptive nonlinear whale optimization multi-layer perceptron cyber intrusion detection framework [J].
El-Ghaish, Hany ;
Miqrish, Haitham ;
Elmogy, Ahmed ;
Elawady, Wael .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2024, 15 (10) :4801-4814
[30]   Designing Scalable Intrusion Detection Systems with Stacking Based Ensemble Learning [J].
Reddy, A. Sujan ;
Akashdeep, S. ;
Kamath, S. Sowmya ;
Rudra, Bhawana .
INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA 2021, 2022, 418 :859-869