Loading [MathJax]/extensions/MathMenu.js
Anomaly Based Network Intrusion Detection Using Ensemble Classifiers | IEEE Conference Publication | IEEE Xplore

Anomaly Based Network Intrusion Detection Using Ensemble Classifiers


Abstract:

Network Intrusion Detection System is extensively utilized for protection and reducing the damages of information system. It protects threats and vulnerabilities in compu...Show More

Abstract:

Network Intrusion Detection System is extensively utilized for protection and reducing the damages of information system. It protects threats and vulnerabilities in computer network. Due to the rapid growth of computer network communications, network intrusion is significantly increased and the intrusion detection is considered as a major issue in nowadays. For secure the communication, it is necessary to identify network attacks or malicious activities in network environment. To detect the intrusion in the network various methods have been proposed in past and effective analysis based on ensemble machine learning methods have been done to detect any types of anomalous events occurred in the flow of network traffic. In the learning process, ensemble methods are known to perform well. Investigating the best ensemble approach is crucial for creating an effective network intrusion detection system. In this paper, we used Bagged Naïve Bayes-Decision Tree (BNBDT) and Random Forest ensemble learning techniques and also used four base classification algorithms which are Naïve Bayes, KNN, Decision Tree and Logistic Regression on NSL-KDD network attack dataset for detecting the anomaly in network traffic and compared the performance of ensemble classifiers with the base classifiers. The proposed ensemble method provides better accuracy and relatively low false alarms rate than the other base classifiers.
Date of Conference: 17-18 December 2022
Date Added to IEEE Xplore: 24 April 2023
ISBN Information:
Conference Location: Dhaka, Bangladesh
References is not available for this document.

I. Introduction

The continuous and rapid technological progress, associated with the need of networking, interconnection and integration of newly systems has implicated to need of higher security provisioning. Information security is a crucial component for defending any organization’s vital data. Any organization that wants to safeguard its networks from unwanted attacks must use security mechanisms. The intruder is identified by the network intrusion detection system which then takes the proper action against the attacker [1]. The attackers attack the system resources for getting the access and collect or destroy valuable information. Network attack can be occurred in various forms. Enterprises need to maintain the highest network security policies, self-training and network security standards to safeguard their assets against the increasingly network threats. Most common types of network attacks are as follows: Man in the middle attack, Denial of service (DoS) attack, DDoS attack, Password attacks such as Brute Force, Surfing and Dictionary, Phishing attack, Malware attack, Ransomware, Botnet attack, SQL Injection, Social Engineering attack and Eavesdropping [2].

Select All
1.
W. Hu, W. Hu and S. Maybank, "AdaBoost-based algorithm for network intrusion detection", IEEE Transactions on Systems Man and Cybernetics Part B: Cybernetics, vol. 38, no. 2, pp. 577-583, Apr. 2008.
2.
A. K. Pandey et al., "Trends in Malware Attacks", pp. 47-60.
3.
S. B. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system", IEEE Transactions on Systems Man and Cybernetics Part C: Applications and Reviews, vol. 32, no. 2, pp. 154-160, 2002.
4.
N. Singh and P. Singh, "A novel Bagged Naïve Bayes-Decision Tree approach for multi-class classification problems", Journal of Intelligent and Fuzzy Systems, vol. 36, no. 3, pp. 2261-2271, 2019.
5.
Z. Bijoy, "Kaggle", 2020, [online] Available: https://www.kaggle.com/datasets/zakariabijoy/nslkdd-finaldata.
6.
I. Sumaiya Thaseen, B. Poorva and P. S. Ushasree, "Network Intrusion Detection using Machine Learning Techniques", International Conference on Emerging Trends in Information Technology and Engineering ic-ETITE 2020, Feb. 2020.
7.
D. P. Gaikwad and R. C. Thool, "Intrusion detection system using bagging ensemble method of machine learning", Proceedings - 1st International Conference on Computing Communication Control and Automation ICCUBEA 2015, pp. 291-295, Jul. 2015.
8.
P. Gogoi, B. Borah and D. K. Bhattacharyya, "Network Anomaly Identification using Supervised Classifier", [online] Available: www.tezu.ernet.in.
9.
S. Peddabachigari, A. Abraham, C. Grosan and J. Thomas, "Modeling intrusion detection system using hybrid intelligent systems", Journal of Network and Computer Applications, vol. 30, no. 1, pp. 114-132, 2007.
10.
A. A. Aburomman and M. bin Ibne Reaz, "A novel SVM-KNN-PSO ensemble method for intrusion detection system", Applied Soft Computing Journal, vol. 38, pp. 360-372, Jan. 2016.
11.
A. S. Kyatham, M. A. Nichal and B. S. Deore, "A Novel Approach for Network Intrusion Detection using Probability Parameter to Ensemble Machine Learning Models", Proceedings of the 4th International Conference on Computing Methodologies and Communication ICCMC 2020, pp. 608-613, Mar. 2020.
12.
A. Das, "Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach", [online] Available: www.ijacsa.thesai.org.
13.
J. Sharma, C. Giri, O.-C. Granmo and M. Goodwin, "Multi-layer intrusion detection system with ExtraTrees feature selection extreme learning machine ensemble and softmax aggregation", EURASIP Journal on Information Security, vol. 15, no. 1, pp. 1-16, 2019.
14.
D. Papamartzivanos, F. Gómez Mármol and G. Kambourakis, "Dendron: Genetic trees driven rule induction for network intrusion detection systems", Future Generation Computer Systems, vol. 79, pp. 558-574, Feb. 2018.
15.
V. Timčenko and S. Gajin, "Ensemble classifiers for supervised anomaly based network intrusion detection", 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), 2017.
16.
Y.-F. Hsu, Z. He, Y. Tarutani and M. Matsuoka, "Toward an Online Network Intrusion Detection System Based on Ensemble Learning", IEEE 12th International Conference on Cloud Computing (CLOUD), 2019.
17.
X. Gao, C. Shan, C. Hu, Z. Niu and Z. Liu, "An Adaptive Ensemble Machine Learning Model for Intrusion Detection", IEEE Access, vol. 7, pp. 82512-82521, 2019.
18.
A. Verma and V. Ranga, "ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things", 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), 2019.
19.
A. Z. Kiflay, A. Tsokanos and R. Kirner, "A network intrusion detection system using ensemble machine learning", Proceedings - International Carnahan Conference on Security Technology, vol. 2021-October, 2021.
20.
S. Rajagopal, P. P. Kundapur and K. S. Hareesha, "A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets", Security and Communication Networks, vol. 2020, 2020.

Contact IEEE to Subscribe

References

References is not available for this document.