Skip to main content
Erschienen in: Cluster Computing 3/2021

02.01.2021

Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing

verfasst von: S. Krishnaveni, S. Sivamohan, S. S. Sridhar, S. Prabakaran

Erschienen in: Cluster Computing | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is a preferred option for organizations around the globe, it offers scalable and internet-based computing resources as a flexible service. Security is a key concern factor in any cloud solution due to its distributed nature. Security and privacy are huge obstacles faced in its success of the on-demand service as it is easily vulnerable to intruders for any kind of attack. A huge upsurge in network traffic has paved the way to security breaches which are more complicated and widespread. Tackling these attacks has become an inefficient application of traditional intrusion detection systems (IDS) environment. In this research, we developed an efficient Intrusion Detection System (IDS) for the cloud environment using ensemble feature selection and classification techniques. This proposed method was relying on the univariate ensemble feature selection technique, which is used for the selection of valuable reduced feature sets from the given intrusion datasets. While the ensemble classifiers that can competently fuse the single classifiers to produce a robust classifier using the voting technique. An ensemble based proposed method effectively classifies whether the network traffic behavior is normal or attack. The implementation of the proposed method was measured by applying various performance evaluation metrics and ROC-AUC (“area under the receiver operating characteristic curves”) across various classifiers. The results of the proposed methodology achieved a strong considerable amount of performance enhancement compared with other existing methods. Moreover, we performed a pairwise t test and proved that the performance of the proposed method was statistically significantly different from other existing approaches. Finally, the outcome of this investigation was obtained with the best accuracy and lowest false alarm rate (FAR).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Pham, N. T., Foo, E., Suriadi, S., Jeffrey, H., Lahza, H. F. M.: Improving performance of intrusion detection system using ensemble methods and feature selection. In ACM International Conference Proceeding Series 1–6 (Association for Computing Machinery, 2018). https://doi.org/10.1145/3167918.3167951 Pham, N. T., Foo, E., Suriadi, S., Jeffrey, H., Lahza, H. F. M.: Improving performance of intrusion detection system using ensemble methods and feature selection. In ACM International Conference Proceeding Series 1–6 (Association for Computing Machinery, 2018). https://​doi.​org/​10.​1145/​3167918.​3167951
3.
Zurück zum Zitat Webb, G.I., Zheng, Z.: Multistrategy ensemble learning: reducing error by combining ensemble learning techniques. IEEE Trans. Knowl. Data Eng. 16, 980–991 (2004)CrossRef Webb, G.I., Zheng, Z.: Multistrategy ensemble learning: reducing error by combining ensemble learning techniques. IEEE Trans. Knowl. Data Eng. 16, 980–991 (2004)CrossRef
5.
Zurück zum Zitat Kumar Shrivas, A., Kumar Dewangan, A.: An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. Int. J. Comput. Appl. 99, 8–13 (2014) Kumar Shrivas, A., Kumar Dewangan, A.: An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. Int. J. Comput. Appl. 99, 8–13 (2014)
6.
Zurück zum Zitat Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41, 1690–1700 (2014)CrossRef Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41, 1690–1700 (2014)CrossRef
7.
Zurück zum Zitat Gogoi, P., Bhattacharyya, D.K., Borah, B., Kalita, J.K.: MLH-IDS: A multi-level hybrid intrusion detection method. Comput. J. 57, 602–623 (2014)CrossRef Gogoi, P., Bhattacharyya, D.K., Borah, B., Kalita, J.K.: MLH-IDS: A multi-level hybrid intrusion detection method. Comput. J. 57, 602–623 (2014)CrossRef
8.
Zurück zum Zitat Sarkar, C., Cooley, S., Srivastava, J.: Robust feature selection technique using rank aggregation. Appl. Artif. Intell. 28, 243–257 (2014)CrossRef Sarkar, C., Cooley, S., Srivastava, J.: Robust feature selection technique using rank aggregation. Appl. Artif. Intell. 28, 243–257 (2014)CrossRef
10.
Zurück zum Zitat Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18, 1153–1176 (2016)CrossRef Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18, 1153–1176 (2016)CrossRef
11.
Zurück zum Zitat Zhou, Y., Cheng, G., Jiang, S., Dai, M.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Networks 174, 10–247 (2019) Zhou, Y., Cheng, G., Jiang, S., Dai, M.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Networks 174, 10–247 (2019)
12.
Zurück zum Zitat Gaikwad, D., Thool, R.: DAREnsemble: Decision tree and rule learner based ensemble for network intrusion detection system. In: Gaikwad, D., Thool, R. (eds.) Smart Innovation, Systems and Technologies. Springer, New York (2016) Gaikwad, D., Thool, R.: DAREnsemble: Decision tree and rule learner based ensemble for network intrusion detection system. In: Gaikwad, D., Thool, R. (eds.) Smart Innovation, Systems and Technologies. Springer, New York (2016)
14.
Zurück zum Zitat Wankhade, A., Chandrasekaran, K.: Distributed-Intrusion Detection System using combination of Ant Colony Optimization (ACO) and support vector machine (SVM). in Proceedings - 2016 International Conference on Micro-Electronics and Telecommunication Engineering, ICMETE 2016 pp. 646–651 (Institute of Electrical and Electronics Engineers Inc., 2016). https://doi.org/10.1109/icmete.2016.94 Wankhade, A., Chandrasekaran, K.: Distributed-Intrusion Detection System using combination of Ant Colony Optimization (ACO) and support vector machine (SVM). in Proceedings - 2016 International Conference on Micro-Electronics and Telecommunication Engineering, ICMETE 2016 pp. 646–651 (Institute of Electrical and Electronics Engineers Inc., 2016). https://​doi.​org/​10.​1109/​icmete.​2016.​94
15.
Zurück zum Zitat Tama, B.A., Rhee, K.H.: An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Comput. Appl. 31, 955–965 (2019)CrossRef Tama, B.A., Rhee, K.H.: An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Comput. Appl. 31, 955–965 (2019)CrossRef
16.
Zurück zum Zitat Ahmad, I.: Feature selection using particle swarm optimization in intrusion detection. Int. J. Distrib. Sens. Networks 11, 806 (2015) Ahmad, I.: Feature selection using particle swarm optimization in intrusion detection. Int. J. Distrib. Sens. Networks 11, 806 (2015)
18.
Zurück zum Zitat Osanaiye, O., et al.: Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. Eurasip J. Wirel. Commun. Netw. 2016, 130 (2016)CrossRef Osanaiye, O., et al.: Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. Eurasip J. Wirel. Commun. Netw. 2016, 130 (2016)CrossRef
19.
Zurück zum Zitat Zhao, F., Zhao, J., Niu, X., Luo, S., Xin, Y.: A filter feature selection algorithm based on mutual information for intrusion detection. Appl. Sci. 8, 1535 (2018)CrossRef Zhao, F., Zhao, J., Niu, X., Luo, S., Xin, Y.: A filter feature selection algorithm based on mutual information for intrusion detection. Appl. Sci. 8, 1535 (2018)CrossRef
20.
Zurück zum Zitat Yang, C.: Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. Clust. Comput. 22, 8309–8317 (2019)CrossRef Yang, C.: Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. Clust. Comput. 22, 8309–8317 (2019)CrossRef
21.
Zurück zum Zitat Binbusayyis, A., Vaiyapuri, T.: Identifying and benchmarking key features for cyber intrusion detection: an ensemble approach. IEEE Access 7, 106495–106513 (2019)CrossRef Binbusayyis, A., Vaiyapuri, T.: Identifying and benchmarking key features for cyber intrusion detection: an ensemble approach. IEEE Access 7, 106495–106513 (2019)CrossRef
22.
Zurück zum Zitat Saeys, Y., Abeel, T., Van De Peer, Y.: Robust feature selection using ensemble feature selection techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 5212 LNAI pp. 313–325 (Springer, Berlin, 2008) Saeys, Y., Abeel, T., Van De Peer, Y.: Robust feature selection using ensemble feature selection techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 5212 LNAI pp. 313–325 (Springer, Berlin, 2008)
23.
Zurück zum Zitat Kotsiantis, S.B.: Supervised machine learning: a review of classification techniques. Informatica 31, 208 (2007)MathSciNetMATH Kotsiantis, S.B.: Supervised machine learning: a review of classification techniques. Informatica 31, 208 (2007)MathSciNetMATH
24.
Zurück zum Zitat Ali, M., et al.: a data-driven knowledge acquisition system: an end-to-end knowledge engineering process for generating production rules. IEEE Access 6, 15587–15607 (2018)CrossRef Ali, M., et al.: a data-driven knowledge acquisition system: an end-to-end knowledge engineering process for generating production rules. IEEE Access 6, 15587–15607 (2018)CrossRef
25.
Zurück zum Zitat Muallem, A., Shetty, S., Hong, L., Pan, J. W.: TDDEHT: threat detection using distributed ensembles of Hoeffding trees on streaming cyber datasets. Proc. - IEEE Mil. Commun. Conf. MILCOM 2019, pp. 219–224 (2019) Muallem, A., Shetty, S., Hong, L., Pan, J. W.: TDDEHT: threat detection using distributed ensembles of Hoeffding trees on streaming cyber datasets. Proc. - IEEE Mil. Commun. Conf. MILCOM 2019, pp. 219–224 (2019)
26.
Zurück zum Zitat Lin, Y.-D., Lai, Y.-C., Ho, C.-Y., Tai, W.-H., Tai, W.-H.: Creditability-based weighted voting for reducing false positives and negatives in intrusion detection. Comput. Secur. 39, 460–474 (2013)CrossRef Lin, Y.-D., Lai, Y.-C., Ho, C.-Y., Tai, W.-H., Tai, W.-H.: Creditability-based weighted voting for reducing false positives and negatives in intrusion detection. Comput. Secur. 39, 460–474 (2013)CrossRef
27.
Zurück zum Zitat Krishnaveni, S., Prabakaran, S., Sivamohan, S.: A survey on honeypot and honeynet systems for intrusion detection in cloud environment. J. Comput. Theor. Nanosci. 15, 2956–2960 (2018)CrossRef Krishnaveni, S., Prabakaran, S., Sivamohan, S.: A survey on honeypot and honeynet systems for intrusion detection in cloud environment. J. Comput. Theor. Nanosci. 15, 2956–2960 (2018)CrossRef
28.
Zurück zum Zitat Pervez, M. S., Farid, D. M.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In SKIMA 2014 - 8th International Conference on Software, Knowledge, Information Management and Applications (Institute of Electrical and Electronics Engineers Inc., 2014). https://doi.org/10.1109/skima.2014.7083539 Pervez, M. S., Farid, D. M.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In SKIMA 2014 - 8th International Conference on Software, Knowledge, Information Management and Applications (Institute of Electrical and Electronics Engineers Inc., 2014). https://​doi.​org/​10.​1109/​skima.​2014.​7083539
30.
Zurück zum Zitat Iwendi, C., et al.: The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems. Sensors 20, 1–37 (2020)CrossRef Iwendi, C., et al.: The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems. Sensors 20, 1–37 (2020)CrossRef
31.
Zurück zum Zitat Kim, H., Kim, J., Kim, Y., Kim, I., Kim, K.J.: Design of network threat detection and classification based on machine learning on cloud computing. Clust. Comput. 22, 2341–2350 (2019)CrossRef Kim, H., Kim, J., Kim, Y., Kim, I., Kim, K.J.: Design of network threat detection and classification based on machine learning on cloud computing. Clust. Comput. 22, 2341–2350 (2019)CrossRef
32.
Zurück zum Zitat Gottwalt, F., Chang, E., Dillon, T.: CorrCorr: a feature selection method for multivariate correlation network anomaly detection techniques. Comput. Secur. 83, 234–245 (2019)CrossRef Gottwalt, F., Chang, E., Dillon, T.: CorrCorr: a feature selection method for multivariate correlation network anomaly detection techniques. Comput. Secur. 83, 234–245 (2019)CrossRef
33.
Zurück zum Zitat Wang, W., Du, X., Wang, N.: Building a cloud IDS using an efficient feature selection method and SVM. IEEE Access 7, 1345–1354 (2019)CrossRef Wang, W., Du, X., Wang, N.: Building a cloud IDS using an efficient feature selection method and SVM. IEEE Access 7, 1345–1354 (2019)CrossRef
34.
Zurück zum Zitat Manickam, M., Rajagopalan, S.P.: A hybrid multi-layer intrusion detection system in cloud. Clust. Comput. 22, 3961–3969 (2019)CrossRef Manickam, M., Rajagopalan, S.P.: A hybrid multi-layer intrusion detection system in cloud. Clust. Comput. 22, 3961–3969 (2019)CrossRef
35.
Zurück zum Zitat Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65, 2986–2998 (2016)MathSciNetCrossRef Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65, 2986–2998 (2016)MathSciNetCrossRef
Metadaten
Titel
Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
verfasst von
S. Krishnaveni
S. Sivamohan
S. S. Sridhar
S. Prabakaran
Publikationsdatum
02.01.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2021
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-020-03222-y

Weitere Artikel der Ausgabe 3/2021

Cluster Computing 3/2021 Zur Ausgabe

Premium Partner