Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 2/2022

30-06-2021 | Research Article-Computer Engineering and Computer Science

A N-binary Classification and Grouping-based Approach to Improve the Performance of Anomaly Detection

Authors: Omkar Shende, R. K. Pateriya, Priyanka Verma

Published in: Arabian Journal for Science and Engineering | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In today’s world, the growth of computer networks is exponential as networking is an essential part of the latest technologies like Internet of Things (IoT), cloud computing, edge computing, etc., with the adoption of new technologies; security has become an important issue for such techniques. These networks need to be saved from a wide range of available attacks. In the literature, many intrusion detection systems (IDS) are used to detect such attacks. IDS can be signature based or anomaly based. The signature-based method can only detect a well-known attack while anomaly-based methods can detect new attacks but suffers from low performance. IDS with a potential anomaly detection mechanism to improve the performance is highly desirable. For the reasons mentioned above, this paper proposed an anomaly-based IDS with novel hybrid ensemble classification method based on grouping of the network traffic. The groups are created based on the services or protocol used by the network traffic. After grouping of network traffic, wrapper-based sequential feature selection (SFS) with random forest (RF) classifier is used to select optimal features and perform classification in each group. Furthermore, to validate the performance of the proposed model for service-based and protocol-based grouping approach, UNSW-NB15 and NSL-KDD datasets are used, respectively. The result shows that the proposed approach outperforms the existing feature selection approaches with high accuracy, precision, and F-score for both the datasets.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Moon, D.; Im, H.; Kim, I.; Park, J.H.: DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J. Supercomput. 73(7), 2881–95 (2017)CrossRef Moon, D.; Im, H.; Kim, I.; Park, J.H.: DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J. Supercomput. 73(7), 2881–95 (2017)CrossRef
2.
go back to reference Verma, P.; Tapaswi, S.; Godfrey, W.W.: AVDR: a framework for migration policy to handle DDoS attacked VM in cloud. Wirel. Personal Commun. 115(2), 1335–1361 (2020)CrossRef Verma, P.; Tapaswi, S.; Godfrey, W.W.: AVDR: a framework for migration policy to handle DDoS attacked VM in cloud. Wirel. Personal Commun. 115(2), 1335–1361 (2020)CrossRef
3.
go back to reference Salo, F.; Nassif, A.B.; Essex, A.: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Netw. 15(148), 164–75 (2019)CrossRef Salo, F.; Nassif, A.B.; Essex, A.: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Netw. 15(148), 164–75 (2019)CrossRef
4.
go back to reference Salo, F.; Injadat, M.; Nassif, A.B.; Shami, A.; Essex, A.: Data mining techniques in intrusion detection systems: a systematic literature review. IEEE Access 6, 56046–56058 (2018)CrossRef Salo, F.; Injadat, M.; Nassif, A.B.; Shami, A.; Essex, A.: Data mining techniques in intrusion detection systems: a systematic literature review. IEEE Access 6, 56046–56058 (2018)CrossRef
5.
go back to reference Kasongo, S.M.; Sun, Y.: A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 1(92), 101752 (2020)CrossRef Kasongo, S.M.; Sun, Y.: A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 1(92), 101752 (2020)CrossRef
6.
go back to reference Vinayakumar, R.; Alazab, M.; Soman, K.P.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access. 3(7), 41525–50 (2019)CrossRef Vinayakumar, R.; Alazab, M.; Soman, K.P.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access. 3(7), 41525–50 (2019)CrossRef
7.
go back to reference Moustafa N, Slay J. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS) 2015 Nov 10 (pp. 1-6). IEEE Moustafa N, Slay J. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS) 2015 Nov 10 (pp. 1-6). IEEE
9.
go back to reference Li, X.; Chen, W.; Zhang, Q.; Wu, L.: Building auto-encoder intrusion detection system based on random forest feature selection. Comput. Secur. 29, 101851 (2020)CrossRef Li, X.; Chen, W.; Zhang, Q.; Wu, L.: Building auto-encoder intrusion detection system based on random forest feature selection. Comput. Secur. 29, 101851 (2020)CrossRef
10.
go back to reference Kasongo, S.M.; Sun, Y.: A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access. 18(7), 38597–607 (2019)CrossRef Kasongo, S.M.; Sun, Y.: A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access. 18(7), 38597–607 (2019)CrossRef
11.
go back to reference Wu, Z.; Wang, J.; Hu, L.; Zhang, Z.; Wu, H.: A network intrusion detection method based on semantic re-encoding and deep learning. J. Netw. Comput. Appl. 5, 102688 (2020)CrossRef Wu, Z.; Wang, J.; Hu, L.; Zhang, Z.; Wu, H.: A network intrusion detection method based on semantic re-encoding and deep learning. J. Netw. Comput. Appl. 5, 102688 (2020)CrossRef
12.
go back to reference Yu, Y.; Ye, Z.; Zheng, X.; Rong, C.: An efficient cascaded method for network intrusion detection based on extreme learning machines. J. Supercomput. 74(11), 5797–812 (2018)CrossRef Yu, Y.; Ye, Z.; Zheng, X.; Rong, C.: An efficient cascaded method for network intrusion detection based on extreme learning machines. J. Supercomput. 74(11), 5797–812 (2018)CrossRef
13.
go back to reference Kevric, J.; Jukic, S.; Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28(1), 1051–8 (2017)CrossRef Kevric, J.; Jukic, S.; Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28(1), 1051–8 (2017)CrossRef
14.
go back to reference Jyothsna V, Mukesh D, Sreedhar AN. A flow-based network intrusion detection system for high-speed networks using meta-heuristic scale. In: Computing and Network Sustainability (2019) (pp. 337-347). Springer, Singapore Jyothsna V, Mukesh D, Sreedhar AN. A flow-based network intrusion detection system for high-speed networks using meta-heuristic scale. In: Computing and Network Sustainability (2019) (pp. 337-347). Springer, Singapore
15.
go back to reference Shone, N.; Ngoc, T.N.; Phai, V.D.; Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Computat. Intell. 2(1), 41–50 (2018)CrossRef Shone, N.; Ngoc, T.N.; Phai, V.D.; Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Computat. Intell. 2(1), 41–50 (2018)CrossRef
16.
go back to reference Choi, H.; Kim, M.; Lee, G.; Kim, W.: Unsupervised learning approach for network intrusion detection system using autoencoders. J. Supercomput. 75(9), 5597–621 (2019)CrossRef Choi, H.; Kim, M.; Lee, G.; Kim, W.: Unsupervised learning approach for network intrusion detection system using autoencoders. J. Supercomput. 75(9), 5597–621 (2019)CrossRef
17.
go back to reference Injadat, M.; Moubayed, A.; Nassif, A.B.; Shami, A.: Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans. Netw. Serv. Manag. 18, 1803–1816 (2020)CrossRef Injadat, M.; Moubayed, A.; Nassif, A.B.; Shami, A.: Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans. Netw. Serv. Manag. 18, 1803–1816 (2020)CrossRef
18.
go back to reference Injadat, M., Salo, F., Nassif, A. B., Essex, A., & Shami, A. (2018). Bayesian optimization with machine learning algorithms towards anomaly detection. In: 2018 IEEE global communications conference (GLOBECOM) (pp. 1-6). IEEE Injadat, M., Salo, F., Nassif, A. B., Essex, A., & Shami, A. (2018). Bayesian optimization with machine learning algorithms towards anomaly detection. In: 2018 IEEE global communications conference (GLOBECOM) (pp. 1-6). IEEE
19.
go back to reference Nassif, A.B.; Talib, M.A.; Nasir, Q.; Dakalbab, F.M.: Machine learning for anomaly detection: a systematic review. IEEE Access 7, 78658–78700 (2021)CrossRef Nassif, A.B.; Talib, M.A.; Nasir, Q.; Dakalbab, F.M.: Machine learning for anomaly detection: a systematic review. IEEE Access 7, 78658–78700 (2021)CrossRef
20.
go back to reference Panthong, R.; Srivihok, A.: Wrapper feature subset selection for dimension reduction based on ensemble learning algorithm. Procedia Comput. Sci. 72, 162–169 (2015)CrossRef Panthong, R.; Srivihok, A.: Wrapper feature subset selection for dimension reduction based on ensemble learning algorithm. Procedia Comput. Sci. 72, 162–169 (2015)CrossRef
21.
go back to reference Yin, C.; Zhu, Y.; Liu, S.; Fei, J.; Zhang, H.: Enhancing network intrusion detection classifiers using supervised adversarial training. J. Supercomput. 11, 1–30 (2019) Yin, C.; Zhu, Y.; Liu, S.; Fei, J.; Zhang, H.: Enhancing network intrusion detection classifiers using supervised adversarial training. J. Supercomput. 11, 1–30 (2019)
Metadata
Title
A N-binary Classification and Grouping-based Approach to Improve the Performance of Anomaly Detection
Authors
Omkar Shende
R. K. Pateriya
Priyanka Verma
Publication date
30-06-2021
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 2/2022
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-05871-6

Other articles of this Issue 2/2022

Arabian Journal for Science and Engineering 2/2022 Go to the issue

Research Article-Computer Engineering and Computer Science

Detection of Turkish Fake News in Twitter with Machine Learning Algorithms

Premium Partners