Skip to main content
Top
Published in: Neural Computing and Applications 16/2020

19-01-2020 | Original Article

An efficient XGBoost–DNN-based classification model for network intrusion detection system

Authors: Preethi Devan, Neelu Khare

Published in: Neural Computing and Applications | Issue 16/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There is a steep rise in the trend of the utility of Internet technology day by day. This tremendous increase ushers in a massive amount of data generated and handled. For apparent reasons, undivided attention is due for ensuring network security. An intrusion detection system plays a vital role in the field of the stated security. The proposed XGBoost–DNN model utilizes XGBoost technique for feature selection followed by deep neural network (DNN) for classification of network intrusion. The XGBoost–DNN model has three steps: normalization, feature selection, and classification. Adam optimizer is used for learning rate optimization during DNN training, and softmax classifier is applied for classification of network intrusions. The experiments were duly conducted on the benchmark NSL-KDD dataset and implemented using Tensor flow and python. The proposed model is validated using cross-validation and compared with existing shallow machine learning algorithms like logistic regression, SVM, and naive Bayes. The classification evaluation metrics such as accuracy, precision, recall, and F1-score are calculated and compared with the existing shallow methods. The proposed method outperformed over the existing shallow methods used for the dataset.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2:41–50CrossRef Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2:41–50CrossRef
2.
go back to reference Mabu S, Chen C, Lu N, Shimada K (2011) An Intrusion-detection model based on fuzzy programming. IEEE Trans Syst Man Cybern Syst 41:130–139CrossRef Mabu S, Chen C, Lu N, Shimada K (2011) An Intrusion-detection model based on fuzzy programming. IEEE Trans Syst Man Cybern Syst 41:130–139CrossRef
3.
go back to reference Garcia-Teodoro P, Diaz-Verdejo J, Macia-Fernandez G, Vázquez E (2009) Anomaly-based network Intrusion detection: techniques, systems and challenges. Comput Secur 28:18–28CrossRef Garcia-Teodoro P, Diaz-Verdejo J, Macia-Fernandez G, Vázquez E (2009) Anomaly-based network Intrusion detection: techniques, systems and challenges. Comput Secur 28:18–28CrossRef
4.
go back to reference Li L, Yu Y, Bai S, Hou Y, Chen X (2017) An effective two-step intrusion detection approach based on binary classification and k-NN. IEEE Access 6:12060–12073CrossRef Li L, Yu Y, Bai S, Hou Y, Chen X (2017) An effective two-step intrusion detection approach based on binary classification and k-NN. IEEE Access 6:12060–12073CrossRef
5.
go back to reference Ahmad I, Basheri M, Iqbal MJ, Rahim A (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33789–33795CrossRef Ahmad I, Basheri M, Iqbal MJ, Rahim A (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33789–33795CrossRef
6.
go back to reference Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Procedia Comput Sci 89:213–217CrossRef Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Procedia Comput Sci 89:213–217CrossRef
7.
go back to reference Manzoor I, Kumar N (2017) A feature reduced intrusion detection system using ANN classifier. Expert Syst Appl 88:249–257CrossRef Manzoor I, Kumar N (2017) A feature reduced intrusion detection system using ANN classifier. Expert Syst Appl 88:249–257CrossRef
8.
9.
go back to reference Chen T, Guestrin C (2016) XGBoost: a scalable tree boosting system. In: the proceedings of 22nd SIGKDD conference on knowledge discovery and data mining. ACM, New York Chen T, Guestrin C (2016) XGBoost: a scalable tree boosting system. In: the proceedings of 22nd SIGKDD conference on knowledge discovery and data mining. ACM, New York
10.
go back to reference Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: The proceedings of the 9th EAI international conference on bio-inspired information and communications technologies Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: The proceedings of the 9th EAI international conference on bio-inspired information and communications technologies
11.
go back to reference Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. In: IEEE international conference on big data and smart computing (BigComp), IEEE Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. In: IEEE international conference on big data and smart computing (BigComp), IEEE
12.
go back to reference Paul S, Banerjee C, Ghoshal M (2018) A CFS–DNN-based intrusion detection system. In: Bera R, Sarkar S, Chakraborty S (eds) Advances in communication, devices and networking. Springer, Berlin Paul S, Banerjee C, Ghoshal M (2018) A CFS–DNN-based intrusion detection system. In: Bera R, Sarkar S, Chakraborty S (eds) Advances in communication, devices and networking. Springer, Berlin
14.
go back to reference Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160CrossRef Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160CrossRef
15.
go back to reference Moustafa N, Turnbull B, Choo KK (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J 6(3):4815–4830CrossRef Moustafa N, Turnbull B, Choo KK (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J 6(3):4815–4830CrossRef
16.
go back to reference Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE symposium on computational intelligence for security and defense applications, IEEE Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE symposium on computational intelligence for security and defense applications, IEEE
17.
go back to reference Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550CrossRef Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550CrossRef
18.
go back to reference Wang Z (2018) Deep learning-based intrusion detection with adversaries. IEEE Access 6:38367–38384CrossRef Wang Z (2018) Deep learning-based intrusion detection with adversaries. IEEE Access 6:38367–38384CrossRef
19.
go back to reference Behera S, Pradhan A, Dash R (2018) Deep neural network architecture for anomaly based intrusion detection system. In: 5th international conference on signal processing and integrated networks (SPIN), IEEE Behera S, Pradhan A, Dash R (2018) Deep neural network architecture for anomaly based intrusion detection system. In: 5th international conference on signal processing and integrated networks (SPIN), IEEE
20.
go back to reference Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tuts 21(1):686–728CrossRef Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tuts 21(1):686–728CrossRef
23.
go back to reference Dhaliwal S, Nahid AA, Abbas R (2018) Effective intrusion detection system using XGBoost. Information 9(7):149CrossRef Dhaliwal S, Nahid AA, Abbas R (2018) Effective intrusion detection system using XGBoost. Information 9(7):149CrossRef
24.
go back to reference Chen Z, Jiang F, Cheng Y, Gu X, Liu W, Peng J (2018) XGBoost classifier for DDoS attack detection and analysis in SDN-Based cloud. In: IEEE international conference on big data and smart computing (BigComp), IEEE Chen Z, Jiang F, Cheng Y, Gu X, Liu W, Peng J (2018) XGBoost classifier for DDoS attack detection and analysis in SDN-Based cloud. In: IEEE international conference on big data and smart computing (BigComp), IEEE
25.
go back to reference Glorot X, Bordes A, Bengio Y (2011) Deep sparse rectifier neural networks. In: Proceedings of 14th international conference on artificial intelligence and statistics, IEEE Glorot X, Bordes A, Bengio Y (2011) Deep sparse rectifier neural networks. In: Proceedings of 14th international conference on artificial intelligence and statistics, IEEE
32.
go back to reference Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv preprint arXiv:1701.02145 Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv preprint arXiv:​1701.​02145
33.
go back to reference Chen T, Guestrin C (2016) XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York Chen T, Guestrin C (2016) XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York
Metadata
Title
An efficient XGBoost–DNN-based classification model for network intrusion detection system
Authors
Preethi Devan
Neelu Khare
Publication date
19-01-2020
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 16/2020
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-04708-x

Other articles of this Issue 16/2020

Neural Computing and Applications 16/2020 Go to the issue

Premium Partner