Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2022

07-03-2022

GE-IDS: an intrusion detection system based on grayscale and entropy

Authors: Dan Liao, Ruijin Zhou, Hui Li, Ming Zhang, Xue Chen

Published in: Peer-to-Peer Networking and Applications | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An intrusion detection system (IDS) ensures cybersecurity. However, the existing IDSs face challenges, such as low detection accuracy, complex data feature extraction and high resource consumption costs. Therefore, this paper proposes an IDS based on grayscale and entropy, called the GE-IDS. The GE-IDS performs flow preprocessing based on filtering and grayscale conversion to realize traffic visualization. It improves real-time performance and reduces resource consumption. Moreover, the GE-IDS can effectively analyze and cluster traffic grayscales. On the basis of the obtained traffic grayscale clusters, the GE-IDS can detects known cyberattacks with a higher accuracy. By defining cluster entropy, the GE-IDS can detect unknown cyberattacks. We use the latest CICIIDS 2017 dataset to verify the performance of the GE-IDS. Simulation results show that the GE-IDS has high precision in terms of detecting known attacks. It also has a strong unknown attack detection ability.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ayyagari MR, Kesswani N, Kumar M et al (2021) Intrusion detection techniques in network environment: a systematic review. Wireless Netw 27:1269–1285CrossRef Ayyagari MR, Kesswani N, Kumar M et al (2021) Intrusion detection techniques in network environment: a systematic review. Wireless Netw 27:1269–1285CrossRef
2.
go back to reference Eltanbouly S, Bashendy M, AlNaimi N, Chkirbene Z, Erbad A (2020) Machine learning techniques for network anomaly detection: a survey. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, p 156–162 Eltanbouly S, Bashendy M, AlNaimi N, Chkirbene Z, Erbad A (2020) Machine learning techniques for network anomaly detection: a survey. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, p 156–162
3.
go back to reference Sun C-C, Sebastian Cardenas DJ, Hahn A, Liu C-C (2021) Intrusion detection for cybersecurity of smart meters. IEEE Trans Smart Grid 12(1):612–622 Sun C-C, Sebastian Cardenas DJ, Hahn A, Liu C-C (2021) Intrusion detection for cybersecurity of smart meters. IEEE Trans Smart Grid 12(1):612–622
4.
go back to reference Chen X, Zhang F, Willy S et al (2014) Identity-based chameleon hashing and signatures without key exposure. Inf Sci 265:198–210CrossRef Chen X, Zhang F, Willy S et al (2014) Identity-based chameleon hashing and signatures without key exposure. Inf Sci 265:198–210CrossRef
5.
go back to reference Wang D, Zhang Z, Wang P et al (2016) Targeted online password guessing: an underestimated threat. ACM Conf Comput Commun Secur 1242–1254 Wang D, Zhang Z, Wang P et al (2016) Targeted online password guessing: an underestimated threat. ACM Conf Comput Commun Secur 1242–1254
6.
go back to reference Mora-Gimeno T, Mora-Mora H, Volckaert B, Atrey A (2021) Intrusion detection system based on integrated system calls graph and neural networks. IEEE Access 9:9822–9833CrossRef Mora-Gimeno T, Mora-Mora H, Volckaert B, Atrey A (2021) Intrusion detection system based on integrated system calls graph and neural networks. IEEE Access 9:9822–9833CrossRef
7.
go back to reference Bhatia V, Choudhary S, Ramkumar KR (2020) A comparative study on various intrusion detection techniques using machine learning and neural network. 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India Bhatia V, Choudhary S, Ramkumar KR (2020) A comparative study on various intrusion detection techniques using machine learning and neural network. 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India
8.
go back to reference Kumari A, Mehta AK (2020) A hybrid intrusion detection system based on decision tree and support vector machine. 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India Kumari A, Mehta AK (2020) A hybrid intrusion detection system based on decision tree and support vector machine. 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India
9.
go back to reference Amaran S, Mohan RM (2021) Intrusion detection system using optimal support vector machine for wireless sensor networks. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India Amaran S, Mohan RM (2021) Intrusion detection system using optimal support vector machine for wireless sensor networks. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India
10.
go back to reference Pump R, Ahlers V, Koschel A (2020) Evaluating artificial immune system algorithms for intrusion detection. 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK Pump R, Ahlers V, Koschel A (2020) Evaluating artificial immune system algorithms for intrusion detection. 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK
11.
go back to reference Mirsky Y, Doitshman T, Elovici Y et al (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection. Netw Distrib Syst Secur Symp Mirsky Y, Doitshman T, Elovici Y et al (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection. Netw Distrib Syst Secur Symp
12.
go back to reference Sharafaldin I, Lashkari A, Ghorbani A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. Int Conf Inform Syst Secur Privacy 1:108–116CrossRef Sharafaldin I, Lashkari A, Ghorbani A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. Int Conf Inform Syst Secur Privacy 1:108–116CrossRef
13.
go back to reference Zbakh M, Elmahdi K, Cherkaoui R et al (2015) A multi-criteria analysis of intrusion detection architectures in cloud environments. IEEE Int Conf Cloud Tenhnol App 10:1–9 Zbakh M, Elmahdi K, Cherkaoui R et al (2015) A multi-criteria analysis of intrusion detection architectures in cloud environments. IEEE Int Conf Cloud Tenhnol App 10:1–9
14.
go back to reference Abdullah K, Copeland JA (2006) High alarm count issues in IDS RainStorm. ACM Conference on Computer and Communications Security’s Workshop on Visualization and Data Mining for Computer Security, p 61–62 Abdullah K, Copeland JA (2006) High alarm count issues in IDS RainStorm. ACM Conference on Computer and Communications Security’s Workshop on Visualization and Data Mining for Computer Security, p 61–62
15.
go back to reference Liu J, Li L (2008) A distributed intrusion detection system based on agents. IEEE Pacific-Asia Workshop Comput Intell Ind App 553–557 Liu J, Li L (2008) A distributed intrusion detection system based on agents. IEEE Pacific-Asia Workshop Comput Intell Ind App 553–557
16.
go back to reference Kabir M E, Hu J (2014) A statistical framework for intrusion detection system. 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE Kabir M E, Hu J (2014) A statistical framework for intrusion detection system. 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE
17.
go back to reference Yang X, Kong L, Liu Z et al (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365–35381CrossRef Yang X, Kong L, Liu Z et al (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365–35381CrossRef
18.
go back to reference Kabir E, Hu J, Wang H et al (2018) A novel statistical technique for intrusion detection systems. Futur Generation Comput Syst – Int J Escience 79(1):303–318CrossRef Kabir E, Hu J, Wang H et al (2018) A novel statistical technique for intrusion detection systems. Futur Generation Comput Syst – Int J Escience 79(1):303–318CrossRef
19.
go back to reference Naseer S, Saleem Y, Khalid S et al (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231–48246 Naseer S, Saleem Y, Khalid S et al (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231–48246
20.
go back to reference Moon D, Im H, Kim I et al (2017) DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J Supercomput 73(7):2881–2895CrossRef Moon D, Im H, Kim I et al (2017) DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J Supercomput 73(7):2881–2895CrossRef
21.
go back to reference Dey A (2020) Deep IDS: a deep learning approach for Intrusion detection based on IDS. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh Dey A (2020) Deep IDS: a deep learning approach for Intrusion detection based on IDS. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh
22.
go back to reference Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49:3235–3247CrossRef Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49:3235–3247CrossRef
23.
go back to reference Ali MH, Mohammed MA (2019) An improved fast learning network with harmony search based on intrusion-detection system. J Comput Theo Nanosci 16(5/6):2166–2167MathSciNetCrossRef Ali MH, Mohammed MA (2019) An improved fast learning network with harmony search based on intrusion-detection system. J Comput Theo Nanosci 16(5/6):2166–2167MathSciNetCrossRef
24.
go back to reference Nancy P, Muthurajkumar S,Ganapathy S et al (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun 14(5):888–895 Nancy P, Muthurajkumar S,Ganapathy S et al (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun 14(5):888–895
25.
go back to reference Shukla AK (2019) Building an effective approach toward intrusion detection using ensemble feature selection. Int J Inform Secur Privacy 13(3):31–47CrossRef Shukla AK (2019) Building an effective approach toward intrusion detection using ensemble feature selection. Int J Inform Secur Privacy 13(3):31–47CrossRef
26.
go back to reference Gauthama Raman MR, Somu N, Jagarapu S et al (2020) An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif Intell Rev 53:3255–3286 Gauthama Raman MR, Somu N, Jagarapu S et al (2020) An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif Intell Rev 53:3255–3286
27.
go back to reference Çavuşoğlu Ü (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49:2735–2761CrossRef Çavuşoğlu Ü (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49:2735–2761CrossRef
28.
go back to reference Chkirbene Z, Erbad A, Hamila R et al (2020) TIDCS: a dynamic intrusion detection and classification system based feature selection. IEEE Access 8:95864–95877CrossRef Chkirbene Z, Erbad A, Hamila R et al (2020) TIDCS: a dynamic intrusion detection and classification system based feature selection. IEEE Access 8:95864–95877CrossRef
29.
go back to reference Abdaljabar ZH, Ucan ON, Ali Alheeti KM (2021) An intrusion detection system for IoT using KNN and decision-tree based classification. 2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI) Abdaljabar ZH, Ucan ON, Ali Alheeti KM (2021) An intrusion detection system for IoT using KNN and decision-tree based classification. 2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)
30.
go back to reference Waskle S, Parashar L, Singh U (2020) Intrusion detection system using PCA with random forest approach. Int Conf Electron Sustain Commun Syst (ICESC) Waskle S, Parashar L, Singh U (2020) Intrusion detection system using PCA with random forest approach. Int Conf Electron Sustain Commun Syst (ICESC)
31.
go back to reference Rashid MM, Kamruzzaman J, Ahmed M, Islam N, Wibowo S, Gordon S (2020) Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection. IEEE Asia-Pacific Conf Comput Sci Data Eng (CSDE) Rashid MM, Kamruzzaman J, Ahmed M, Islam N, Wibowo S, Gordon S (2020) Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection. IEEE Asia-Pacific Conf Comput Sci Data Eng (CSDE)
32.
go back to reference Chen Z, Ruan L, Cao J (2013) TIFAflow: Enhancing traffic archiving system with flow granularity for forensic analysis in network security. Tsinghua Sci Technol 18(4):406–417 Chen Z, Ruan L, Cao J (2013) TIFAflow: Enhancing traffic archiving system with flow granularity for forensic analysis in network security. Tsinghua Sci Technol 18(4):406–417
Metadata
Title
GE-IDS: an intrusion detection system based on grayscale and entropy
Authors
Dan Liao
Ruijin Zhou
Hui Li
Ming Zhang
Xue Chen
Publication date
07-03-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2022
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01300-z

Other articles of this Issue 3/2022

Peer-to-Peer Networking and Applications 3/2022 Go to the issue

Premium Partner