skip to main content
10.1145/3167918.3167951acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
research-article

Improving performance of intrusion detection system using ensemble methods and feature selection

Authors Info & Claims
Published:29 January 2018Publication History

ABSTRACT

The main task of an intrusion detection system (IDS) is to detect anomalous behaviors from both within and outside the network system, and there have been increasing studies applying machine learning in this area. The limitations of using a single classifier in the classification of normal traffic and anomalies (attacks) led to the idea of building hybrid or ensemble models which are more complicated but provide higher accuracy and lower false alarm rate (FAR). The aim of this paper is to improve the performance of IDS by using ensemble methods and feature selection. The ensemble models were built based on the two ensemble techniques, Bagging and Boosting, with the tree-based algorithms as the base classifier. The proposed models were then evaluated using NSL-KDD datasets. The experimental results showed that the bagging ensemble model with J48 as the base classifier produced the best performance in terms of both classification accuracy and FAR when working with the subset of 35 selected features.

References

  1. Leo Breiman. 1996. Bagging predictors. Machine learning 24, 2 (1996), 123--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Shalinee Chaurasia and Anurag Jain. 2014. Ensemble neural network and k-NN classifiers for intrusion detection. International Journal of Computer Science and Information Technology 5 (2014), 2481--2485.Google ScholarGoogle Scholar
  3. Yoav Freund, Robert E Schapire, et al. 1996. Experiments with a new boosting algorithm. In Icml, Vol. 96. 148--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dwarkoba Gaikwad and Ravindra Thool. 2016. DAREnsemble: Decision Tree and Rule Learner Based Ensemble for Network Intrusion Detection System. In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1. Springer, 185--193.Google ScholarGoogle ScholarCross RefCross Ref
  5. M Govindarajan. 2014. Hybrid intrusion detection using ensemble of classification methods. International Journal of Computer Network and Information Security 6, 2 (2014), 45.Google ScholarGoogle ScholarCross RefCross Ref
  6. Jiawei Han, Jian Pei, and Micheline Kamber. 2011. Data mining: concepts and techniques. Elsevier. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lars Kai Hansen and Peter Salamon. 1990. Neural network ensembles. IEEE transactions on pattern analysis and machine intelligence 12, 10 (1990), 993--1001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Nutan Farah Haq, Abdur Rahman Onik, and Faisal Muhammad Shah. 2015. An ensemble framework of anomaly detection using hybridized feature selection approach (HFSA). In SAI Intelligent Systems Conference (IntelliSys), 2015. IEEE, 989--995.Google ScholarGoogle ScholarCross RefCross Ref
  9. Tin Kam Ho. 2002. Multiple classifier combination: Lessons and next steps. In Hybrid methods in pattern recognition. World Scientific, 171--198.Google ScholarGoogle Scholar
  10. Navaneeth Kumar Kanakarajan and Kandasamy Muniasamy. 2016. Improving the accuracy of intrusion detection using GAR-Forest with feature selection. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Springer, 539--547.Google ScholarGoogle ScholarCross RefCross Ref
  11. Ludmila I Kuncheva. 2014. Combining pattern classifiers: methods and algorithms (second ed.). John Wiley & Sons. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Arif Jamal Malik, Waseem Shahzad, and Farrukh Aslam Khan. 2015. Network intrusion detection using hybrid binary PSO and random forests algorithm. Security and Communication Networks 8, 16 (2015), 2646--2660. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Saurabh Mukherjee and Neelam Sharma. 2012. Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technology 4 (2012), 119--128.Google ScholarGoogle ScholarCross RefCross Ref
  14. NSL-KDD 2017. NSL-KDD dataset. (2017). Retrieved September 20, 2017 from http://www.unb.ca/cic/research/datasets/nsl.htmlGoogle ScholarGoogle Scholar
  15. Hamed Haddad Pajouh, GholamHossein Dastghaibyfard, and Sattar Hashemi. 2017. Two-tier network anomaly detection model: a machine learning approach. Journal of Intelligent Information Systems 48, 1 (2017), 61--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Mrutyunjaya Panda and Manas Ranjan Patra. 2009. Ensemble of classifiers for detecting network intrusion. In Proceedings of the International Conference on Advances in Computing, Communication and Control. ACM, 510--515. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Muhammad Shakil Pervez and Dewan Md Farid. 2014. Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In Software, Knowledge, Information Management and Applications (SKIMA), 2014 8th International Conference on. IEEE, 1--6.Google ScholarGoogle Scholar
  18. Robert E Schapire. 1990. The strength of weak learnability. Machine learning 5, 2 (1990), 197--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Akhilesh Kumar Shrivas and Amit Kumar Dewangan. 2014. An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. International Journal of Computer Applications 99, 15 (2014).Google ScholarGoogle Scholar
  20. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on. IEEE, 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Improving performance of intrusion detection system using ensemble methods and feature selection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ACSW '18: Proceedings of the Australasian Computer Science Week Multiconference
          January 2018
          404 pages
          ISBN:9781450354363
          DOI:10.1145/3167918

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 January 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ACSW '18 Paper Acceptance Rate49of96submissions,51%Overall Acceptance Rate204of424submissions,48%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader