Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model

被引:311
作者
Aljawarneh, Shadi [1 ]
Aldwairi, Monther [1 ,2 ]
Yassein, Muneer Bani [1 ]
机构
[1] Jordan Univ Sci & Technol, Fac Comp & Informat Technol, Irbid, Jordan
[2] Zayed Univ, Coll Technol Innovat, Dubai, U Arab Emirates
关键词
Feature reduction; Intrusion detection; Correlation analysis; Association impact scale; ARCHITECTURE; CLASSIFIER;
D O I
10.1016/j.jocs.2017.03.006
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Efficiently detecting network intrusions requires the gathering of sensitive information. This means that one has to collect large amounts of network transactions including high details of recent network transactions. Assessments based on meta-heuristic anomaly are important in the intrusion related network transaction data's exploratory analysis. These assessments are needed to make and deliver predictions related to the intrusion possibility based on the available attribute details that are involved in the network transaction. We were able to utilize the NSL-KDD data set, the binary and multiclass problem with a 20% testing dataset. This paper develops a new hybrid model that can be used to estimate the intrusion scope threshold degree based on the network transaction data's optimal features that were made available for training. The experimental results revealed that the hybrid approach had a significant effect on the minimisation of the computational and time complexity involved when determining the feature association impact scale. The accuracy of the proposed model was measured as 99.81% and 98.56% for the binary class and multiclass NSL-KDD data sets, respectively. However, there are issues with obtaining high false and low false negative rates. A hybrid approach with two main parts is proposed to address these issues. First, data needs to be filtered using the Vote algorithm with Information Gain that combines the probability distributions of these base learners in order to select the important features that positively affect the accuracy of the proposed model. Next, the hybrid algorithm consists of following classifiers: J48, Meta Pagging, RandomTree, REPTree, AdaBoostM1, DecisionStump and NaiveBayes. Based on the results obtained using the proposed model, we observe improved accuracy, high false negative rate, and low false positive rule. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:152 / 160
页数:9
相关论文
共 42 条
[1]   Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components [J].
Ahmad, Iftikhar ;
Hussain, Muhammad ;
Alghamdi, Abdullah ;
Alelaiwi, Abdulhameed .
NEURAL COMPUTING & APPLICATIONS, 2014, 24 (7-8) :1671-1682
[2]  
Alan F., 2000, CMUSEI99TR028, P221
[3]   Application of artificial bee colony for intrusion detection systems [J].
Aldwairi, Monther ;
Khamayseh, Yaser ;
Al-Masri, Mohammad .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) :2730-2740
[4]   Investigations of automatic methods for detecting the polymorphic worms signatures [J].
Aljawarneh, Shadi A. ;
Moftah, Raja A. ;
Maatuk, Abdelsalam M. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 60 :67-77
[5]   Bayesian based intrusion detection system [J].
Altwaijry, Hesham ;
Algarny, Saeed .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2012, 24 (01) :1-6
[6]  
[Anonymous], 2015, INT J SECUR APPL, DOI DOI 10.14257/IJSIA.2015.9.4.23
[7]  
[Anonymous], P INT S CIRC SYST
[8]  
[Anonymous], 2016, Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on, DOI 10.1109/ETFA.2016.7733515
[9]  
[Anonymous], 2014, Int. J. Comput. Appl.
[10]  
[Anonymous], P 14 NAT COMP SEC C