[go: up one dir, main page]

Skip to main content

An Ensemble Classification Technique for Intrusion Detection Based on Dual Evolution

  • Conference paper
  • First Online:
Intelligent Computing Theories and Application (ICIC 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12464))

Included in the following conference series:

  • 926 Accesses

Abstract

Intrusion detection systems are becoming increasingly important in network security, which have been widely used to protect our terminal devices against network attacks. However, classification of imbalanced datasets is one of the main challenges in intrusion detection. Traditional methods are biased to the majority classes, which cannot effectively detect the minority classes. This paper presents a novel ensemble classification technique for intrusion detection, which consists of dual evolution. The first evolution is run to select the features from the original training set, which are then used to extract the training set for the basic classifiers. After that, the second one is executed to choose a preferred combination from the base classifiers. When compared to other intrusion detection algorithms, the experimental results on the NSL-KDD and AWID datasets validate the advantages of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: a rule-based intrusion detection system. IEEE Trans. Softw. Eng. 21(3), 181–199 (1995)

    Article  Google Scholar 

  2. Mahadevan, V., Li, W., Bhalodia, V., Vasconcelos, N.: Anomaly detection in crowded scenes. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Francisco, CA, pp. 1975–1981 (2010)

    Google Scholar 

  3. Zhu, Z., Wang, Z., Li, D., Zhu, Y., Du, W.: Geometric structural ensemble learning for imbalanced problems. IEEE Trans. Cybern. 50(4), 1617–1629 (2020)

    Article  Google Scholar 

  4. Arafat, M., Jain, A., Wu, Y.: Analysis of intrusion detection dataset NSL-KDD using KNIME analytics. In: 13th International Conference on Cyber Warfare and Security, Washington, pp. 573–583 (2018)

    Google Scholar 

  5. Wang, S., Yao, X.: Diversity analysis on imbalanced data sets by using ensemble models. In: 2009 IEEE Symposium on Computational Intelligence and Data Mining, Nashville, TN, pp. 324–331 (2009)

    Google Scholar 

  6. Saglam, F., Cengiz, M.A.: Noise detection in imbalanced classes using adaptive boosting. In: 2019 4th International Conference on Computer Science and Engineering (UBMK), Samsun, Turkey, pp. 449–452 (2019)

    Google Scholar 

  7. Lim, P., Goh, C.K., Tan, K.C.: Evolutionary cluster-based synthetic oversampling ensemble (ECO-ensemble) for imbalance learning. IEEE Trans. Cybern. 47(9), 2850–2861 (2017)

    Article  Google Scholar 

  8. Liu, Z., et al.: Self-paced ensemble for highly imbalanced massive data classification. In: 2020 IEEE 36th International Conference on Data Engineering (ICDE), Dallas, TX, USA, pp. 841–852 (2020)

    Google Scholar 

  9. Alipourfard, T., Arefi, H., Mahmoudi, S.: A novel deep learning framework by combination of subspace-based feature extraction and convolutional neural networks for hyperspectral images classification. In: 2018 IEEE International Geoscience and Remote Sensing Symposium, Valencia, pp. 4780–4783 (2018)

    Google Scholar 

  10. Peker, M., Arslan, A., Şen, B., Çelebi, F.V., But, A.: A novel hybrid method for determining the depth of anesthesia level: combining ReliefF feature selection and random forest algorithm (ReliefF+RF). In: 2015 International Symposium on Innovations in Intelligent SysTems and Applications (INISTA), Madrid, pp. 1–8 (2015)

    Google Scholar 

  11. Salo, F., Nassif, A.B., Essex, A.: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Netw. 148, 164–175 (2019)

    Article  Google Scholar 

  12. Ji, S., Ye, J.: Generalized linear discriminant analysis: a unified framework and efficient model selection. IEEE Trans. Neural Netw. 19(10), 1768–1782 (2008)

    Article  Google Scholar 

  13. Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)

    Article  Google Scholar 

  14. Zhu, Y., Liang, J., Chen, J., Ming, Z.: An improved NSGA-III algorithm for feature selection used in intrusion detection. Knowl.-Based Syst. 116, 74–85 (2017)

    Article  Google Scholar 

  15. Yang, Y.H., Huang, H.Z., Shen, Q.N., Wu, Z.H., Zhang, Y.: Research on intrusion detection based on incremental GHSOM. Chin. J. Comput. 37(5), 1216–1224 (2014)

    Google Scholar 

  16. Hui, H.W., Woo, Y.H., Hung, C.H., Leung, K.N.: A double gain-boosted amplifier with widened output swing based on signal-and transient-current boosting technique in CMOS 130-nm technology. In: 2018 IEEE International Conference on Electron Devices and Solid State Circuits (EDSSC), Shenzhen, pp. 1–2 (2018)

    Google Scholar 

  17. Yu, Y., Su, H.: Collaborative representation ensemble using bagging for hyperspectral image classification. In: IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium, Yokohama, Japan, pp. 2738–2741 (2019)

    Google Scholar 

  18. Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.A.M.T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002)

    Article  Google Scholar 

  19. Gupta, A.K., Sardana, N.: Significance of clustering coefficient over jaccard index. In: 2015 Eighth International Conference on Contemporary Computing (IC3), Noida, pp. 463–466 (2015)

    Google Scholar 

  20. Deb, K., Jain, H.: An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: solving problems with box constraints. IEEE Trans. Evol. Comput. 18(4), 577–601 (2014)

    Article  Google Scholar 

  21. Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 80211 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 18(1), 184–208 (2016)

    Article  Google Scholar 

  22. Abdulhammed, R., Faezipour, M., Abuzneid, A., Alessa, A.: Effective features selection and machine learning classifiers for improved wireless intrusion detection. In: 2018 International Symposium on Networks, Computers and Communications (ISNCC), Rome, pp. 1–6 (2018)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the National Natural Science Foundation of China (NSFC) under Grants 61876110, 61836005, and 61672358, the Joint Funds of the NNFC under Key Program Grant U1713212, and the Shenzhen Scientific Research and Development Funding Program under grant JCYJ20190808164211203.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiuzhen Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lin, Q., Hu, C., Chen, S., Huang, P. (2020). An Ensemble Classification Technique for Intrusion Detection Based on Dual Evolution. In: Huang, DS., Jo, KH. (eds) Intelligent Computing Theories and Application. ICIC 2020. Lecture Notes in Computer Science(), vol 12464. Springer, Cham. https://doi.org/10.1007/978-3-030-60802-6_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60802-6_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60801-9

  • Online ISBN: 978-3-030-60802-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics