Ensemble of Classifiers Based Network Intrusion Detection System Performance Bound

被引:0
|
作者
Mkuzangwe, Nenekazi N. P. [1 ,2 ]
Nelwamondo, Fulufhelo [1 ,2 ]
机构
[1] CSIR, Modelling & Digital Sci Unit, Pretoria, South Africa
[2] Univ Johannesburg, Dept Elect & Elect Engn, Jonannesburg, South Africa
关键词
Network intrusion detection system; network intrusion detection system performance bound; AdaBoost; ensemble; intrusion detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance of such NIDS. Therefore the knowledge of this bound would help researchers estimate the performance of their ensemble of classifiers based network intrusion detection systems (NIDSs) before they even implement them. The performance bound is defined in terms of the average information gain associated with the features used in building the ensemble and is obtained by Adaboosting a decision stump which is the weak classifier in the ensemble. Different proportions of the NSL KDD dataset that was filtered for Neptune and normal connections were used as different datasets in this study for observing the performance behaviour of the ensemble. The bound is based on the performance of this ensemble in classifying the normal and Neptune connections. Classification accuracy was used as the performance measure in this study. From the experimental results, we therefore deduce that, if the average information gain value amongst features used in the ensemble lies between 0.045651 and 0.25615 then the classification accuracy of the ensemble will be at most 0.9.
引用
收藏
页码:970 / 974
页数:5
相关论文
共 50 条
  • [41] Intrusion Detection in Smart Grid Using Bagging Ensemble Classifiers
    Subasi, Abdulhamit
    Qaisar, Saeed M.
    Al-Nory, Malak
    Rambo, Khulood A.
    PROCEEDINGS OF 2019 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT-EUROPE), 2019,
  • [42] Intrusion Detection in Smart City Hospitals using Ensemble Classifiers
    Saba, Tanzila
    2020 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2020), 2020, : 418 - 422
  • [43] Combining heterogeneous classifiers for network intrusion detection
    Borji, Ali
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 254 - 260
  • [44] Entropy clustering-based granular classifiers for network intrusion detection
    Hui Liu
    Gang Hao
    Bin Xing
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [45] Multiple classifiers combination based on protocol analysis for network - Intrusion detection
    Sungang
    Zhangli
    Guojun
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 1578 - 1581
  • [46] Sequential classifiers for network intrusion detection based on data selection process
    Corrales, David Camilo
    Corrales, Juan Carlos
    Sanchis, Araceli
    Ledezma, Agapito
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 1827 - 1832
  • [47] Performance of network intrusion detection cluster system
    Watanabe, K
    Tsuruoka, N
    Himeno, R
    HIGH PERFORMANCE COMPUTING, 2003, 2858 : 278 - 287
  • [48] Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection
    Aburomman, Abdulla Amin
    Reaz, Mamun Bin Ibne
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 636 - 640
  • [49] Entropy clustering-based granular classifiers for network intrusion detection
    Liu, Hui
    Hao, Gang
    Xing, Bin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [50] The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network
    Agrawal N.
    Tapaswi S.
    International Journal of Wireless Information Networks, 2017, 24 (1) : 14 - 26