A Hybrid Approach for Network Intrusion Detection

被引:29
|
作者
Mehmood, Mavra [1 ]
Javed, Talha [2 ]
Nebhen, Jamel [3 ]
Abbas, Sidra [2 ]
Abid, Rabia [1 ]
Bojja, Giridhar Reddy [4 ]
Rizwan, Muhammad [1 ]
机构
[1] Kinuaird Coll Women, Dept Comp Sci, Lahore 54000, Pakistan
[2] ASET Labs, Islamabad, Pakistan
[3] Prince Sattam bin Abdulaziz Univ, Coll Comp Sci & Engn, Alkharj 11942, Saudi Arabia
[4] Dakota State Univ, Coll Business & Informat Syst, Madison, SD USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 01期
关键词
Network security; intrusion detection system; machine learning; attacks; data mining; classification; feature selection; SYSTEM;
D O I
10.32604/cmc.2022.019127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the widespread use of the internet and smart devices, various attacks like intrusion, zero-day, Malware, and security breaches are a constant threat to any organization's network infrastructure. Thus, a Network Intrusion Detection System (NIDS) is required to detect attacks in network traffic. This paper proposes a new hybrid method for intrusion detection and attack categorization. The proposed approach comprises three steps to address high false and low false-negative rates for intrusion detection and attack categorization. In the first step, the dataset is preprocessed through the data transformation technique and min-max method. Secondly, the random forest recursive feature elimination method is applied to identify optimal features that positively impact the model's performance. Next, we use various Support Vector Machine (SVM) types to detect intrusion and the Adaptive NeuroFuzzy System (ANFIS) to categorize probe, U2R, R2U, and DDOS attacks. The validation of the proposed method is calculated through Fine Gaussian SVM (FGSVM), which is 99.3% for the binary class. Mean Square Error (MSE) is reported as 0.084964 for training data, 0.0855203 for testing, and 0.084964 to validate multiclass categorization.
引用
收藏
页码:91 / 107
页数:17
相关论文
共 50 条
  • [31] A Network Intrusion Detection Approach at the Edge of Fog
    Azarkasb, Seyed Omid
    Kashi, Saeed Sedighian
    Khasteh, Seyed Hossein
    2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC), 2021,
  • [32] A clustering approach to wireless network intrusion detection
    Zhong, S
    Khoshgoftaar, TM
    Nath, SV
    ICTAI 2005: 17TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, : 190 - 196
  • [33] A Feature Selection Approach for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 133 - 137
  • [34] A Transfer Learning Approach for Network Intrusion Detection
    Wu, Peilun
    Guo, Hui
    Buckland, Richard
    2019 4TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2019), 2019, : 281 - 285
  • [35] Intelligent Hybrid Anomaly Network Intrusion Detection System
    Eid, Heba F.
    Darwish, Ashraf
    Hassanien, Aboul Ella
    Kim, Tai-hoon
    COMMUNICATION AND NETWORKING, PT I, 2011, 265 : 209 - +
  • [36] A multimodal hybrid parallel network intrusion detection model
    Shi, Shuxin
    Han, Dezhi
    Cui, Mingming
    CONNECTION SCIENCE, 2023, 35 (01)
  • [37] RESEARCH OF A HYBRID DISTRIBUTED NETWORK INTRUSION DETECTION SYSTEM
    Li, Qin
    Yan, Danfeng
    Yang, Fangchun
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 301 - 305
  • [38] A hybrid and learning agent architecture for network intrusion detection
    Leite, Adriana
    Girardi, Rosario
    JOURNAL OF SYSTEMS AND SOFTWARE, 2017, 130 : 59 - 80
  • [39] Application of a hybrid feedforward neural network to intrusion detection
    Yao, Yu
    Gao, Fu-Xiang
    Deng, Qing-Xu
    Yu, Ge
    Zhang, Shou-Zhi
    Kongzhi yu Juece/Control and Decision, 2007, 22 (04): : 432 - 435
  • [40] Network Intrusion Detection using Hybrid Machine Learning
    Chuang, Po-Jen
    Li, Si-Han
    2019 INTERNATIONAL CONFERENCE ON FUZZY THEORY AND ITS APPLICATIONS (IFUZZY), 2019, : 289 - 293