Machine Learning Empowered Efficient Intrusion Detection Framework

Authors

  • Hassan Shafique
  • Asghar Ali Shah
  • Muhammad Aasim Qureshi Bahria University Lahore Campus
  • Muhammad Khurram Ehsan
  • Muhammad Rizwan Amirzada

DOI:

https://doi.org/10.21015/vtse.v10i2.1017

Abstract

In modern era security is becoming major and basic need of any system. Protecting of a system from unauthorized access is very important for a network system. Network security is turning out to be an influential subject in information technology territory.  Hackers and squatters commit uncountable successful attempts to intrude into networks. Intrusion Detection System plays a vital role in a network security to identify and detect the anomalies in a security system of network. The performance of IDS can be measured through its intelligence, efficiency and accurate detection of unknown and known attacks. The greater the gain concept give the best possible detection rate of anomalies. This study proposed a machine learning framework based on MLP classifier with accuracy 99.98%. This work is further validated through 10-fold and JackKnife cross validation. Key metrics to see the impact on accuracy and other performance measured metrics such as Sensitivity, Specificity and Matthew’s Correlation Coefficient. All the metrics gained their highest ratio, which means MLP is the best classification technique. The accuracy, sensitivity, specificity and MCC rate of the suggested model computed 99.99% from whole dataset of UNSW-NB15. These results show the improvement in accuracy while applying different perceptron topologies. K-fold and JackKnife topologies are capable to earn the 99.99% accuracy

References

C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, “Intrusion detection by machine learning: A review,” Expert Systems with Applications, vol. 36, no. 10, pp. 11994–12000, 2009. DOI: https://doi.org/10.1016/j.eswa.2009.05.029

T. Garg and S. S. Khurana, “Comparison of classification techniques for intrusion detection dataset using WEKA,” International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), 2014. DOI: https://doi.org/10.1109/ICRAIE.2014.6909184

R. B. Krishnan and N. R. Raajan, An Inhanced Multilayer Perceptron Based Approach For Efficient Intrusion Detection System, vol. 8, no. 4, pp. 23139–23156, Dec. 2016.

K. Biesecker, E, Foreman, B. Staples, K. Jones “Intelligent Transportation System (ITS) Information Security Analysis” 2008.

M. R. Yadav, P. Kumbharkar, “Intrusion Detection System with FGA and MLP Algorithm”, 2014.

A. S. Desai and D. P. Gaikwad, “Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA,” 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), 2016. DOI: https://doi.org/10.1109/ICAECCT.2016.7942601

A. K. Saxena, S. Sinha, and P. Shukla, “General study of intrusion detection system and survey of agent based intrusion detection system,” 2017 International Conference on Computing, Communication and Automation (ICCCA), 2017. DOI: https://doi.org/10.1109/CCAA.2017.8229866

T. Janarthanan and S. Zargari, “Feature selection in UNSW-NB15 and KDDCUP99 datasets,” 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), 2017. DOI: https://doi.org/10.1109/ISIE.2017.8001537

N. Sultana, N. Chilamkurti, W. Peng, and R. Alhadad, “Survey on SDN based network intrusion detection system using machine learning approaches,” Peer-to-Peer Networking and Applications, vol. 12, no. 2, pp. 493–501, Dec. 2018. DOI: https://doi.org/10.1007/s12083-017-0630-0

S. Siddiqui, M. S. Khan, K. Ferens, and W. Kinsner, “Fractal based cognitive neural network to detect obfuscated and indistinguishable internet threats,” 2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), 2017 DOI: https://doi.org/10.1109/ICCI-CC.2017.8109765

L. V. Efferen and A. M. Ali-Eldin, “A multi-layer perceptron approach for flow-based anomaly detection,” 2017 International Symposium on Networks, Computers and Communications (ISNCC), 2017. DOI: https://doi.org/10.1109/ISNCC.2017.8072036

M. N. Chowdhury, “Network Intrusion Detection using Machine Learning,” Network Intrusion Detection using Machine Learning, 2016.

M. Belouch, S. El, and M. Idhammad, “A Two-Stage Classifier Approach using RepTree Algorithm for Network Intrusion Detection,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, 2017. DOI: https://doi.org/10.14569/IJACSA.2017.080651

I. Benmessahel, K. Xie, M. Chellal, and T. Semong, “A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization,” Evolutionary Intelligence, vol. 12, no. 2, pp. 131–146, 2019.

H. Gharaee and H. Hosseinvand, “A new feature selection IDS based on genetic algorithm and SVM,” 2016 8th International Symposium on Telecommunications (IST), 2016. DOI: https://doi.org/10.1109/ISTEL.2016.7881798

D. G. Mogal, S. R. Ghungrad, and B. B. Bhusare, “NIDS using Machine Learning Classifiers on UNSW-NB15 and KDDCUP99 Datasets,” Ijarcce, vol. 6, no. 4, pp. 533–537, 2017. DOI: https://doi.org/10.17148/IJARCCE.2017.64102

P. Mishra, E. S. Pilli, V. Varadharajant, and U. Tupakula, “NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment,” 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016. DOI: https://doi.org/10.1109/ICACCI.2016.7732025

N. Moustafa and J. Slay, “The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems,” 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2015. DOI: https://doi.org/10.1109/BADGERS.2015.014

N. Moustafa and J. Slay, “The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set,” Information Security Journal: A Global Perspective, vol. 25, no. 1-3, pp. 18–31, Nov. 2016. DOI: https://doi.org/10.1080/19393555.2015.1125974

B. Setiawan, S. Djanali, and T. Ahmad, “A Study on Intrusion Detection Using Centroid-Based Classification,” Procedia Computer Science, vol. 124, pp. 672–681, 2017. DOI: https://doi.org/10.1016/j.procs.2017.12.204

Z. Tan, A. Jamdagni, X. He, P. Nanda, R. P. Liu, and J. Hu, “Detection of Denial-of-Service Attacks Based on Computer Vision Techniques,” IEEE Transactions on Computers, vol. 64, no. 9, pp. 2519–2533, Jan. 2015. DOI: https://doi.org/10.1109/TC.2014.2375218

R. Vijayanand, D. Devaraj, and B. Kannapiran, “Support vector machine based intrusion detection system with reduced input features for advanced metering infrastructure of smart grid,” 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017. DOI: https://doi.org/10.1109/ICACCS.2017.8014590

M. F. Baharuddin, “Malicious URL Classification System Using Multi-Layer Perceptron Technique,” Journal of Theoretical and Applied Information Technology, vol. 96, pp. 6454–6462, Oct. 2018.

A. Divekar, M. Parekh, V. Savla, R. Mishra, and M. Shirole, “Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives,” 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS), 2018.

S. Rauch and S. Panchal, “When to use Standard Scaler and when Normalizer?,” Data Science Stack Exchange, 01-May-1969. [Online]. Available:https://datascience.stackexchange.com/questions/45900/when-t--use-standard-scaler-and-when-normalizer. [Accessed: 15-Sep-2019].

A. Adeyemo and H. Wimmer, “Effects of Normalization Techniques on Logistic Regression on Data Science“, 2018 Proceedings of the Conference on Information Systems Applied Research Norfolk Virginia, Vol. 11, No. 4813.

H. Mohamed, H. Hefny and A. Alsawy, “Intrusion Detection System Using Machine Learning Approaches”, Egyptian Computer Science Journal Vol. 42, No.3, May 2018.

A. Tobi and Duncan, “Improving Intrusion Detection Model Prediction by Threshold Adaptation,” Information, vol. 10, no. 5, p. 159, 2019.

S. Yadav and S. Shukla, “Analysis of k-Fold Cross-Validation over Hold-Out Validation on Colossal Datasets for Quality Classification,” 2016 IEEE 6th International Conference on Advanced Computing (IACC), 2016. DOI: https://doi.org/10.1109/IACC.2016.25

S. Pal and S. Mitra, “Multilayer perceptron, fuzzy sets, and classification,” IEEE Transactions on Neural Networks, vol. 3, no. 5, pp. 683–697, 1992. DOI: https://doi.org/10.1109/72.159058

H. Ezzatibrahim, S. M. Badr, and M. A. Shaheen, “Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems,” International Journal of Computer Applications, vol. 56, no. 7, pp. 10–16, 2012.

E. G. Britton, J. Tavs, and R. Bournas, “TCP/IP: The next generation,” IBM Systems Journal, vol. 34, no. 3, pp. 452–471, 1995. DOI: https://doi.org/10.1147/sj.343.0452

M. Almesidin, M. Alzubi, S. Kovacs, M. Alkasassbeh, “Evaluation of Machine Leaning Algorithms for Intrusion Detection System”.

M. Alkasassbeh, M. Almseidin, “Machine Learning Methods for Network Intrusion Detection”, International Journal of Computer and Information Engineering, Vol.12, No.8, 2018.

H. E. Ibrahim, S. M. Badr, M. A. Shaheen, “ Adaptive Layered Approach Using Machine Learning Techniques with Gain Ratio for Intrusion Detection System “, International Journal of Computer Applications (0975-8887), Volume 56 No.7 October 2012. DOI: https://doi.org/10.5120/8901-2928

H. Chauhan, V. Kumar, S. Pundir, and E. S. Pilli, “A Comparative Study of Classification Techniques for Intrusion Detection,” 2013 International Symposium on Computational and Business Intelligence, 2013. DOI: https://doi.org/10.1109/ISCBI.2013.16

R. B. Karishnan and N.R. Raajan, “An Enhanced Multilayer Perceptron Based Approach For Efficient Intrusion Detection System”, International Journal of Pharmacy & Technology”, IJPT, Vol 8, No.4, pp. 23139-23156, December 2016.

S. Boughorbel, F. Jarray, and M. El-Anbari, “Optimal classifier for imbalanced data using Matthews Correlation Coefficient metric,” Plos One, vol. 12, no. 6, Feb. 2017. DOI: https://doi.org/10.1371/journal.pone.0177678

H. Zhang, C. Q. Wu, S. Gao, Z. Wang, Y. Xu, and Y. Liu, “An Effective Deep Learning Based Scheme for Network Intrusion Detection,” 2018 24th International Conference on Pattern Recognition (ICPR), 2018.

K. Kokkinidis, T. Mastoras, A. Tsagaris, and P. Fotaris, “An empirical comparison of machine learning techniques for chant classification,” 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2018.

H. Abdi and L. J. Williams, “JackKnife.” [Online]. Available: https://utdallas.edu/~herve/abdi-Jackknife2010-pretty.pdf. [Accessed: 27-Jul-2019].

Downloads

Published

2022-05-13

How to Cite

Shafique, H., Shah, A. A., Qureshi, M. A., Ehsan, M. K., & Amirzada, M. R. (2022). Machine Learning Empowered Efficient Intrusion Detection Framework. VFAST Transactions on Software Engineering, 10(2), 27–35. https://doi.org/10.21015/vtse.v10i2.1017

Issue

Section

Articles