A tree-based stacking ensemble technique with feature selection for network intrusion detection

نویسندگان

چکیده

Several studies have used machine learning algorithms to develop intrusion systems (IDS), which differentiate anomalous behaviours from the normal activities of network systems. Due ease automated data collection and subsequently an increased size collected on traffic activities, complexity analysis is increasing exponentially. A particular issue, due statistical computation limitations, a single classifier may not perform well for large scale as existent in modern IDS contexts. Ensemble methods been explored literature such big Although more complicated requiring additional computation, has note that ensemble can result better accuracy than classifiers different classification contexts, it interesting explore how approaches IDS. In this research, we introduce tree-based stacking technique (SET) test effectiveness proposed model two datasets (NSL-KDD UNSW-NB15). We further enhance incorporate feature selection techniques select best relevant features with SET. comprehensive performance shows our identify anomaly other existing models. This implies potentials system cybersecurity Internet Things (IoT) networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

Euclidean-based Feature Selection for Network Intrusion Detection

Nowadays, data mining has been playing an important role in the various disciplines of sciences and technologies. For computer security, data mining are introduced for helping intrusion detection System (IDS) to detect intruders correctly. However, one of the essential procedures of data mining is feature selection, which is the technique (commonly used in machine learning) for selecting a subs...

متن کامل

Linear Correlation-Based Feature Selection For Network Intrusion Detection Model

Feature selection is a preprocessing phase to machine learning, which leads to increase the classification accuracy and reduce its complexity. However, the increase of data dimensionality poses a challenge to many existing feature selection methods. This paper formulates and validates a method for selecting optimal feature subset based on the analysis of the Pearson correlation coefficients. We...

متن کامل

Ensemble Classification and Extended Feature Selection for Credit Card Fraud Detection

Due to the rise of technology, the possibility of fraud in different areas such as banking has been increased. Credit card fraud is a crucial problem in banking and its danger is over increasing. This paper proposes an advanced data mining method, considering both feature selection and decision cost for accuracy enhancement of credit card fraud detection. After selecting the best and most effec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied Intelligence

سال: 2022

ISSN: ['0924-669X', '1573-7497']

DOI: https://doi.org/10.1007/s10489-021-02968-1