Fusion of Feature Ranking Methods for an Effective Intrusion Detection System

نویسندگان

چکیده

Expanding internet-connected services has increased cyberattacks, many of which have grave and disastrous repercussions. An Intrusion Detection System (IDS) plays an essential role in network security since it helps to protect the from vulnerabilities attacks. Although extensive research was reported IDS, detecting novel intrusions with optimal features reducing false alarm rates are still challenging. Therefore, we developed a fusion-based feature importance method reduce high dimensional space, identify attacks accurately less rate. Initially, improve training data quality, various preprocessing techniques utilized. The Adaptive Synthetic oversampling technique generates synthetic samples for minority classes. In proposed importance, use different approaches filter, wrapper, embedded methods like mutual information, random forest permutation Shapley Additive exPlanations (SHAP)-based statistical difference mean median standard deviation rank each according its rank. Then by simple plurality voting, most retrieved. fed models Extra Tree (ET), Logistic Regression (LR), Support vector Machine (SVM), Decision (DT), Extreme Gradient Boosting (XGBM). hyperparameters classification tuned Halving Random Search cross-validation enhance performance. experiments were carried out on original imbalanced balanced data. outcomes demonstrate that scenario knocked Finally, experimental analysis proved our performed well XGBM giving accuracy 99.86%, 99.68%, 92.4%, 9, 7 8 time 1.5, 4.5 5.5 s Network Security Laboratory-Knowledge Discovery Databases (NSL-KDD), Canadian Institute Cybersecurity (CIC-IDS 2017), UNSW-NB15, datasets respectively. addition, suggested been examined contrasted state art three datasets.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Online Feature Ranking for Intrusion Detection Systems

Many current approaches to the design of intrusion detection systems apply feature selection in a static, non-adaptive fashion. These methods often neglect the dynamic nature of network data which requires to use adaptive feature selection techniques. In this paper, we present a simple technique based on incremental learning of support vector machines in order to rank the features in real time ...

متن کامل

islanding detection methods for microgrids

امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...

15 صفحه اول

An Effective Intrusion Detection System for MANETs

In the recent decades the mobile wireless communication becomes more attractive because of its applications in many fields. Moving from the wired communication to wireless communication, the security is the most important property to consider. Specifically in the mobile environment it has the vulnerability, because of its portability and scalability. The mobile ad hoc wireless communication has...

متن کامل

An intelligent CRF based feature selection for effective intrusion detection

As the internet applications are growing rapidly, the intrusions to the networking system are also becoming high. In such a scenario, it is necessary to provide security to the networks by means of effective intrusion detection and prevention methods. This can be achieved mainly by developing efficient intrusion detecting systems that use efficient algorithms which can identify the abnormal act...

متن کامل

Model of an effective Intrusion Detection System

Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer security has become a major challenge, and works in this research are becoming more numerous. Various tools and mechanisms are developed to ensure a level of security to meet the demands of modern life. Among the systems, intrusion detection for identifying ab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2023

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2023.040567