Skip to main content

Designing Scalable Intrusion Detection Systems with Stacking Based Ensemble Learning

  • Conference paper
  • First Online:
Intelligent Systems Design and Applications (ISDA 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 418))

  • 1749 Accesses

Abstract

Network Intrusion Detection Systems monitor the network traffic and reports any malicious activity. In this paper, a combination of feature engineering techniques and Ensemble Learning is proposed to build an effective Intrusion Detection System. The zero importance feature selection method is used to extract 23 features. Random forests, Feed Forward Neural Networks and Auto encoders are used as the base models and the predictions from these base models are combined using Extreme Gradient Boosting (XGB). To ensure that the proposed ensemble model is scalable as well, parallel programming is used for parallel computation of class probabilities from each model of the ensemble. The NSL-KDD dataset is used to train our models. To test our models, we use KDD+test dataset. Experimental results show that the proposed ensemble model outperforms several state-of-the-art works. The proposed parallel programming approach decreases the average prediction time of the model ensuring that the model is scalable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)

    Article  Google Scholar 

  2. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion detection systems. Comput. Netw. 31(8), 805–822 (1999)

    Article  Google Scholar 

  3. Vigna, G., Kemmerer, R.A.: NetSTAT: a network-based intrusion detection approach. In: Proceedings 14th Annual Computer Security Applications Conference (Cat. No. 98EX217), pp. 25–34. IEEE (1998)

    Google Scholar 

  4. Smaha, S.E., et al.: Haystack: an intrusion detection system. In: Fourth Aerospace Computer Security Applications Conference, vol. 44, Orlando, FL, USA (1988)

    Google Scholar 

  5. Kumar, S.: Classification and detection of computer intrusions. Ph.D. thesis, Purdue University (1995)

    Google Scholar 

  6. Dua, S., Du, X.: Data Mining and Machine Learning in Cybersecurity. CRC Press, New York (2016)

    Google Scholar 

  7. Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst. Appl. 148, 113249 (2020)

    Article  Google Scholar 

  8. Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., Al- Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)

    Article  Google Scholar 

  9. Ieracitano, C., Adeel, A., Morabito, F.C., Hussain, A.: A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing 387, 51–62 (2020)

    Article  Google Scholar 

  10. Gao, X., Shan, C., Hu, C., Niu, Z., Liu, Z.: An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7, 82512–82521 (2019)

    Article  Google Scholar 

  11. Çavuşoğlu, Ü.: A new hybrid approach for intrusion detection using machine learning methods. Appl. Intell. 49(7), 2735–2761 (2019). https://doi.org/10.1007/s10489-018-01408-x

    Article  Google Scholar 

  12. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6. IEEE (2009)

    Google Scholar 

  13. Byrd, J., Lipton, Z.: What is the effect of importance weighting in deep learning? In: International Conference on Machine Learning, pp. 872–881. PMLR (2019)

    Google Scholar 

  14. Kasongo, S.M., Sun, Y.: A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access 7, 38597–38607 (2019)

    Article  Google Scholar 

  15. Gustafson, J.L.: Reevaluating Amdahl’s law. Commun. ACM 31(5), 532–533 (1988)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Sujan Reddy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Reddy, A.S., Akashdeep, S., Kamath, S.S., Rudra, B. (2022). Designing Scalable Intrusion Detection Systems with Stacking Based Ensemble Learning. In: Abraham, A., Gandhi, N., Hanne, T., Hong, TP., Nogueira Rios, T., Ding, W. (eds) Intelligent Systems Design and Applications. ISDA 2021. Lecture Notes in Networks and Systems, vol 418. Springer, Cham. https://doi.org/10.1007/978-3-030-96308-8_80

Download citation

Publish with us

Policies and ethics