Skip to main content

Machine Learning Techniques for Anomaly-Based Detection System on CSE-CIC-IDS2018 Dataset

  • Conference paper
  • First Online:
Applications in Electronics Pervading Industry, Environment and Society (ApplePies 2022)

Abstract

Anomaly-based detection is a novel form of an intrusion detection system, which has become the focus of many researchers for cybersecurity systems. Data manages most business decisions. With more access to data, it is necessary to interrupt and analyze them correctly. When it comes to security, the first step is to determine the outliers as a security threat. Machine learning and deep learning techniques have proven to recognize anomalous attack patterns that deviate from normal network behavior. Machine learning can be utilized to learn the characteristic of data and help to improve the speed of detection. In this research, we present our approach to implementing an algorithm for the anomaly detection framework in complex and unbalanced data. The proposed method has been applied to a CSE-CIC-IDS2018 dataset. It is the most recent dataset that is publicly available, an extensive dataset that includes a wide range of attack types. This data has been pre-processed and cleaned to find helpful information for classification by the proposed models. We performed a correlation methodology to filter irrelevant anomalies and grouped the correlated anomalies into a single feature to minimize detection time. A stacked autoencoder has been used to reduce the dimensionality of the dataset. We exploited different machine learning algorithms such as (Random Forest, GaussianNB, and multilayer perceptron) to classify the streamed data. Our experimental results outperformed the superiority of the proposed approach to identify anomalous components and manage threat detection in cybersecurity applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cerullo, G., et al.: Iot and sensor networks security. In: Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, pp. 77–101. Academic Press, Cambridge (2018)

    Google Scholar 

  2. Tu, S., et al.: Security in fog computing: A novel technique to tackle an impersonation attack. IEEE Access 6, 74993–75001 (2018)

    Article  Google Scholar 

  3. Kim, J., Shin, Y., Choi, E.: An intrusion detection model based on a convolutional neural network. J. Multimedia Inf. Syst. 6(4), 165–172 (2019)

    Article  Google Scholar 

  4. D’hooge, L., et al.: Classification hardness for supervised learners on 20 years of intrusion detection data. IEEE Access 7, 167455–167469 (2019)

    Article  Google Scholar 

  5. Stiawan, D., et al.: CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8, 132911–132921 (2020)

    Article  Google Scholar 

  6. Guezzaz, A., et al.: A global intrusion detection system using pcapsocks sniffer and multilayer perceptron classifier. Int. J. Netw. Security. 21(3), 438–450 (2019)

    Google Scholar 

  7. Thaseen, I.S., Poorva, B., Ushasree, P.S.: Network intrusion detection using machine learning techniques. In: 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE). IEEE (2020)

    Google Scholar 

  8. Beghdad, R.: Training all the KDD data set to classify and detect attacks. Neural Netw. World 17(2), 81 (2007)

    Google Scholar 

  9. Thakkar, A., Lohiya, R.: A review of the advancement in intrusion detection datasets. Procedia Comput. Sci. 167, 636–645 (2020)

    Article  Google Scholar 

  10. Yulianto, A., Sukarno, P., Suwastika, N.A.: Improving adaboost- based intrusion detection system (IDS) performance on CIC IDS 2017 dataset. J. Phys.: Conf. Ser. 1192(1) (2019)

    Google Scholar 

  11. Kurniabudi, D.S., Darmawijoyo, M.Y.B., Bamhdi, A.M., Budiarto, R.: CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8, 132911–132921 (2020). https://doi.org/10.1109/ACCESS.2020.3009843

    Article  Google Scholar 

  12. Kanimozhi, V., Jacob, T.P.: Artificial intelligence-based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC- IDS2018 using cloud computing. In: 2019 international conference on communication and signal processing (ICCSP). IEEE (2019)

    Google Scholar 

  13. Kim, J., et al.: CNN-based network intrusion detection against denial-of-service attacks. Electronics 9(6), 916 (2020)

    Article  MathSciNet  Google Scholar 

  14. Kilincer, I.F., Ertam, F., Sengur, A.: Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput. Netw. 188, 10784 (2021)

    Article  Google Scholar 

  15. Ali, M.H., et al.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255–20261 (2018)

    Article  Google Scholar 

  16. Dini, P., Saponara, S.: Analysis, design, and comparison of machine-learning techniques for networking intrusion detection. Designs 5(1), 9 (2021)

    Article  Google Scholar 

  17. Bagui, S., et al.: Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Security and Privacy 2(6), e91 (2019)

    Article  Google Scholar 

  18. Aboueata, N., et al.: Supervised machine learning techniques for efficient network intrusion detection. In: 2019 28th International Conference on Computer Communication and Networks (ICCCN). IEEE (2019)

    Google Scholar 

  19. Kim, J., Shin, Y., Choi, E.: An intrusion detection model based on a convolutional neural network. J. Multimed. Inf. Syst. 6, 165–172 (2019)

    Article  Google Scholar 

  20. Farhan, R.I., Abeer, T.M., Nidaa, F.H.: Optimized deep learning with binary PSO for intrusion detection on CSE-CIC-IDS2018 dataset. J. Al Qadisiyah Comput. Sci. Math. 12, 16 (2020)

    Google Scholar 

  21. Lin, P., Ye, K., Cheng-Zhong, X.: Dynamic network anomaly detection system by using deep learning techniques. In: Da Silva, D., Wang, Q., Zhang, L.-J. (eds.) Cloud Computing – CLOUD 2019: 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings, pp. 161–176. Springer International Publishing, Cham (2019). https://doi.org/10.1007/978-3-030-23502-4_12

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdussalam Elhanashi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Elhanashi, A., Gasmi, K., Begni, A., Dini, P., Zheng, Q., Saponara, S. (2023). Machine Learning Techniques for Anomaly-Based Detection System on CSE-CIC-IDS2018 Dataset. In: Berta, R., De Gloria, A. (eds) Applications in Electronics Pervading Industry, Environment and Society. ApplePies 2022. Lecture Notes in Electrical Engineering, vol 1036. Springer, Cham. https://doi.org/10.1007/978-3-031-30333-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30333-3_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30332-6

  • Online ISBN: 978-3-031-30333-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics