Skip to main content
Log in

A stacked ensemble learning model for intrusion detection in wireless network

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Intrusion detection pretended to be a major technique for revealing the attacks and guarantee the security on the network. As the data increases tremendously every year on the Internet, a single algorithm is not sufficient for the network security. Because, deploying a single learning approach may suffer from statistical, computational and representational issues. To eliminate these issues, this paper combines multiple machine learning algorithms called stacked ensemble learning, to detect the attacks in a better manner than conventional learning, where a single algorithm is used to identify the attacks. The stacked ensemble system has been taken the benchmark data set, NSL-KDD, to compare its performance with other popular machine learning algorithms such as ANN, CART, random forest, SVM and other machine learning methods proposed by researchers. The experimental results show that stacked ensemble learning is a proper technique for classifying attacks than other existing methods. And also, the proposed system shows better accuracy compare to other intrusion detection models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Denning DE (1987) An intrusion-detection model. IEEE Trans Softw Eng 2:222–232

    Article  Google Scholar 

  2. Breiman L (2001) Random forests. Mach Learn 45(1):5–32

    Article  Google Scholar 

  3. Friedman JH (2001) Greedy function approximation: a gradient boosting machine. Ann Stat 29:1189–1232

    Article  MathSciNet  Google Scholar 

  4. Aung YY, Min MM (2017) An analysis of random forest algorithm based network intrusion detection system. In: 2017 18th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). IEEE

  5. Abdulhammed R et al (2019) Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic. IEEE Sens Lett 3(1):1–4

    Article  Google Scholar 

  6. Ahmad I et al (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33789–33795

    Article  Google Scholar 

  7. Aburomman AA, Reaz MBI (2017) A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput Secur 65:135–152

    Article  Google Scholar 

  8. Choudhury S, Bhowal A (2015) Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection. In: 2015 international conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM). IEEE

  9. Chang Y, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE

  10. Chabathula KJ, Jaidhar CD, Ajay Kumara MA (2015) Comparative study of principal component analysis based intrusion detection approach using machine learning algorithms. In: 2015 3rd international conference on signal processing, communication and networking (ICSCN). IEEE

  11. Sing J, Nene MJ (2013) A survey on machine learning techniques for intrusion detection systems. Int J Adv Res Comput Commun Eng 2(11):4349–4355

    Google Scholar 

  12. Joshi M (2012) Classification, clustering and intrusion detection system. Int J Eng Res Appl (IHERA) 2(2):961–964

    Google Scholar 

  13. Khan JA, Jain N (2016) A survey on intrusion detection systems and classification techniques. Int J Sci Res Sci Eng Technol 2(5):202–208

    Google Scholar 

  14. Li H, et al (2018) A RF-PSO based hybrid feature selection model in intrusion detection system. In: 2018 IEEE 3rd international conference on data science in cyberspace (DSC). IEEE

  15. Latah M, Toker L (2018) Towards an efficient anomaly-based intrusion detection for software-defined networks. IET Netw 7(6):453–459

    Article  Google Scholar 

  16. Malik AJ, Shahzad W, Khan FA (2015) Network intrusion detection using hybrid binary PSO and random forests algorithm. Secur Commun Netw 8(16):2646–2660

    Article  Google Scholar 

  17. Murugan NS, Devi GU (2018) Detecting spams in social networks using ML algorithms—a review. Int J Environ Waste Manag 21(1):22–36

    Article  Google Scholar 

  18. Maniriho P, Ahmad T (2018) Analyzing the performance of machine learning algorithms in anomaly network intrusion detection systems. In: 2018 4th international conference on science and technology (ICST), vol 1. IEEE

  19. Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000

    Article  Google Scholar 

  20. Wang C-R et al (2018) Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowl Based Syst 147:68–80

    Article  Google Scholar 

  21. Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern Part C Appl Rev 38(5):649–659

    Article  Google Scholar 

  22. Yin C et al (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961

    Article  Google Scholar 

  23. Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: 2015 international conference on signal processing and communication engineering systems. IEEE

  24. Murugan NS, Devi GU (2019) Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms. Cluster Comput 22:13965–13974

    Article  Google Scholar 

  25. https://www.unb.ca/cic/datasets/NSL.html

  26. The UCI KDD Archive KDD’99 datasets. Irvine, CA, USA, 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  27. Wu K, Chen Z, Li W (2018) A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6:50850–50859

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Usha Devi Gandhi.

Ethics declarations

Conflict of interest

There is no conflict of interest from the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajadurai, H., Gandhi, U. A stacked ensemble learning model for intrusion detection in wireless network. Neural Comput & Applic 34, 15387–15395 (2022). https://doi.org/10.1007/s00521-020-04986-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-020-04986-5

Keywords

Navigation