Abstract
In view of the difficulty of existing intrusion detection methods in dealing with new forms, large scale, and high concealment of network intrusion behaviors, this paper presents a weighted intrusion detection model of the dynamic selection (WIDMoDS) based on data features. The aim is to customize intrusion detection models for network intrusion data sets of different types, sizes and structures. First, according to data features, single classifiers are clustered using a hierarchical clustering algorithm based on the classifiers evaluation indicators, and then, the classifiers selection is by means of accuracy of the single classifiers, in addition, the data-classifier applicable indicators (DCAI) and of the classifiers performances are used for calculating the weights of subjective and objective, and then calculating combined weight ranks. Finally, a custom intrusion detection model is generated by the Weight-voting (W-voting) algorithm. Our experiments show that this model can optimize the number of classifiers based on the data sets features, reduce the problem of redundant or insufficient classifiers in the ensemble process. A new network intrusion detection model of combining the classifier characteristics with the dataset attributes can improve the accuracy of intrusion detection.
Similar content being viewed by others
References
Qiuting T, Dezhi H, Kuan Ching L, Xingao L et al (2020) An intrusion detection approach based on improved deep belief network. Appl Intell 50:3162–3178
Wang H, Jiang X, Kambourakis G (2015) Special issue on security, privacy and trust in network based big data. Inf Sci 318(C):48–50
Mokhtar B, Eltoweissy M (2017) Big data and semantics managementsystem for computer networks. Ad Hoc Netw 57:32–51
Sanchez M I, Zeydan E, Oliva A D L, et al. (2016) Mobility management: deployment and adaptability aspects through mobile data traffic analysis. Comput Commun 95:3–14
Saraladevi B, Pazhaniraja N, Paul P V, et al. (2015) Big data and hadoop-a study in security perspective. Procedia Comput Sci 50:596–601
Çavuşoğlu Ü (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49:2735–2761
Liu J, He J, Ma T, Zhang W, Tang Z, Xu P (2019) Selective ensemble of KELM-based complex network intrusion detection. Acta Electron Sin 47(05):1070–1078
Abawajy J, Chowdhury M, Kelarev A (2015) Hybrid consensuspruning of ensemble classifiers for big data malware detection. IEEE Trans Cloud Comput 1:99
Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49:3235–3247
Feng X, Xiao Z, Zhong B, Dong Y, Qiu J (2019) Dynamic weighted ensemble classification for credit scoring using Markov Chain. Appl Intell 49:555–568
Nancy P, Muthurajkumar S, Ganapathy S, Santhosh Kumar S V N, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Inf Secur 14(5):888–895
Cruz R M O, Sabourin R, Cavalcanti G D C (2017) Dynamic classifier selection: recent advances and perspectives. Inf Fusion 41:196–215
Pérez-Gállego P, Castaño A, Quevedo J R, del Coz J J (2019) Dynamic ensemble selection for quantification tasks. Inf Fusion 45:1–15
Xia J, Zhang S, Cai G, Li L, Pan Q, Yan J, Ning G (2017) Adjusted weight voting algorithm for random forests in handling missing values. Pattern Recognit 69:52–60
Yang G, Zhang A, Li S, Wang Y, Wang Y, Xie Q, He L (2017) Multi-objective evolutionary algorithm based on decision space partition and its application in hybrid power system optimisation. Appl Intell 46:827–844
Jin D, Lu Y, Qin J, Cheng Z, Mao Z (2020) SwiftIDS: real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. Comput Secur 97:101984
Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28:1051–1058
Wu Z, Wang J, Hu L, Zhang Z, Wu H (2020) A network intrusion detection method based on semantic re-encoding and deep learning. J Netw Comput Appl 164:102688
Shahraki A, Abbasi M, Haugen Ø (2020) Boosting algorithms for network intrusion detection: a comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost. Eng Appl Artif Intell 94:103770
Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247
Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210–42219
Shitharth S, Prince Winston D (2017) An enhanced optimization based algorithm for intrusion detection in SCADA network. Comput Secur 70:16–26
Liu G, Yan Z, Pedrycz W (2018) Data collection for attack detection and security measurement in mobile ad hoc networks: a survey. J Netw Comput Appl 105:105–122
Hamid Y, Shah F A, Sugumaran M (2019) Wavelet neural network model for network intrusion detection system. Int J Inf Technol 11:251–263
Verma A, Ranga V (2018) Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learning. Procedia Comput Sci 125:709–716
Mi A, Zhang P (2017) A classifier selection method based on confusion matrix. J Henan Polytech Univ (Natural Science Edition) 02:121–126
žliobaitė I, Bifet A, Read J, Pfahringer B, Holmes G (2015) Evaluation methods and decision theory for classification of streaming data with temporal dependence. Mach Learn 98:455–482
Abdi F, Abolmakarem S (2019) Customer behavior mining framework (CBMF) using clustering and classification techniques. J Ind Eng Int 15:1–18
Avudaiammal R, Swarnalatha A, Seethalakshmi P (2018) Classifier evaluation and attribute selection against active adversaries. Wireless Pers Commun 98:1219–1236
Boutaba R, Salahuddin M A, Limam N, Ayoubi S, Shahriar N, Estrada-Solano F, Caicedo O M (2018) A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J Internet Serv Appl 9:16
Zhang W, Wang D, Tan X (2019) Robust class-specific autoencoder for data cleaning and classification in the presence of label noise. Neural Process Lett 50:1845–1860
Fernandes de Mello R, Ponti M A (2018) Machine learning: a practical approach on the statistical learning theory. Springer, Cham, pp 219–324
Rebala G, Ravi A, Churiwala S (2019) An introduction to machine learning. Springer, Cham, pp 19–116
Buntine W (2020) Machine learning after the deep learning revolution. Frontiers of Computer Science 14:146320
Kubat M (2015) An introduction to machine learning. Springer, Cham, pp 19–189
Qiu J, Wu Q, Ding G, Xu Y, Feng S (2016) A survey of machine learning for big data processing. EURASIP Journal on Advances in Signal Processing, 67,1–16
Liu Z, Zhan Q, Tian G (2019) Summary of comprehensive evaluation of factor analysis. Stat Decis (19):68–73
Li T, Xue J, Xia W, Ding Y (2019) Application of the combined weighting method-barrel comprehensive index method in the evaluation of the Yangtze River ecological waterway. J Appl Found Eng Sci 27 (01):41–54
Luo C, Wang Y, Hu Z, Li J, Jiang Z (2019) Weighting by cross-validation: a calibration method for force measurements via transient response analysis. Exp Tech 43:469–478
Bhuvaneswari Amma N G, Selvakumar S (2020) A statistical class center based triangle area vector method for detection of denial of service attacks. Cluster Comput 9
Asad M, Asim M, Javed T, Beg M O, Mujtaba H, Abbas S (2020) DeepDetect: detection of distributed denial of service attacks using deep learning. Comput J 63:983–994
D’hooge L, Wauters T, Volckaert B, De Turck F (2020) Inter-dataset generalization strength of supervised machine learning methods for intrusion detection. J Inf Secur Appl 54:102564
Hamamoto A H, Carvalho L F, Hiera Sampaio L D, Abrão T, Proença M L (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Exp Syst Appl 92:390–402
Tama B A, Comuzzi M, Rhee K H (2019) Tseids: a two-stage classifier ensemble for intelligent anomaly based intrusion detection system. IEEE Access 7:94497–94507
Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:7
Kaur A, Pal SK, Pal Singh A (2018) Hybridization of K-means and firefly algorithm for intrusion detection system. Int J Syst Assur Eng Manag 9:901–910
Acknowledgements
This work is supported by the National Natural Science Foundation of China (Grant No. 61762060), Educational Commission of Gansu Province, China (Grant No.2017C-05), Foundation for the Key Research and Development Program of Gansu Province, China (Grant No.20YF3GA016).The data set comes from the official website. The authors gratefully acknowledge the anonymous reviewers for their helpful comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Feng, T., Dou, M. A weighted intrusion detection model of dynamic selection. Appl Intell 51, 4860–4873 (2021). https://doi.org/10.1007/s10489-020-02090-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-020-02090-8