Skip to main content
Log in

A weighted intrusion detection model of dynamic selection

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

In view of the difficulty of existing intrusion detection methods in dealing with new forms, large scale, and high concealment of network intrusion behaviors, this paper presents a weighted intrusion detection model of the dynamic selection (WIDMoDS) based on data features. The aim is to customize intrusion detection models for network intrusion data sets of different types, sizes and structures. First, according to data features, single classifiers are clustered using a hierarchical clustering algorithm based on the classifiers evaluation indicators, and then, the classifiers selection is by means of accuracy of the single classifiers, in addition, the data-classifier applicable indicators (DCAI) and of the classifiers performances are used for calculating the weights of subjective and objective, and then calculating combined weight ranks. Finally, a custom intrusion detection model is generated by the Weight-voting (W-voting) algorithm. Our experiments show that this model can optimize the number of classifiers based on the data sets features, reduce the problem of redundant or insufficient classifiers in the ensemble process. A new network intrusion detection model of combining the classifier characteristics with the dataset attributes can improve the accuracy of intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Qiuting T, Dezhi H, Kuan Ching L, Xingao L et al (2020) An intrusion detection approach based on improved deep belief network. Appl Intell 50:3162–3178

    Article  Google Scholar 

  2. Wang H, Jiang X, Kambourakis G (2015) Special issue on security, privacy and trust in network based big data. Inf Sci 318(C):48–50

    Article  MathSciNet  Google Scholar 

  3. Mokhtar B, Eltoweissy M (2017) Big data and semantics managementsystem for computer networks. Ad Hoc Netw 57:32–51

    Article  Google Scholar 

  4. Sanchez M I, Zeydan E, Oliva A D L, et al. (2016) Mobility management: deployment and adaptability aspects through mobile data traffic analysis. Comput Commun 95:3–14

    Article  Google Scholar 

  5. Saraladevi B, Pazhaniraja N, Paul P V, et al. (2015) Big data and hadoop-a study in security perspective. Procedia Comput Sci 50:596–601

    Article  Google Scholar 

  6. Çavuşoğlu Ü (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49:2735–2761

    Article  Google Scholar 

  7. Liu J, He J, Ma T, Zhang W, Tang Z, Xu P (2019) Selective ensemble of KELM-based complex network intrusion detection. Acta Electron Sin 47(05):1070–1078

    Google Scholar 

  8. Abawajy J, Chowdhury M, Kelarev A (2015) Hybrid consensuspruning of ensemble classifiers for big data malware detection. IEEE Trans Cloud Comput 1:99

    Google Scholar 

  9. Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49:3235–3247

    Article  Google Scholar 

  10. Feng X, Xiao Z, Zhong B, Dong Y, Qiu J (2019) Dynamic weighted ensemble classification for credit scoring using Markov Chain. Appl Intell 49:555–568

    Article  Google Scholar 

  11. Nancy P, Muthurajkumar S, Ganapathy S, Santhosh Kumar S V N, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Inf Secur 14(5):888–895

    Google Scholar 

  12. Cruz R M O, Sabourin R, Cavalcanti G D C (2017) Dynamic classifier selection: recent advances and perspectives. Inf Fusion 41:196–215

    Google Scholar 

  13. Pérez-Gállego P, Castaño A, Quevedo J R, del Coz J J (2019) Dynamic ensemble selection for quantification tasks. Inf Fusion 45:1–15

    Article  Google Scholar 

  14. Xia J, Zhang S, Cai G, Li L, Pan Q, Yan J, Ning G (2017) Adjusted weight voting algorithm for random forests in handling missing values. Pattern Recognit 69:52–60

    Article  Google Scholar 

  15. Yang G, Zhang A, Li S, Wang Y, Wang Y, Xie Q, He L (2017) Multi-objective evolutionary algorithm based on decision space partition and its application in hybrid power system optimisation. Appl Intell 46:827–844

    Article  Google Scholar 

  16. Jin D, Lu Y, Qin J, Cheng Z, Mao Z (2020) SwiftIDS: real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. Comput Secur 97:101984

    Article  Google Scholar 

  17. Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28:1051–1058

    Article  Google Scholar 

  18. Wu Z, Wang J, Hu L, Zhang Z, Wu H (2020) A network intrusion detection method based on semantic re-encoding and deep learning. J Netw Comput Appl 164:102688

    Article  Google Scholar 

  19. Shahraki A, Abbasi M, Haugen Ø (2020) Boosting algorithms for network intrusion detection: a comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost. Eng Appl Artif Intell 94:103770

    Article  Google Scholar 

  20. Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247

    Article  Google Scholar 

  21. Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210–42219

    Article  Google Scholar 

  22. Shitharth S, Prince Winston D (2017) An enhanced optimization based algorithm for intrusion detection in SCADA network. Comput Secur 70:16–26

    Article  Google Scholar 

  23. Liu G, Yan Z, Pedrycz W (2018) Data collection for attack detection and security measurement in mobile ad hoc networks: a survey. J Netw Comput Appl 105:105–122

    Article  Google Scholar 

  24. Hamid Y, Shah F A, Sugumaran M (2019) Wavelet neural network model for network intrusion detection system. Int J Inf Technol 11:251–263

    Google Scholar 

  25. Verma A, Ranga V (2018) Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learning. Procedia Comput Sci 125:709–716

    Article  Google Scholar 

  26. Mi A, Zhang P (2017) A classifier selection method based on confusion matrix. J Henan Polytech Univ (Natural Science Edition) 02:121–126

    Google Scholar 

  27. žliobaitė I, Bifet A, Read J, Pfahringer B, Holmes G (2015) Evaluation methods and decision theory for classification of streaming data with temporal dependence. Mach Learn 98:455–482

    Article  MathSciNet  MATH  Google Scholar 

  28. Abdi F, Abolmakarem S (2019) Customer behavior mining framework (CBMF) using clustering and classification techniques. J Ind Eng Int 15:1–18

    Article  Google Scholar 

  29. Avudaiammal R, Swarnalatha A, Seethalakshmi P (2018) Classifier evaluation and attribute selection against active adversaries. Wireless Pers Commun 98:1219–1236

    Article  Google Scholar 

  30. Boutaba R, Salahuddin M A, Limam N, Ayoubi S, Shahriar N, Estrada-Solano F, Caicedo O M (2018) A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J Internet Serv Appl 9:16

    Article  Google Scholar 

  31. Zhang W, Wang D, Tan X (2019) Robust class-specific autoencoder for data cleaning and classification in the presence of label noise. Neural Process Lett 50:1845–1860

    Article  Google Scholar 

  32. Fernandes de Mello R, Ponti M A (2018) Machine learning: a practical approach on the statistical learning theory. Springer, Cham, pp 219–324

    Book  MATH  Google Scholar 

  33. Rebala G, Ravi A, Churiwala S (2019) An introduction to machine learning. Springer, Cham, pp 19–116

    MATH  Google Scholar 

  34. Buntine W (2020) Machine learning after the deep learning revolution. Frontiers of Computer Science 14:146320

    Article  Google Scholar 

  35. Kubat M (2015) An introduction to machine learning. Springer, Cham, pp 19–189

    Book  MATH  Google Scholar 

  36. Qiu J, Wu Q, Ding G, Xu Y, Feng S (2016) A survey of machine learning for big data processing. EURASIP Journal on Advances in Signal Processing, 67,1–16

  37. Liu Z, Zhan Q, Tian G (2019) Summary of comprehensive evaluation of factor analysis. Stat Decis (19):68–73

  38. Li T, Xue J, Xia W, Ding Y (2019) Application of the combined weighting method-barrel comprehensive index method in the evaluation of the Yangtze River ecological waterway. J Appl Found Eng Sci 27 (01):41–54

    Google Scholar 

  39. Luo C, Wang Y, Hu Z, Li J, Jiang Z (2019) Weighting by cross-validation: a calibration method for force measurements via transient response analysis. Exp Tech 43:469–478

    Article  Google Scholar 

  40. Bhuvaneswari Amma N G, Selvakumar S (2020) A statistical class center based triangle area vector method for detection of denial of service attacks. Cluster Comput 9

  41. Asad M, Asim M, Javed T, Beg M O, Mujtaba H, Abbas S (2020) DeepDetect: detection of distributed denial of service attacks using deep learning. Comput J 63:983–994

    Article  Google Scholar 

  42. D’hooge L, Wauters T, Volckaert B, De Turck F (2020) Inter-dataset generalization strength of supervised machine learning methods for intrusion detection. J Inf Secur Appl 54:102564

    Google Scholar 

  43. Hamamoto A H, Carvalho L F, Hiera Sampaio L D, Abrão T, Proença M L (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Exp Syst Appl 92:390–402

    Article  Google Scholar 

  44. Tama B A, Comuzzi M, Rhee K H (2019) Tseids: a two-stage classifier ensemble for intelligent anomaly based intrusion detection system. IEEE Access 7:94497–94507

    Article  Google Scholar 

  45. Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:7

    Article  Google Scholar 

  46. Kaur A, Pal SK, Pal Singh A (2018) Hybridization of K-means and firefly algorithm for intrusion detection system. Int J Syst Assur Eng Manag 9:901–910

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant No. 61762060), Educational Commission of Gansu Province, China (Grant No.2017C-05), Foundation for the Key Research and Development Program of Gansu Province, China (Grant No.20YF3GA016).The data set comes from the official website. The authors gratefully acknowledge the anonymous reviewers for their helpful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manfang Dou.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, T., Dou, M. A weighted intrusion detection model of dynamic selection. Appl Intell 51, 4860–4873 (2021). https://doi.org/10.1007/s10489-020-02090-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-020-02090-8

Keywords

Navigation