Abstract
Advanced machine learning (ML) and deep learning (DL) methods have provided efficient intrusion detection with minimum probability of false positives. Most existing IDS models have been evaluated over out-dated benchmark cyber security IDS datasets such as KDDCUP 1999 or NSL-KDD since the collection and extraction of attack features from the real-time network traffic data is a complicated process. This paper aims at generating a real-time dataset for IDS evaluation and testing. The real-time data were obtained by analyzing the real traffic analysis in a computer network with an Internet connection to extract the attack and normal traffic features which were referenced from popular datasets such as KDDCUP 1999 and NSL-KDD. In this study, the real-time data is collected with two attack classes (denial-of-service (DoS) and shellcode) and normal class data for evaluation. Advanced classification approaches of hyper-heuristic support vector machines (HH-SVM), hyper-heuristic improved particle swarm optimization based support vector machines (HHIPSO-SVM), and hyper-heuristic firefly algorithm based convolutional neural networks (HHFA-CNN) along with fuzzy optimized independent component analysis (FOICA) dimensionality reduction technique are evaluated using this dataset. Experimental results showed the effectiveness of the advanced classification methods with and without dimensionality reduction technique with the HHFA-CNN with FOICA achieving high accuracy and reduced time complexity for the real-time dataset.




REFERENCES
Liao, H.-J., Lin, Ch.-H.R., Lin, Yi.-Ch., and Tung, K.-Y/u., Intrusion detection system: A comprehensive review, J. Network Comput. Appl., 2013, vol. 36, no. 1, pp. 16–24. https://doi.org/10.1016/j.jnca.2012.09.004
Singh, R., Kumar, H., Singla, R.K., and Ketti, R.R., Internet attacks and intrusion detection system: A review of the literature, Online Inf. Rev., 2017, vol. 41, no. 2, pp. 171–184. https://doi.org/10.1108/OIR-12-2015-0394
Saranya, T., Sridevi, S., Deisy, C., Chung, T.D., and Ahamed Khan, M.K.A., Performance analysis of machine learning algorithms in intrusion detection system: A review, Procedia Comput. Sci., 2020, vol. 171, pp. 1251–1260. https://doi.org/10.1016/j.procs.2020.04.133
Yang, Q., Fu, H., and Zhu, T., An optimization method for parameters of SVM in network intrusion detection system, 2016 Int. Conf. on Distributed Computing in Sensor Systems (DCOSS), Washington, 2016, IEEE, 2016, pp. 136–142. https://doi.org/10.1109/DCOSS.2016.48
Liu, Ch., Yang, J., and Wu, J., Web intrusion detection system combined with feature analysis and SVM optimization, EURASIP J. Wireless Commun. Networking, 2020, vol. 2020, p. 33. https://doi.org/10.1186/s13638-019-1591-1
Liu, H., and Lang, B., Machine learning and deep learning methods for intrusion detection systems: A survey, Appl. Sci., 2019, vol. 9, no. 20, p. 4396. https://doi.org/10.3390/app9204396
Ahmad, Z., Shahid Khan, A., Wai Shiang, Ch., Abdullah, J., and Ahmad, F., Network intrusion detection system: A systematic study of machine learning and deep learning approaches, Trans. Emerging Telecommun. Technol., 2021, vol. 32, no. 1, p. e4150. https://doi.org/10.1002/ett.4150
Chen, L., Kuang, X., Xu, A., Suo, S., and Yang, Yi., A Novel network intrusion detection system based on CNN, Eighth Int. Conf. on Advanced Cloud and Big Data (CBD), Taiyuan, China, 2020, IEEE, 2020, pp. 243–247. https://doi.org/10.1109/CBD51900.2020.00051
Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., and Abuzneid, A., Features dimensionality reduction approaches for machine learning-based network intrusion detection, Electronics, 2019, vol. 8, no. 3, p. 322. https://doi.org/10.3390/electronics8030322
Thakkar, A. and Lohiya, R., A review of the advancement in intrusion detection datasets, Procedia Comput. Sci., 2020, vol. 167, pp. 636–645. https://doi.org/10.1016/j.procs.2020.03.330
Sabar, N.R., Yi, X., and Song, A., A bi-objective hyper-heuristic support vector machine for big data cyber-security, IEEE Access, 2018, vol. 6, pp. 10421–10431. https://doi.org/10.1109/ACCESS.2018.2801792
Phan, T.V. and Park, M., Efficient distributed denial-of-service attack defence in SDN-based cloud, IEEE Access, 2019, vol. 7, pp. 18701–18714. https://doi.org/10.1109/ACCESS.2019.2896783
Al-Hadhrami, Ya. and Hussain, F.K., Real-time dataset generation framework for intrusion detection systems in IoT, Future Gener. Comput. Syst., 2020, vol. 108, pp. 414–423. https://doi.org/10.1016/j.future.2020.02.051
Kumar, V., Sinha, D., Das, A.K., Pandey, S.C., and Goswami, R.T., An integrated rule-based intrusion detection system: analysis on UNSW-NB15 data set and the real-time online dataset, Cluster Comput., 2020, vol. 23, no. 2, pp. 1397–1418. https://doi.org/10.1007/s10586-019-03008-x
Kim, A., Park, M., and Lee, D.H., AI-IDS: Application of deep learning to real-time Web intrusion detection, IEEE Access, 2020, vol. 8, pp. 70245–70261. https://doi.org/10.1109/ACCESS.2020.2986882
Wang, H., Cao, Z., and Hong, B., A network intrusion detection system based on convolutional neural network, J. Intell. Fuzzy Syst., 2020, vol. 38, no. 6, pp. 7623–7637. https://doi.org/10.3233/JIFS-179833
Alghamdi, R. and Bellaiche, M., A deep intrusion detection system in lambda architecture based on edge cloud computing for IoT, 4th Int. Conf. on Artificial Intelligence and Big Data (ICAIBD), Chengdu, 2021, IEEE, 2021, pp. 561–566. https://doi.org/10.1109/ICAIBD51990.2021.9458974
Duo, R., Nie, X., Yang, N., Yue, Ch., and Wang, Yo., Anomaly detection and attack classification for train real-time ethernet, IEEE Access, 2021, vol. 9, pp. 22528–22541. https://doi.org/10.1109/ACCESS.2021.3055209
Al, S., and Dener, M., STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment, Comput. Secur., 2021, vol. 110, p. 102435. https://doi.org/10.1016/j.cose.2021.102435
Thirimanne, Sh.P., Jayawardana, L., Yasakethu, L., Liyanaarachchi, P., and Hewage, Ch., Deep neural network based real-time intrusion detection system, SN Comput. Sci., 2022, vol. 3, no. 2, p. 145. https://doi.org/10.1007/s42979-022-01031-1
Aswanandini, R. and Deepa, C., Dimensionality reduction of the attributes using fuzzy optimized independent component analysis for a big data intrusion detection system, Sci. Tech. J. Inf. Technol., Mech. Opt., 2022, vol. 22, no. 1, pp. 93–100. https://doi.org/10.17586/2226-1494-2022-22-1-93-100
Aswanandini. R. and Muthumani. N., Multi-objective hyper-heuristic improved particle swarm optimization based configuration of support vector machines for big data cyber security, Int. J. Innovative Technol. Explor. Eng., 2019, vol. 8, no. 12, pp. 3892–3897.
Aswanandini. R. and Deepa. C., Hyper-heuristic firefly algorithm based convolutional neural networks for big data cyber security, Indian J. Sci. Technol., 2021, vol. 14, no. 38, pp. 2934–2945. https://doi.org/10.17485/IJST/v14i38.1401
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
About this article
Cite this article
Aswanandini, R., Deepa, C. Comparison of Advanced Classification Algorithms Based Intrusion Detection from Real-Time Dataset. Aut. Control Comp. Sci. 57, 287–295 (2023). https://doi.org/10.3103/S0146411623030021
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411623030021