Skip to main content
Log in

Comparison of Advanced Classification Algorithms Based Intrusion Detection from Real-Time Dataset

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Advanced machine learning (ML) and deep learning (DL) methods have provided efficient intrusion detection with minimum probability of false positives. Most existing IDS models have been evaluated over out-dated benchmark cyber security IDS datasets such as KDDCUP 1999 or NSL-KDD since the collection and extraction of attack features from the real-time network traffic data is a complicated process. This paper aims at generating a real-time dataset for IDS evaluation and testing. The real-time data were obtained by analyzing the real traffic analysis in a computer network with an Internet connection to extract the attack and normal traffic features which were referenced from popular datasets such as KDDCUP 1999 and NSL-KDD. In this study, the real-time data is collected with two attack classes (denial-of-service (DoS) and shellcode) and normal class data for evaluation. Advanced classification approaches of hyper-heuristic support vector machines (HH-SVM), hyper-heuristic improved particle swarm optimization based support vector machines (HHIPSO-SVM), and hyper-heuristic firefly algorithm based convolutional neural networks (HHFA-CNN) along with fuzzy optimized independent component analysis (FOICA) dimensionality reduction technique are evaluated using this dataset. Experimental results showed the effectiveness of the advanced classification methods with and without dimensionality reduction technique with the HHFA-CNN with FOICA achieving high accuracy and reduced time complexity for the real-time dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.

REFERENCES

  1. Liao, H.-J., Lin, Ch.-H.R., Lin, Yi.-Ch., and Tung, K.-Y/u., Intrusion detection system: A comprehensive review, J. Network Comput. Appl., 2013, vol. 36, no. 1, pp. 16–24. https://doi.org/10.1016/j.jnca.2012.09.004

    Article  Google Scholar 

  2. Singh, R., Kumar, H., Singla, R.K., and Ketti, R.R., Internet attacks and intrusion detection system: A review of the literature, Online Inf. Rev., 2017, vol. 41, no. 2, pp. 171–184. https://doi.org/10.1108/OIR-12-2015-0394

    Article  Google Scholar 

  3. Saranya, T., Sridevi, S., Deisy, C., Chung, T.D., and Ahamed Khan, M.K.A., Performance analysis of machine learning algorithms in intrusion detection system: A review, Procedia Comput. Sci., 2020, vol. 171, pp. 1251–1260. https://doi.org/10.1016/j.procs.2020.04.133

    Article  Google Scholar 

  4. Yang, Q., Fu, H., and Zhu, T., An optimization method for parameters of SVM in network intrusion detection system, 2016 Int. Conf. on Distributed Computing in Sensor Systems (DCOSS), Washington, 2016, IEEE, 2016, pp. 136–142. https://doi.org/10.1109/DCOSS.2016.48

  5. Liu, Ch., Yang, J., and Wu, J., Web intrusion detection system combined with feature analysis and SVM optimization, EURASIP J. Wireless Commun. Networking, 2020, vol. 2020, p. 33. https://doi.org/10.1186/s13638-019-1591-1

    Article  Google Scholar 

  6. Liu, H., and Lang, B., Machine learning and deep learning methods for intrusion detection systems: A survey, Appl. Sci., 2019, vol. 9, no. 20, p. 4396. https://doi.org/10.3390/app9204396

    Article  Google Scholar 

  7. Ahmad, Z., Shahid Khan, A., Wai Shiang, Ch., Abdullah, J., and Ahmad, F., Network intrusion detection system: A systematic study of machine learning and deep learning approaches, Trans. Emerging Telecommun. Technol., 2021, vol. 32, no. 1, p. e4150. https://doi.org/10.1002/ett.4150

    Article  Google Scholar 

  8. Chen, L., Kuang, X., Xu, A., Suo, S., and Yang, Yi., A Novel network intrusion detection system based on CNN, Eighth Int. Conf. on Advanced Cloud and Big Data (CBD), Taiyuan, China, 2020, IEEE, 2020, pp. 243–247. https://doi.org/10.1109/CBD51900.2020.00051

  9. Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., and Abuzneid, A., Features dimensionality reduction approaches for machine learning-based network intrusion detection, Electronics, 2019, vol. 8, no. 3, p. 322. https://doi.org/10.3390/electronics8030322

    Article  Google Scholar 

  10. Thakkar, A. and Lohiya, R., A review of the advancement in intrusion detection datasets, Procedia Comput. Sci., 2020, vol. 167, pp. 636–645. https://doi.org/10.1016/j.procs.2020.03.330

    Article  Google Scholar 

  11. Sabar, N.R., Yi, X., and Song, A., A bi-objective hyper-heuristic support vector machine for big data cyber-security, IEEE Access, 2018, vol. 6, pp. 10421–10431. https://doi.org/10.1109/ACCESS.2018.2801792

    Article  Google Scholar 

  12. Phan, T.V. and Park, M., Efficient distributed denial-of-service attack defence in SDN-based cloud, IEEE Access, 2019, vol. 7, pp. 18701–18714. https://doi.org/10.1109/ACCESS.2019.2896783

    Article  Google Scholar 

  13. Al-Hadhrami, Ya. and Hussain, F.K., Real-time dataset generation framework for intrusion detection systems in IoT, Future Gener. Comput. Syst., 2020, vol. 108, pp. 414–423. https://doi.org/10.1016/j.future.2020.02.051

    Article  Google Scholar 

  14. Kumar, V., Sinha, D., Das, A.K., Pandey, S.C., and Goswami, R.T., An integrated rule-based intrusion detection system: analysis on UNSW-NB15 data set and the real-time online dataset, Cluster Comput., 2020, vol. 23, no. 2, pp. 1397–1418. https://doi.org/10.1007/s10586-019-03008-x

    Article  Google Scholar 

  15. Kim, A., Park, M., and Lee, D.H., AI-IDS: Application of deep learning to real-time Web intrusion detection, IEEE Access, 2020, vol. 8, pp. 70245–70261. https://doi.org/10.1109/ACCESS.2020.2986882

    Article  Google Scholar 

  16. Wang, H., Cao, Z., and Hong, B., A network intrusion detection system based on convolutional neural network, J. Intell. Fuzzy Syst., 2020, vol. 38, no. 6, pp. 7623–7637. https://doi.org/10.3233/JIFS-179833

    Article  Google Scholar 

  17. Alghamdi, R. and Bellaiche, M., A deep intrusion detection system in lambda architecture based on edge cloud computing for IoT, 4th Int. Conf. on Artificial Intelligence and Big Data (ICAIBD), Chengdu, 2021, IEEE, 2021, pp. 561–566. https://doi.org/10.1109/ICAIBD51990.2021.9458974

  18. Duo, R., Nie, X., Yang, N., Yue, Ch., and Wang, Yo., Anomaly detection and attack classification for train real-time ethernet, IEEE Access, 2021, vol. 9, pp. 22528–22541. https://doi.org/10.1109/ACCESS.2021.3055209

    Article  Google Scholar 

  19. Al, S., and Dener, M., STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment, Comput. Secur., 2021, vol. 110, p. 102435. https://doi.org/10.1016/j.cose.2021.102435

    Article  Google Scholar 

  20. Thirimanne, Sh.P., Jayawardana, L., Yasakethu, L., Liyanaarachchi, P., and Hewage, Ch., Deep neural network based real-time intrusion detection system, SN Comput. Sci., 2022, vol. 3, no. 2, p. 145. https://doi.org/10.1007/s42979-022-01031-1

    Article  Google Scholar 

  21. Aswanandini, R. and Deepa, C., Dimensionality reduction of the attributes using fuzzy optimized independent component analysis for a big data intrusion detection system, Sci. Tech. J. Inf. Technol., Mech. Opt., 2022, vol. 22, no. 1, pp. 93–100. https://doi.org/10.17586/2226-1494-2022-22-1-93-100

    Article  Google Scholar 

  22. Aswanandini. R. and Muthumani. N., Multi-objective hyper-heuristic improved particle swarm optimization based configuration of support vector machines for big data cyber security, Int. J. Innovative Technol. Explor. Eng., 2019, vol. 8, no. 12, pp. 3892–3897.

    Article  Google Scholar 

  23. Aswanandini. R. and Deepa. C., Hyper-heuristic firefly algorithm based convolutional neural networks for big data cyber security, Indian J. Sci. Technol., 2021, vol. 14, no. 38, pp. 2934–2945. https://doi.org/10.17485/IJST/v14i38.1401

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to R. Aswanandini or C. Deepa.

Ethics declarations

The authors declare that they have no conflicts of interest.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aswanandini, R., Deepa, C. Comparison of Advanced Classification Algorithms Based Intrusion Detection from Real-Time Dataset. Aut. Control Comp. Sci. 57, 287–295 (2023). https://doi.org/10.3103/S0146411623030021

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411623030021

Keywords:

Navigation