Skip to main content

2018 | OriginalPaper | Buchkapitel

Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems

verfasst von : Ashu Bansal, Sanmeet Kaur

Erschienen in: Advances in Computing and Data Sciences

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In a fast-growing digital era, the increase in devices connected to internet have raised many security issues. For providing security, varieties of the system are available in the IT sector, Intrusion Detection system is one of such system. The design of an efficient intrusion detection system is an open problem to the research community. In this paper, various machine learning algorithms have been used for detecting different types of Denial-of-Service attack. The performance of the models have been measured on the basis of binary and multi-classification. Furthermore, parameter tuning algorithm has been discussed. On the basis of performance parameters, XGBoost performs efficiently and in robust manner to find an intrusion. The proposed method i.e. XGBoost has been compared with other classifiers like AdaBoost, Naïve Bayes, Multi-layer perceptron (MLP) and K-Nearest Neighbour (KNN) on recently captured network traffic by Canadian Institute of Cybersecurity (CIC). In this research, average class error and overall error have been calculated for the multi-classification problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). NIST special publication 800.2007, p. 94 (2007) Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). NIST special publication 800.2007, p. 94 (2007)
2.
Zurück zum Zitat Sommer, R.: Viable Network Intrusion Detection: Trade-Offs in High-Performance Environments. VDM Verlag, Saarbrücken (2008) Sommer, R.: Viable Network Intrusion Detection: Trade-Offs in High-Performance Environments. VDM Verlag, Saarbrücken (2008)
3.
Zurück zum Zitat Sharafaldin, I., Gharib, A., Habibi Lashkari, A., Ghorbani, A.A.: Towards a reliable intrusion detection benchmark dataset. Softw. Netw. 2018(1), 177–200 (2018) Sharafaldin, I., Gharib, A., Habibi Lashkari, A., Ghorbani, A.A.: Towards a reliable intrusion detection benchmark dataset. Softw. Netw. 2018(1), 177–200 (2018)
4.
Zurück zum Zitat Shiravi, A., et al.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)CrossRef Shiravi, A., et al.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)CrossRef
5.
Zurück zum Zitat CICFlowMeter: Canadian Institute for Cybersecurity (CIC) (2017) CICFlowMeter: Canadian Institute for Cybersecurity (CIC) (2017)
6.
Zurück zum Zitat Dieci, L., Friedman, M.J.: Continuation of invariant subspaces. Numer. Linear Algeb. Appl. 8(5), 317–327 (2001)MathSciNetCrossRef Dieci, L., Friedman, M.J.: Continuation of invariant subspaces. Numer. Linear Algeb. Appl. 8(5), 317–327 (2001)MathSciNetCrossRef
7.
Zurück zum Zitat Hu, W., Hu, W., Maybank, S.: Adaboost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 38(2), 577–583 (2008) Hu, W., Hu, W., Maybank, S.: Adaboost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 38(2), 577–583 (2008)
8.
Zurück zum Zitat Panda, M., Patra, M.R.: Network intrusion detection using naive Bayes. Int. J. Comput. Sci. Netw. Secur. 7(12), 258–263 (2007) Panda, M., Patra, M.R.: Network intrusion detection using naive Bayes. Int. J. Comput. Sci. Netw. Secur. 7(12), 258–263 (2007)
9.
Zurück zum Zitat Tsai, C.-F., et al.: Intrusion detection by machine learning: a review. Exp. Syst. Appl. 36(10), 11994–12000 (2009)CrossRef Tsai, C.-F., et al.: Intrusion detection by machine learning: a review. Exp. Syst. Appl. 36(10), 11994–12000 (2009)CrossRef
10.
Zurück zum Zitat Li, W., et al.: A new intrusion detection system based on KNN classification algorithm in a wireless sensor network. J. Electr. Comput. Eng. (2014) Li, W., et al.: A new intrusion detection system based on KNN classification algorithm in a wireless sensor network. J. Electr. Comput. Eng. (2014)
11.
Zurück zum Zitat Frank, E., Hall, M.A., Witten, I.H.: The WEKA Workbench. Online Appendix for “Data Mining: Practical Machine Learning Tools and Techniques”, 4th edn. Morgan Kaufmann (2016) Frank, E., Hall, M.A., Witten, I.H.: The WEKA Workbench. Online Appendix for “Data Mining: Practical Machine Learning Tools and Techniques”, 4th edn. Morgan Kaufmann (2016)
14.
Zurück zum Zitat Polikar, R.: Ensemble based systems in decision making. IEEE Circ. Syst. Mag. 6(3), 21–45 (2006)CrossRef Polikar, R.: Ensemble based systems in decision making. IEEE Circ. Syst. Mag. 6(3), 21–45 (2006)CrossRef
15.
Zurück zum Zitat Chen, Y.-S., Chen, Y.-M.: Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection. In: Proceedings of the ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics. ACM (2009) Chen, Y.-S., Chen, Y.-M.: Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection. In: Proceedings of the ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics. ACM (2009)
16.
Zurück zum Zitat Schapire, R.E.: The strength of weak learnability. Mach. Learn. 5(2), 197–227 (1990) Schapire, R.E.: The strength of weak learnability. Mach. Learn. 5(2), 197–227 (1990)
17.
Zurück zum Zitat Boro, D., Nongpoh, B., Bhattacharyya, D.K.: Anomaly based intrusion detection using meta-ensemble classifier. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 450–455. ACM (2012) Boro, D., Nongpoh, B., Bhattacharyya, D.K.: Anomaly based intrusion detection using meta-ensemble classifier. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 450–455. ACM (2012)
18.
Zurück zum Zitat Soroush, E., Abadeh, M.S., Habibi, J.: A boosting ant-colony optimization algorithm for computer intrusion detection. In: Proceedings of the 2006 International Symposium on Frontiers in Networking with Applications (FINA 2006) (2006) Soroush, E., Abadeh, M.S., Habibi, J.: A boosting ant-colony optimization algorithm for computer intrusion detection. In: Proceedings of the 2006 International Symposium on Frontiers in Networking with Applications (FINA 2006) (2006)
19.
Zurück zum Zitat Mukkamala, S., Janoski, G., Sung, A.H.: Intrusion detection using neural networks and support vector machines. In: Proceedings of IEEE International Joint Conference on Neural Networks, pp. 1702–1707 (2002) Mukkamala, S., Janoski, G., Sung, A.H.: Intrusion detection using neural networks and support vector machines. In: Proceedings of IEEE International Joint Conference on Neural Networks, pp. 1702–1707 (2002)
Metadaten
Titel
Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems
verfasst von
Ashu Bansal
Sanmeet Kaur
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-1810-8_37

Premium Partner