Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Network Intrusion Detection Based on Data Feature Dynamic Ensemble Model

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1253))

Included in the following conference series:

Abstract

Aiming at the problem that the current network intrusion behavior is poorly detected and the low data utilization rate in the big data environment, two-layer ensemble model based on the stacking framework is proposed to detect the network intrusion data. First, the PCA algorithm is used in the model to reduce the dimensionality of the data, before constructing a two-layer ensemble model. A variety of existing ensemble classifiers are used in the first layer of the model as the base classifier and the simple classifier are used in the second layer to train the classification results of the first layer. Thereby the final prediction result of the model is obtained. According to the characteristics of network intrusion big data, the base classifier can be selected autonomously and the number of classifiers can be optimized spontaneously, and the scale of the classifier can be adjusted to obtain most optimized classier. The experiment result shows: (1) Dynamic selection by data feature, the optimal ensemble base classifier in the model can be determined. (2) According to the data characteristics, the number of ensemble-based classifiers is determined, which can improve the performance of the classifier under the premise of ensuring classification accuracy, and reduce the redundancy caused by the integration of unnecessary base classifiers. (3) This model can stably improve the accuracy of intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mokhtar, B., Eltoweissy, M.: Big data and semantics management system for computer networks. Ad Hoc Netw. 57, 32–51 (2017)

    Google Scholar 

  2. Centonze, P.: Security and privacy frameworks for access control big data systems. Comput. Mater. Continua 59(2), 361–374 (2019)

    Article  Google Scholar 

  3. Cheng, J., Ruomeng, X., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for ddos attacks detection in big data environment. Comput. Mater. Continua 55(1), 095–119 (2018)

    Google Scholar 

  4. Xiaonian, W., Zhang, C., Zhang, R., Wang, Y., Cui, J.: A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data. Comput. Mater. Continua 56(1), 61–72 (2018)

    Google Scholar 

  5. Broeders, D., Schrijvers, E., van der Sloot, B. et al.: Big data and security policies: towards a framework for regulating the phases of analytics and use of big data. Comput. Law Secur. Rev. 33(3), 309–323 (2017)

    Google Scholar 

  6. Saraladevi, B., Pazhaniraja, N., Victer Paul, P. et al.: Big data and hadoop-a study in security perspective. Procedia computer science 50, 596–601 (2015)

    Google Scholar 

  7. Wang, H., Jiang, X., Kambourakis, G.: Special issue on Security, Privacy and Trust in network based big data. Inf. Sci. 38, 48–50 (2015)

    Article  MathSciNet  Google Scholar 

  8. Sanchez, M.I., Zeydan, E., Oliva, A. et al.: Mobility management: deployment and adaptability aspects through mobile data traffic analysis. Comput. Commun. 95, 3–14 (2016)

    Google Scholar 

  9. Liu, G., Yan, Z., Pedrycz, W.: Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: a survey. J. Netw. Comput. Appl. 105, 105–122 (2018)

    Article  Google Scholar 

  10. Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power system. IEEE Trans. Smart Grid 6(6), 3104–3113 (2015)

    Google Scholar 

  11. Liu, J., Gu, L.Z., Niu, X.X. et al.: Research on network anomaly detection based on one-class SVM and active learning. J. Commun. 36(11), 136–146 (2012)

    Google Scholar 

  12. Qian, Y.K., Chen, M., Ye, L.X.: Network-wide anomaly detection method based on multiscale principal component analysis. J. Softw. 23(2), 361–377 (2012)

    Google Scholar 

  13. Zheng, L.M.: Key Technologies Research on Traffic Anomaly Detection and Optimization for Large-Scale Networks. National University of Defense Technology, Changsha (2012)

    Google Scholar 

  14. Li. Y.C., Luo, X.G., Qian, Y.K. et al.: Network-wide anomaly detection method based on robust multivariate probabilistic calibration model. J. Commun. 36(11), 201–212 (2015)

    Google Scholar 

  15. Wang, J., Yang, L., Yang, W.: Malicious network traffic detection based on ensemble classifier. J. Commun. 39(10), 155–165 (2018)

    Google Scholar 

  16. Qin, T., Wang, B., Chen, R. et al.: IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things. Sensors 19(4), 958 (2019)

    Google Scholar 

  17. Hadri, A., Chougdali, K., Touahni, R.: Intrusion detection system using PCA and Fuzzy PCA techniques. In: 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE (2016)

    Google Scholar 

  18. Pavlyshenko, B.: IEEE 2018 IEEE second international conference on data stream mining & processing (DSMP) - Lviv, Ukraine (2018.8.21-2018.8.25). In: 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP) - Using Stacking Approaches for Machine Learning Models, pp. 255–258 (2018)

    Google Scholar 

  19. Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123–140 (1996)

    MATH  Google Scholar 

  20. Mengmeng, Z., Yian, L.: Signal sorting using teaching-learning-based optimization and random forest. In: 2018 17th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES). IEEE Computer Society (2018)

    Google Scholar 

  21. Li, Y., Chen, Z., Xie, G.: A differential privacy protection algorithm based on ExtraTrees. Comput. Eng. 1–8. http://kns.cnki.net/kcms/detail/31.1289.TP.20190307.1402.008.html. [2019-10-24]

  22. Freund, Y., Schapire, R.E.: Experiments with a new boosting algorithm. ICML 96, 148–156 (1996)

    Google Scholar 

  23. Wang, W., Niu, H.: Face detection based on improved AdaBoost algorithm in E-Learning. In: IEEE International Conference on Cloud Computing & Intelligent Systems. IEEE (2013)

    Google Scholar 

  24. Zhu, X., Yan, Y., Liu, Y. et al.: Flame detection based on GBDT feature for building. In: International Smart Cities Conference (2017)

    Google Scholar 

  25. Li, Z., Liu, Z., Ding, G., Li, W., Wang, M.: Feature selection algorithm based on XGBoost. J. Commun. 1–8. http://kns.cnki.net/kcms/detail/11.2102.TN.20190830.1710.002.html. [2019-10-24]

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manfang Dou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Feng, T., Dou, M., Xie, P., Fang, J. (2020). Network Intrusion Detection Based on Data Feature Dynamic Ensemble Model. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Communications in Computer and Information Science, vol 1253. Springer, Singapore. https://doi.org/10.1007/978-981-15-8086-4_62

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8086-4_62

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8085-7

  • Online ISBN: 978-981-15-8086-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics