Abstract
Aiming at the problem that the current network intrusion behavior is poorly detected and the low data utilization rate in the big data environment, two-layer ensemble model based on the stacking framework is proposed to detect the network intrusion data. First, the PCA algorithm is used in the model to reduce the dimensionality of the data, before constructing a two-layer ensemble model. A variety of existing ensemble classifiers are used in the first layer of the model as the base classifier and the simple classifier are used in the second layer to train the classification results of the first layer. Thereby the final prediction result of the model is obtained. According to the characteristics of network intrusion big data, the base classifier can be selected autonomously and the number of classifiers can be optimized spontaneously, and the scale of the classifier can be adjusted to obtain most optimized classier. The experiment result shows: (1) Dynamic selection by data feature, the optimal ensemble base classifier in the model can be determined. (2) According to the data characteristics, the number of ensemble-based classifiers is determined, which can improve the performance of the classifier under the premise of ensuring classification accuracy, and reduce the redundancy caused by the integration of unnecessary base classifiers. (3) This model can stably improve the accuracy of intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mokhtar, B., Eltoweissy, M.: Big data and semantics management system for computer networks. Ad Hoc Netw. 57, 32–51 (2017)
Centonze, P.: Security and privacy frameworks for access control big data systems. Comput. Mater. Continua 59(2), 361–374 (2019)
Cheng, J., Ruomeng, X., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for ddos attacks detection in big data environment. Comput. Mater. Continua 55(1), 095–119 (2018)
Xiaonian, W., Zhang, C., Zhang, R., Wang, Y., Cui, J.: A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data. Comput. Mater. Continua 56(1), 61–72 (2018)
Broeders, D., Schrijvers, E., van der Sloot, B. et al.: Big data and security policies: towards a framework for regulating the phases of analytics and use of big data. Comput. Law Secur. Rev. 33(3), 309–323 (2017)
Saraladevi, B., Pazhaniraja, N., Victer Paul, P. et al.: Big data and hadoop-a study in security perspective. Procedia computer science 50, 596–601 (2015)
Wang, H., Jiang, X., Kambourakis, G.: Special issue on Security, Privacy and Trust in network based big data. Inf. Sci. 38, 48–50 (2015)
Sanchez, M.I., Zeydan, E., Oliva, A. et al.: Mobility management: deployment and adaptability aspects through mobile data traffic analysis. Comput. Commun. 95, 3–14 (2016)
Liu, G., Yan, Z., Pedrycz, W.: Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: a survey. J. Netw. Comput. Appl. 105, 105–122 (2018)
Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power system. IEEE Trans. Smart Grid 6(6), 3104–3113 (2015)
Liu, J., Gu, L.Z., Niu, X.X. et al.: Research on network anomaly detection based on one-class SVM and active learning. J. Commun. 36(11), 136–146 (2012)
Qian, Y.K., Chen, M., Ye, L.X.: Network-wide anomaly detection method based on multiscale principal component analysis. J. Softw. 23(2), 361–377 (2012)
Zheng, L.M.: Key Technologies Research on Traffic Anomaly Detection and Optimization for Large-Scale Networks. National University of Defense Technology, Changsha (2012)
Li. Y.C., Luo, X.G., Qian, Y.K. et al.: Network-wide anomaly detection method based on robust multivariate probabilistic calibration model. J. Commun. 36(11), 201–212 (2015)
Wang, J., Yang, L., Yang, W.: Malicious network traffic detection based on ensemble classifier. J. Commun. 39(10), 155–165 (2018)
Qin, T., Wang, B., Chen, R. et al.: IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things. Sensors 19(4), 958 (2019)
Hadri, A., Chougdali, K., Touahni, R.: Intrusion detection system using PCA and Fuzzy PCA techniques. In: 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE (2016)
Pavlyshenko, B.: IEEE 2018 IEEE second international conference on data stream mining & processing (DSMP) - Lviv, Ukraine (2018.8.21-2018.8.25). In: 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP) - Using Stacking Approaches for Machine Learning Models, pp. 255–258 (2018)
Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123–140 (1996)
Mengmeng, Z., Yian, L.: Signal sorting using teaching-learning-based optimization and random forest. In: 2018 17th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES). IEEE Computer Society (2018)
Li, Y., Chen, Z., Xie, G.: A differential privacy protection algorithm based on ExtraTrees. Comput. Eng. 1–8. http://kns.cnki.net/kcms/detail/31.1289.TP.20190307.1402.008.html. [2019-10-24]
Freund, Y., Schapire, R.E.: Experiments with a new boosting algorithm. ICML 96, 148–156 (1996)
Wang, W., Niu, H.: Face detection based on improved AdaBoost algorithm in E-Learning. In: IEEE International Conference on Cloud Computing & Intelligent Systems. IEEE (2013)
Zhu, X., Yan, Y., Liu, Y. et al.: Flame detection based on GBDT feature for building. In: International Smart Cities Conference (2017)
Li, Z., Liu, Z., Ding, G., Li, W., Wang, M.: Feature selection algorithm based on XGBoost. J. Commun. 1–8. http://kns.cnki.net/kcms/detail/11.2102.TN.20190830.1710.002.html. [2019-10-24]
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Feng, T., Dou, M., Xie, P., Fang, J. (2020). Network Intrusion Detection Based on Data Feature Dynamic Ensemble Model. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Communications in Computer and Information Science, vol 1253. Springer, Singapore. https://doi.org/10.1007/978-981-15-8086-4_62
Download citation
DOI: https://doi.org/10.1007/978-981-15-8086-4_62
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8085-7
Online ISBN: 978-981-15-8086-4
eBook Packages: Computer ScienceComputer Science (R0)