Advertisement

Enhancing Network Intrusion Detection System Method (NIDS) Using Mutual Information (RF-CIFE)

  • Nyiribakwe DominiqueEmail author
  • Zhuo MaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 895)

Abstract

Most modern real word activities use an Internet where network traffic is exponentially increased. The attackers try different techniques and attempts for compromising and make unauthorized access to the network traffic of various network aspects. Intrusion detection systems (IDSs) used to detect both known and unknown/new attacks within the network system. Now a days researchers, security experts have implemented many different algorithms and mechanisms in order to enhance security measures. In this paper, we applied Random forest (RF) combined with conditional infomax feature extraction (CIFE) named as (RF-CIFE) for improving an Intrusion detection system model. In the experiment, four classifiers used are Support Vector Machine (SVM), C5.0, Multilayer Perceptron Neural Network (MLP) and Random Forest Algorithm. The conduction performance results using KDD Cup99 dataset prove that the combination of RF-CIFE with each classifier outperforms better in term of accuracy, detection rate, precision, false alarm rate and error rate.

Keywords

Network Intrusion Detection Systems (NIDS) Conditional Infomax Feature Extraction (CIFE) Mutual information theory Support Vector Machine (SVM) C5.0 Multilayer Perceptron Neural Network (MLP) Random Forest Algorithm 

References

  1. 1.
    Wankhade, A., Chandrasekaran, K.: Distributed-intrusion detection system using combination of ant colony optimization (ACO) and support vector machine (SVM). In: 2016 International Conference on Micro-Electronics Telecommunication Engineering, pp. 646–651 (2016)Google Scholar
  2. 2.
    Pandya, R., Pandya, J.: C5.0 algorithm to improved decision tree with feature selection and reduced error pruning. Int. J. Comput. Appl. 117, 18–21 (2015)Google Scholar
  3. 3.
    Ali, M.H., AL Mohammed, B.A.D., Ismail, M.A.B., Zolkipli, M.F.: A new intrusion detection system based on Fast Learning Network and Particle swarm optimization. IEEE Access 6, 20255–20261 (2018)CrossRefGoogle Scholar
  4. 4.
    Karatas, G.: Neural network based intrusion detection systems with different training functions, pp. 1–6 (2018)Google Scholar
  5. 5.
    Yuan, Y., Hogrefe, D.: Two layers multi-class detection method for network intrusion detection system. In: IEEE Symposium on Computers and Communications (ISCC), p. 7 (2017)Google Scholar
  6. 6.
    Tao, P., Sun, Z., Sun, Z.: An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6, 13624–13631 (2018)CrossRefGoogle Scholar
  7. 7.
    Teng, S., Wu, N., Zhu, H., Teng, L., Zhang, W.: SVM-DT-based adaptive and collaborative intrusion detection. IEEE/CAA J. Autom. Sin. 5(1), 108–118 (2018)CrossRefGoogle Scholar
  8. 8.
  9. 9.
    Nie, S., Gao, T., Ji, Q.: An information theoretic feature selection framework based on integer programming. In: Proceedings of International Conference on Pattern Recognition, pp. 3573–3578 (2017)Google Scholar
  10. 10.
    Torkkola, K.: Feature extraction by non-parametric mutual information maximization. J. Mach. Learn. Res. 3, 1415–1438 (2003)MathSciNetzbMATHGoogle Scholar
  11. 11.
    Aung, Y.Y.: An analysis of random forest algorithm based network intrusion detection system, pp. 127–132 (2017)Google Scholar
  12. 12.
    CS229 Lecture notes: Support Vector Machines by Andrew NgGoogle Scholar
  13. 13.
    Etemad, K., Chellappa, R.: Discriminant analysis for recognition of human face images. J. Opt. Soc. Am. 14(8), 1724–1733 (1997)CrossRefGoogle Scholar
  14. 14.
    Lin, D., Tang, X.: Conditional infomax learning: an integrated framework for feature extraction and fusion. In: Computer Vision - ECCV 2006. LNCS, vol. 3951, pp. 68–82. Springer, Heidelberg (2006)Google Scholar
  15. 15.
    Paul, J., Verleysen, M., Dupont, P.: Identification of statistically significant features from random forests. In: ECML Workshop Solving Complex Machine Learning Problems with Ensemble Methods (2013)Google Scholar
  16. 16.
    Zhuo, X., Zhang, J., Woo, S.: Network intrusion detection using word embeddings (2017)Google Scholar
  17. 17.
    Ren, Q., Cheng, H., Han, H.: Research on machine learning framework based on random forest algorithm, vol. 1820, p. 080020 (2017)Google Scholar
  18. 18.
    Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)CrossRefGoogle Scholar
  19. 19.
  20. 20.
    Xu, B., Chen, S., Zhang, H.: Incremental k-NN SCM method in intrusion detection (2017)Google Scholar
  21. 21.
    Cover, T.M., Thomas, J.A. (eds.): Elements of Information Theory II, 2nd edn, pp. 38–48. Wiley, New York (2006)Google Scholar
  22. 22.
    Samrin, R., Vasumathi, D.: Review on anomaly based network intrusion detection system. In: 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp. 141–147 (2017)Google Scholar
  23. 23.
  24. 24.
    Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., Zhu, M.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6(c), 1792–1806 (2017)Google Scholar
  25. 25.
    Farahnakian, F., Heikkonen, J.: A deep auto-encoder based approach for intrusion detection system. In: International Conference on Advanced Communication Technology, ICACT 2018, pp. 178–183, February 2018Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and TechnologyXidian UniversityXi’anChina
  2. 2.Department of Cyber EngineeringXidian UniversityXi’anChina

Personalised recommendations