Skip to main content

Combining Ensemble of Classifiers by Using Genetic Programming for Cyber Security Applications

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9028))

Abstract

Classification is a relevant task in the cyber security domain, but it must be able to cope with unbalanced and/or incomplete datasets and must also react in real-time to changes in the data. Ensemble of classifiers are a useful tool for classification in hard domains as they combine different classifiers that together provide complementary information. However, most of the ensemble-based algorithms require an extensive training phase and need to be re-trained in case of changes in the data.

This work proposes a Genetic Programming-based framework to generate a function for combining an ensemble, having some interesting properties: the models composing the ensemble are trained only on a portion of the training set, and then, they can be combined and used without any extra phase of training; furthermore, in case of changes in the data, the function can be recomputed in an incrementally way, with a moderate computational effort.

Experiments conducted on unbalanced datasets and on a well-known cyber-security dataset assess the goodness of the approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.cs.waikato.ac.nz/ml/weka.

  2. 2.

    http://www.sigkdd.org/kdd-cup-1999-computer-network-intrusion-detection.

References

  1. CERT Australia: Cyber crime and security survey report. Technical report (2012)

    Google Scholar 

  2. Breiman, L.: Bagging predictors. Mach. Learn. 24, 123–140 (1996)

    MATH  MathSciNet  Google Scholar 

  3. Freund, Y., Shapire, R.: Experiments with a new boosting algorithm. In: Machine Learning: Proceedings of the Thirteenth International Conference (ICML 1996), pp. 148–156. Morgan Kaufmann (1996)

    Google Scholar 

  4. Folino, G., Pizzuti, C., Spezzano, G.: A scalable cellular implementation of parallel genetic programming. IEEE Trans. Evol. Comput. 7, 37–53 (2003)

    Article  Google Scholar 

  5. de Oliveira, D.F., Canuto, A.M.P., de Souto, M.C.P.: Use of multi-objective genetic algorithms to investigate the diversity/accuracy dilemma in heterogeneous ensembles. In: International Joint Conference on Neural Networks, pp. 2339–2346. IEEE (2009)

    Google Scholar 

  6. Folino, G., Pizzuti, C., Spezzano, G.: Training distributed GP ensemble with a selective algorithm based on clustering and pruning for pattern classification. IEEE Trans. Evol. Comput. 12, 458–468 (2008)

    Article  Google Scholar 

  7. Stefano, C.D., Folino, G., Fontanella, F., di Freca, A.S.: Using bayesian networks for selecting classifiers in GP ensembles. Inf. Sci. 258, 200–216 (2014)

    Article  Google Scholar 

  8. Sylvester, J., Chawla, N.V.: Evolutionary ensembles: combining learning agents using genetic algorithms. In: AAAI Workshop on Multiagent Learning, pp. 46–51 (2005)

    Google Scholar 

  9. Chawla, N.V., Sylvester, J.: Exploiting diversity in ensembles: improving the performance on unbalanced datasets. In: Haindl, M., Kittler, J., Roli, F. (eds.) MCS 2007. LNCS, vol. 4472, pp. 397–406. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Sylvester, J., Chawla, N.V.: Evolutionary ensemble creation and thinning. In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, pp. 5148–5155. IEEE (2006)

    Google Scholar 

  11. Wang, Y., Gao, Y., Shen, R., Yang, F.: Selective ensemble approach for classification of datasets with incomplete values. In: Wang, Y., Li, T. (eds.) ISKE2011. AISC, vol. 122, pp. 281–286. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Acosta-Mendoza, N., Morales-Reyes, A., Escalante, H.J., Gago-Alonso, A.: Learning to assemble classifiers via genetic programming. IJPRAI 28 (2014)

    Google Scholar 

  13. Brameier, M., Banzhaf, W.: Evolving teams of predictors with linear genetic programming. Genet. Program Evolvable Mach. 2, 381–407 (2001)

    Article  MATH  Google Scholar 

  14. Schapire, R.E.: The strength of weak learnability. Mach. Learn. 5, 197–227 (1990)

    Google Scholar 

  15. Schapire, R.E.: Boosting a weak learning by majority. Inf. Comput. 121, 256–285 (1995)

    Article  MathSciNet  Google Scholar 

  16. Kuncheva, L.: Combining Pattern Classifiers: Methods and Algorithms. Wiley-Interscience, Chichester (2004)

    Book  Google Scholar 

  17. Bahri, E., Harbi, N., Huu, H.N.: Approach based ensemble methods for better and faster intrusion detection. In: Herrero, A., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 17–24. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Acknowledgment

This work has been partially supported by MIUR-PON under project PON03PE_00032_2 within the framework of the Technological District on Cyber Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gianluigi Folino .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Folino, G., Pisani, F.S. (2015). Combining Ensemble of Classifiers by Using Genetic Programming for Cyber Security Applications. In: Mora, A., Squillero, G. (eds) Applications of Evolutionary Computation. EvoApplications 2015. Lecture Notes in Computer Science(), vol 9028. Springer, Cham. https://doi.org/10.1007/978-3-319-16549-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16549-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16548-6

  • Online ISBN: 978-3-319-16549-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics