Skip to main content

Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 905))

Included in the following conference series:

Abstract

In a fast-growing digital era, the increase in devices connected to internet have raised many security issues. For providing security, varieties of the system are available in the IT sector, Intrusion Detection system is one of such system. The design of an efficient intrusion detection system is an open problem to the research community. In this paper, various machine learning algorithms have been used for detecting different types of Denial-of-Service attack. The performance of the models have been measured on the basis of binary and multi-classification. Furthermore, parameter tuning algorithm has been discussed. On the basis of performance parameters, XGBoost performs efficiently and in robust manner to find an intrusion. The proposed method i.e. XGBoost has been compared with other classifiers like AdaBoost, Naïve Bayes, Multi-layer perceptron (MLP) and K-Nearest Neighbour (KNN) on recently captured network traffic by Canadian Institute of Cybersecurity (CIC). In this research, average class error and overall error have been calculated for the multi-classification problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). NIST special publication 800.2007, p. 94 (2007)

    Google Scholar 

  2. Sommer, R.: Viable Network Intrusion Detection: Trade-Offs in High-Performance Environments. VDM Verlag, Saarbrücken (2008)

    Google Scholar 

  3. Sharafaldin, I., Gharib, A., Habibi Lashkari, A., Ghorbani, A.A.: Towards a reliable intrusion detection benchmark dataset. Softw. Netw. 2018(1), 177–200 (2018)

    Google Scholar 

  4. Shiravi, A., et al.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)

    Article  Google Scholar 

  5. CICFlowMeter: Canadian Institute for Cybersecurity (CIC) (2017)

    Google Scholar 

  6. Dieci, L., Friedman, M.J.: Continuation of invariant subspaces. Numer. Linear Algeb. Appl. 8(5), 317–327 (2001)

    Article  MathSciNet  Google Scholar 

  7. Hu, W., Hu, W., Maybank, S.: Adaboost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 38(2), 577–583 (2008)

    Google Scholar 

  8. Panda, M., Patra, M.R.: Network intrusion detection using naive Bayes. Int. J. Comput. Sci. Netw. Secur. 7(12), 258–263 (2007)

    Google Scholar 

  9. Tsai, C.-F., et al.: Intrusion detection by machine learning: a review. Exp. Syst. Appl. 36(10), 11994–12000 (2009)

    Article  Google Scholar 

  10. Li, W., et al.: A new intrusion detection system based on KNN classification algorithm in a wireless sensor network. J. Electr. Comput. Eng. (2014)

    Google Scholar 

  11. Frank, E., Hall, M.A., Witten, I.H.: The WEKA Workbench. Online Appendix for “Data Mining: Practical Machine Learning Tools and Techniques”, 4th edn. Morgan Kaufmann (2016)

    Google Scholar 

  12. RStudio Team: RStudio: integrated development for R. RStudio, Inc., Boston (2015). http://www.rstudio.Com

  13. Vezhnevets, A., Barinova, O.: Avoiding boosting overfitting by removing confusing samples. In: Kok, Joost N., Koronacki, J., Mantaras, RLd, Matwin, S., Mladenič, D., Skowron, A. (eds.) ECML 2007. LNCS (LNAI), vol. 4701, pp. 430–441. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74958-5_40

    Chapter  Google Scholar 

  14. Polikar, R.: Ensemble based systems in decision making. IEEE Circ. Syst. Mag. 6(3), 21–45 (2006)

    Article  Google Scholar 

  15. Chen, Y.-S., Chen, Y.-M.: Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection. In: Proceedings of the ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics. ACM (2009)

    Google Scholar 

  16. Schapire, R.E.: The strength of weak learnability. Mach. Learn. 5(2), 197–227 (1990)

    Google Scholar 

  17. Boro, D., Nongpoh, B., Bhattacharyya, D.K.: Anomaly based intrusion detection using meta-ensemble classifier. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 450–455. ACM (2012)

    Google Scholar 

  18. Soroush, E., Abadeh, M.S., Habibi, J.: A boosting ant-colony optimization algorithm for computer intrusion detection. In: Proceedings of the 2006 International Symposium on Frontiers in Networking with Applications (FINA 2006) (2006)

    Google Scholar 

  19. Mukkamala, S., Janoski, G., Sung, A.H.: Intrusion detection using neural networks and support vector machines. In: Proceedings of IEEE International Joint Conference on Neural Networks, pp. 1702–1707 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashu Bansal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bansal, A., Kaur, S. (2018). Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, vol 905. Springer, Singapore. https://doi.org/10.1007/978-981-13-1810-8_37

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1810-8_37

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1809-2

  • Online ISBN: 978-981-13-1810-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics