Abstract
In a fast-growing digital era, the increase in devices connected to internet have raised many security issues. For providing security, varieties of the system are available in the IT sector, Intrusion Detection system is one of such system. The design of an efficient intrusion detection system is an open problem to the research community. In this paper, various machine learning algorithms have been used for detecting different types of Denial-of-Service attack. The performance of the models have been measured on the basis of binary and multi-classification. Furthermore, parameter tuning algorithm has been discussed. On the basis of performance parameters, XGBoost performs efficiently and in robust manner to find an intrusion. The proposed method i.e. XGBoost has been compared with other classifiers like AdaBoost, Naïve Bayes, Multi-layer perceptron (MLP) and K-Nearest Neighbour (KNN) on recently captured network traffic by Canadian Institute of Cybersecurity (CIC). In this research, average class error and overall error have been calculated for the multi-classification problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). NIST special publication 800.2007, p. 94 (2007)
Sommer, R.: Viable Network Intrusion Detection: Trade-Offs in High-Performance Environments. VDM Verlag, Saarbrücken (2008)
Sharafaldin, I., Gharib, A., Habibi Lashkari, A., Ghorbani, A.A.: Towards a reliable intrusion detection benchmark dataset. Softw. Netw. 2018(1), 177–200 (2018)
Shiravi, A., et al.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)
CICFlowMeter: Canadian Institute for Cybersecurity (CIC) (2017)
Dieci, L., Friedman, M.J.: Continuation of invariant subspaces. Numer. Linear Algeb. Appl. 8(5), 317–327 (2001)
Hu, W., Hu, W., Maybank, S.: Adaboost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 38(2), 577–583 (2008)
Panda, M., Patra, M.R.: Network intrusion detection using naive Bayes. Int. J. Comput. Sci. Netw. Secur. 7(12), 258–263 (2007)
Tsai, C.-F., et al.: Intrusion detection by machine learning: a review. Exp. Syst. Appl. 36(10), 11994–12000 (2009)
Li, W., et al.: A new intrusion detection system based on KNN classification algorithm in a wireless sensor network. J. Electr. Comput. Eng. (2014)
Frank, E., Hall, M.A., Witten, I.H.: The WEKA Workbench. Online Appendix for “Data Mining: Practical Machine Learning Tools and Techniques”, 4th edn. Morgan Kaufmann (2016)
RStudio Team: RStudio: integrated development for R. RStudio, Inc., Boston (2015). http://www.rstudio.Com
Vezhnevets, A., Barinova, O.: Avoiding boosting overfitting by removing confusing samples. In: Kok, Joost N., Koronacki, J., Mantaras, RLd, Matwin, S., Mladenič, D., Skowron, A. (eds.) ECML 2007. LNCS (LNAI), vol. 4701, pp. 430–441. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74958-5_40
Polikar, R.: Ensemble based systems in decision making. IEEE Circ. Syst. Mag. 6(3), 21–45 (2006)
Chen, Y.-S., Chen, Y.-M.: Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection. In: Proceedings of the ACM SIGKDD Workshop on Cybersecurity and Intelligence Informatics. ACM (2009)
Schapire, R.E.: The strength of weak learnability. Mach. Learn. 5(2), 197–227 (1990)
Boro, D., Nongpoh, B., Bhattacharyya, D.K.: Anomaly based intrusion detection using meta-ensemble classifier. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 450–455. ACM (2012)
Soroush, E., Abadeh, M.S., Habibi, J.: A boosting ant-colony optimization algorithm for computer intrusion detection. In: Proceedings of the 2006 International Symposium on Frontiers in Networking with Applications (FINA 2006) (2006)
Mukkamala, S., Janoski, G., Sung, A.H.: Intrusion detection using neural networks and support vector machines. In: Proceedings of IEEE International Joint Conference on Neural Networks, pp. 1702–1707 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bansal, A., Kaur, S. (2018). Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, vol 905. Springer, Singapore. https://doi.org/10.1007/978-981-13-1810-8_37
Download citation
DOI: https://doi.org/10.1007/978-981-13-1810-8_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1809-2
Online ISBN: 978-981-13-1810-8
eBook Packages: Computer ScienceComputer Science (R0)