Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning

The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security. With the increase in connectivity among devices and networks, maintaining the information security of an asset has now become essential for an organization. Intrusion detection systems (IDS) are widely used in networks for protection against different network attacks. Several machine-learning-based techniques have been used among researchers for the implementation of anomaly-based IDS (AIDS). In the past, the focus primarily remained on the improvement of the accuracy of the system. Efficiency with respect to time is an important aspect of an IDS, which most of the research has thus far somewhat overlooked. For this purpose, we propose a multi-layered filtration framework (MLFF) for feature reduction using a statistical approach. The proposed framework helps reduce the detection time without affecting the accuracy. We use the CIC-IDS2017 dataset for experiments. The proposed framework contains three filters and is connected in sequential order. The accuracy, precision, recall and F1 score are calculated against the selected machine learning models. In addition, the training time and the detection time are also calculated because these parameters are considered important in measuring the performance of a detection system. Generally, decision tree models, random forest methods, and artificial neural networks show better results in the detection of network attacks with minimum detection time.

[1]  Mohannad A. Alswailim,et al.  ESCALB: An effective slave controller allocation-based load balancing scheme for multi-domain SDN-enabled-IoT networks , 2023, J. King Saud Univ. Comput. Inf. Sci..

[2]  Doaa N. Mhawi,et al.  Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems , 2022, Symmetry.

[3]  Serkan Balli,et al.  A novel method for intrusion detection in computer networks by identifying multivariate outliers and ReliefF feature selection , 2022, Neural Computing and Applications.

[4]  C. Coello,et al.  Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing , 2022, Knowl. Based Syst..

[5]  Junwei Liang,et al.  A robust occlusion-adaptive attention-based deep network for facial landmark detection , 2022, Applied Intelligence.

[6]  D. Shi,et al.  Attentive occlusion-adaptive deep network for facial landmark detection , 2021, Pattern Recognit..

[7]  Richa Singh,et al.  Novel Framework for Anomaly Detection Using Machine Learning Technique on CIC-IDS2017 Dataset , 2021, 2021 International Conference on Technological Advancements and Innovations (ICTAI).

[8]  Bogdan Ghita,et al.  Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning , 2021, Secur. Commun. Networks.

[9]  Yuchong Li,et al.  A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments , 2021, Energy Reports.

[10]  Ahmet Rizaner,et al.  A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems , 2021, Neural Computing and Applications.

[11]  Robiah Yusof,et al.  Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset , 2021, IEEE Access.

[12]  Deepak Kshirsagar,et al.  A feature reduction based reflected and exploited DDoS attacks detection system , 2021, J. Ambient Intell. Humaniz. Comput..

[13]  Jagath Samarabandu,et al.  Deep learning methods in network intrusion detection: A survey and an objective comparison , 2020, J. Netw. Comput. Appl..

[14]  Jehad Ali,et al.  A Machine Learning Framework for Prevention of Software-Defined Networking controller from DDoS Attacks and dimensionality reduction of big data , 2020, 2020 International Conference on Information and Communication Technology Convergence (ICTC).

[15]  Kaushik Roy,et al.  Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems , 2020, Future Internet.

[16]  Christian Keysers,et al.  Using Bayes factor hypothesis testing in neuroscience to establish evidence of absence , 2020, Nature Neuroscience.

[17]  Abdul Majid,et al.  Attack Detection From Network Traffic using Machine Learning , 2020 .

[18]  Noora Shrestha Detecting Multicollinearity in Regression Analysis , 2020, American Journal of Applied Mathematics and Statistics.

[19]  Arun Kumar Sangaiah,et al.  A real-time and ubiquitous network attack detection based on deep belief network and support vector machine , 2020, IEEE/CAA Journal of Automatica Sinica.

[20]  P. Karthikeyan,et al.  Hybrid optimization scheme for intrusion detection using considerable feature selection , 2019, Neural Computing and Applications.

[21]  Bayu Adhi Tama,et al.  TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System , 2019, IEEE Access.

[22]  Iqbal Gondal,et al.  Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.

[23]  Guang Cheng,et al.  An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier , 2019, ArXiv.

[24]  Muhammad Hanif Durad,et al.  Intrusion detection using deep sparse auto-encoder and self-taught learning , 2019, Neural Computing and Applications.

[25]  Miad Faezipour,et al.  Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.

[26]  Parman Sukarno,et al.  Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset , 2019, Journal of Physics: Conference Series.

[27]  Ken Kobayashi,et al.  Mixed integer quadratic optimization formulations for eliminating multicollinearity based on variance inflation factor , 2018, Journal of Global Optimization.

[28]  Ali A. Ghorbani,et al.  An Evaluation Framework for Intrusion Detection Dataset , 2016, 2016 International Conference on Information Science and Security (ICISS).

[29]  Dong Hyun Jeong,et al.  A multi-level intrusion detection method for abnormal network behaviors , 2016, J. Netw. Comput. Appl..

[30]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[31]  Jiankun Hu,et al.  A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.

[32]  G. Padmavathi,et al.  A Survey on Various Cyber Attacks and their Classification , 2013, Int. J. Netw. Secur..

[33]  Aiko Pras,et al.  A Labeled Data Set for Flow-Based Intrusion Detection , 2009, IPOM.

[34]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[35]  Lawrie Brown,et al.  Computer Security: Principles and Practice , 2007 .

[36]  S. Lewis,et al.  Regression analysis , 2007, Practical Neurology.

[37]  John McHugh,et al.  Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.

[38]  J. H. Zar,et al.  Significance Testing of the Spearman Rank Correlation Coefficient , 1972 .

[39]  Punam Bedi,et al.  CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems , 2022, Comput. Secur..

[40]  Arnaud Rosay,et al.  Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017 , 2022, ICISSP.

[41]  Ahamed Aljuhani,et al.  Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments , 2021, IEEE Access.

[42]  Mohammad Mozumdar,et al.  A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks Using Convolutional Neural Network , 2021, IEEE Open Journal of the Computer Society.

[43]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[44]  S. Latha,et al.  A survey on network attacks and Intrusion detection systems , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).

[45]  Solane Duque,et al.  Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS) , 2015, Complex Adaptive Systems.