A Network Intrusion Detection System Based on Categorical Boosting Technique using NSL-KDD

Massive volumes of network traffic & data are generated by common technology including the Internet of Things, cloud computing & social networking. Intrusion Detection Systems are therefore required to track the network which dynamically analyses incoming traffic. The purpose of the IDS is to carry out attacks inspection or provide security management with desirable help along with intrusion data. To date, several approaches to intrusion detection have been suggested to anticipate network malicious traffic. The NSL-KDD dataset is being applied in the paper to test intrusion detection machine learning algorithms. We research the potential viability of ELM by evaluating the advantages and disadvantages of ELM. In the preceding part on this issue, we noted that ELM does not degrade the generalisation potential in the expectation sense by selecting the activation function correctly. In this paper, we initiate a separate analysis & demonstrate that the randomness of ELM often contributes to some negative effects. For this reason, we have employed a new technique of machine learning for overcoming the problems of ELM by using the Categorical Boosting technique (CATBoost).

[1]  Li Guo,et al.  Network anomaly detection based on TCM-KNN algorithm , 2007, ASIACCS '07.

[2]  Seetha Hari,et al.  Learning From Imbalanced Data , 2019, Advances in Computer and Electrical Engineering.

[3]  Jesus E. Diaz-Verdejo,et al.  A Snort-based approach for the development and deployment of hybrid IDS , 2007, IEEE Latin America Transactions.

[4]  Wathiq Laftah Al-Yaseen,et al.  Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..

[5]  Tarek M. Taha,et al.  Comprehensive survey on intrusion detection on various hardware and software , 2015, 2015 National Aerospace and Electronics Conference (NAECON).

[6]  Shikha Agrawal,et al.  A Survey on Feature Selection Techniques for Internet Traffic Classification , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).

[7]  Nisha P. Shetty Using clustering to capture attackers , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[8]  Narendra M. Patel,et al.  OpenAppID - application identification framework next generation of firewalls , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[9]  Kathleen Goeschel,et al.  Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis , 2016, SoutheastCon 2016.

[10]  Jian Shen,et al.  Classification model for imbalanced traffic data based on secondary feature extraction , 2017, IET Commun..

[11]  Archana Singh,et al.  Network intrusion detection system using various data mining techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).

[12]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[13]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[14]  S. Srinivas Kumar,et al.  A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective , 2018 .

[15]  R. K. Challa,et al.  Novel intrusion detection system integrating layered framework with neural network , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).