A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System

Although the cloud-based robotic system has provided the services in various industries, its data safety is continuously threatened, and the network intrusion detection system (NIDS) is considered as a necessary component to ensure its security. In recent years, many machine learning (ML) techniques have been applied for building a more intelligent NIDS. Most NIDSs based on the ML method and artificial intelligence techniques are either supervised or unsupervised. However, the supervised learning for NIDS depends much on the labeled data. This weakness makes it harder to detect the latest attack patterns. Meanwhile, the unsupervised learning for NIDS often fails to give the satisfactory results. Therefore, this paper proposed a novel fuzziness-based semi-supervised learning approach via ensemble learning for network intrusion detection on the cloud-based robotic system, which can address the above issues. First, due to the good generalization ability of ensemble learning, we construct an ensemble system trained by the labeled data. Moreover, for better utilizing the unlabeled data, a fuzziness-based method is adopted for data analysis. In this way, the noisy and redundant examples in the data set are removed. Finally, we use the same ensemble approach to combine both supervised and unsupervised parts. To verify the effectiveness and robustness of the NIDS, the proposed approach is tested on the NSL-KDD data set, which is a commonly used traffic data set. The experimental results show that the proposed approach achieves the accuracy 84.54% and 71.29% on the, respectively, “KDDTest+” and “KDDTest-21” data sets. When compared with the state-of-the-art method, the proposed method also delivers a promising result.

[1]  Miguel Nicolau,et al.  A Hybrid Autoencoder and Density Estimation Model for Anomaly Detection , 2016, PPSN.

[2]  Francisco Herrera,et al.  Learning the membership function contexts for mining fuzzy association rules by using genetic algorithms , 2009, Fuzzy Sets Syst..

[3]  Yinhui Li,et al.  An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..

[4]  Seyed Mojtaba Hosseini Bamakan,et al.  Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem , 2017, Knowl. Based Syst..

[5]  Witold Pedrycz,et al.  A Study on Relationship Between Generalization Abilities and Fuzziness of Base Classifiers in Ensemble Learning , 2015, IEEE Transactions on Fuzzy Systems.

[6]  MengChu Zhou,et al.  A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[7]  Friedhelm Schwenker,et al.  Semi-supervised Learning , 2013, Handbook on Neural Information Processing.

[8]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[9]  Xiaojin Zhu,et al.  Introduction to Semi-Supervised Learning , 2009, Synthesis Lectures on Artificial Intelligence and Machine Learning.

[10]  Gunnar Rätsch,et al.  Kernel PCA and De-Noising in Feature Spaces , 1998, NIPS.

[11]  MengChu Zhou,et al.  Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks , 2018, IEEE Communications Magazine.

[12]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[13]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[14]  Leo Breiman,et al.  Classification and Regression Trees , 1984 .

[15]  Jun Cheng,et al.  Mobile Cyber Physical Systems: Current Challenges and Future Networking Applications , 2018, IEEE Access.

[16]  Mohammad Zulkernine,et al.  Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[17]  Geoffrey E. Hinton,et al.  Learning representations by back-propagating errors , 1986, Nature.

[18]  Avrim Blum,et al.  The Bottleneck , 2021, Monopsony Capitalism.

[19]  Irena Koprinska,et al.  Co-training using RBF Nets and Different Feature Splits , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[20]  Rayid Ghani,et al.  Analyzing the effectiveness and applicability of co-training , 2000, CIKM '00.

[21]  Mohiuddin Ahmed,et al.  Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection , 2015, Annals of Data Science.

[22]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[23]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[24]  Tetsuo Kinoshita,et al.  Four Decades of Data Mining in Network and Systems Management , 2015, IEEE Transactions on Knowledge and Data Engineering.

[25]  Neamat El Gayar,et al.  New Feature Splitting Criteria for Co-training Using Genetic Algorithm Optimization , 2010, MCS.

[26]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[27]  Bin Wang,et al.  Semi-supervised Self-training for Sentence Subjectivity Classification , 2008, Canadian Conference on AI.

[28]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[29]  Rebecca Hwa,et al.  Co-training for Predicting Emotions with Spoken Dialogue Data , 2004, ACL.

[30]  Karim Afdel,et al.  Semi-supervised machine learning approach for DDoS detection , 2018, Applied Intelligence.

[31]  Victor C. M. Leung,et al.  Multidimensional context-aware social network architecture for mobile crowdsensing , 2014, IEEE Communications Magazine.

[32]  Nasser M. Nasrabadi,et al.  Pattern Recognition and Machine Learning , 2006, Technometrics.

[33]  Michelangelo Ceci,et al.  Semi-supervised trees for multi-target regression , 2018, Inf. Sci..

[34]  Settimo Termini,et al.  A Definition of a Nonprobabilistic Entropy in the Setting of Fuzzy Sets Theory , 1972, Inf. Control..

[35]  Xizhao Wang,et al.  Fuzziness based sample categorization for classifier performance improvement , 2015, J. Intell. Fuzzy Syst..

[36]  Hamideh Afsarmanesh,et al.  Semi-supervised self-training for decision tree classifiers , 2017, Int. J. Mach. Learn. Cybern..

[37]  Jr. W.A. Chren,et al.  One-hot residue coding for low delay-power product CMOS design , 1998 .

[38]  Shingo Mabu,et al.  An efficient class association rule-pruning method for unified intrusion detection system using genetic algorithm , 2013 .

[39]  Udo W. Pooch,et al.  Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..

[40]  Hisao Ishibuchi,et al.  Parallel Distributed Hybrid Fuzzy GBML Models With Rule Set Migration and Training Data Rotation , 2013, IEEE Transactions on Fuzzy Systems.

[41]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[42]  Martial Hebert,et al.  Semi-Supervised Self-Training of Object Detection Models , 2005, 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1.