Implementation of Intrusion Detection System Using Various Machine Learning Approaches with Ensemble learning

Authors

  • Ms. Pragati V. Pandit  Research Scholar, SJJTU Jhunjhunu, Rajasthan, India
  • Dr. Shashi Bhushan  Research Guid, SJJTU Jhunjhunu, Rajasthan, India
  • Dr. Uday Patkar  Research Co-Guid, SJJTU Jhunjhunu, Rajasthan, India

Keywords:

Intrusion detection, Machine Learning, ML algorithms, ensemble learning, Random Forest, Decision Tree, XgBoost, Extra Tree.

Abstract

Recent years have seen an increase in advanced threat attacks, yet feature filtering-based network intrusion detection systems have a number of shortcomings that make it challenging for security managers and analysts to identify and thwart network intrusions in their organizations. Information systems are routinely protected and damage is minimized using techniques for detecting intrusions. It protects against dangers and weaknesses in real-world and virtual computer networks. Effective intrusion detection systems are now typically created using machine learning techniques. Neural networks, statistical models, rule learning, and ensemble techniques are examples of machine learning techniques for intrusion detection. Machine learning ensemble techniques are renowned for their superior performance during the learning process. For the creation of a successful intrusion detection system, a suitable ensemble technique must be investigated. In this paper, we introduced a novel ensemble method for intrusion detection in the network along with a combination of decision tree, random forest, extra tree, and XGBoost algorithms. The suggested method was created utilizing the Python programming language and aids in improving detection accuracy. Utilizing the CICIDS2017 dataset, the constructed system is evaluated based on numerous evaluation criteria, including precision, recall, and f1-score. The ensemble approach significantly raises the detection accuracy.

References

  1. V. V. Mandhare, D. R. Pede, and P. S. Vikhe, “Network Intrusion Detection using a Deep Learning Approach,” Int. J. Recent Technol. Eng., vol. 9, no. 3, pp. 59–64, 2020, doi: 10.35940/ijrte.b4086.099320.
  2. C. Sinclair, L. Pierce, and S. Matzner, “An application of machine learning to network intrusion detection,” Proc. - Annu. Comput. Secur. Appl. Conf. ACSAC, vol. Part F1334, no. 0293, pp. 371–377, 1999, doi: 10.1109/CSAC.1999.816048.
  3. R. Patgiri, U. Varshney, T. Akutota, and R. Kunde, “An Investigation on Intrusion Detection System Using Machine Learning,” Proc. 2018 IEEE Symp. Ser. Comput. Intell. SSCI 2018, pp. 1684–1691, 2019, doi: 10.1109/SSCI.2018.8628676.
  4. I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” in ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, vol. 2018-Janua, pp. 108–116, doi: 10.5220/0006639801080116.
  5. S. M. Mehibs and S. H. Hashim, “Proposed Network Intrusion Detection System Based on Fuzzy c Mean Algorithm in Cloud Computing Environment,” J. Univ. BABYLON Pure Appl. Sci., vol. 26, no. 2, pp. 27–35, 2017, doi: 10.29196/jub.v26i2.471.
  6. S. Rizvi, G. Labrador, M. Guyan, and J. Savan, “Advocating for Hybrid Intrusion Detection Prevention System and Framework Improvement,” in Procedia Computer Science, 2016, vol. 95, pp. 369–374, doi: 10.1016/j.procs.2016.09.347.
  7. L. Sellami, D. Idoughi, A. Baadache, and P. Tiako, “A Novel Detection Intrusion Approach for Ubiquitous and Pervasive Environments,” in Procedia Computer Science, 2016, vol. 94, pp. 429–434, doi: 10.1016/j.procs.2016.08.066.
  8. Z. Pan, S. Chen, … G. H.-P. of the 2003, and undefined 2003, “Hybrid neural network and C4. 5 for misuse detection,” ieeexplore.ieee.org, 2003, doi: 10.1109/ICMLC.2003.1259925.
  9. J. R. Quinlan, “Induction of decision trees,” Mach. Learn., vol. 1, no. 1, pp. 81–106, Mar. 1986, doi: 10.1007/bf00116251.
  10. S. Chiu and D. Tavella, “Introduction to Data Mining,” in Data Mining and Market Intelligence for Optimal Marketing Returns, 2020, pp. 151–206.
  11. B. N. Kagara and M. Md Siraj, “A Review on Network Intrusion Detection System Using Machine Learning,” Int. J. Innov. Comput., vol. 10, no. 1, pp. 27–34, 2020, doi: 10.11113/ijic.v10n1.252.
  12. N. Farnaaz and M. A. Jabbar, “Random Forest Modeling for Network Intrusion Detection System,” in Procedia Computer Science, 2016, vol. 89, pp. 213–217, doi: 10.1016/j.procs.2016.06.047.
  13. Y. Y. Aung and M. M. Min, “An analysis of K-means algorithm based network intrusion detection system,” Adv. Sci. Technol. Eng. Syst., vol. 3, no. 1, pp. 496–501, 2018, doi: 10.25046/aj030160.
  14. [14] L. Breiman, “Random forests,” Mach. Learn., vol. 45, no. 1, pp. 5–32, Oct. 2001, doi: 10.1023/A:1010933404324.
  15. B. S. Bhati and C. S. Rai, “Ensemble based approach for intrusion detection using extra tree classifier,” in Advances in Intelligent Systems and Computing, 2020, vol. 1125, pp. 213– 220, doi: 10.1007/978-981-15-2780-7_25.
  16. S. Patil et al., “Explainable Artificial Intelligence for Intrusion Detection System,” Electron., vol. 11, no. 19, 2022, doi: 10.3390/electronics11193079.
  17. X. Xu, W. Chen, and Y. Sun, “Over-sampling algorithm for imbalanced data classification,” J. Syst. Eng. Electron., vol. 30, no. 6, pp. 1182–1191, 2019, doi: 10.21629/JSEE.2019.06.12

Downloads

Published

2023-08-30

Issue

Section

Research Articles

How to Cite

[1]
Ms. Pragati V. Pandit, Dr. Shashi Bhushan, Dr. Uday Patkar, " Implementation of Intrusion Detection System Using Various Machine Learning Approaches with Ensemble learning" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 4, pp.461-466, July-August-2023.