Enhancing Intrusion Detection with Autoencoder Based Classifier and Statistical Feature Selection
DOI:
https://doi.org/10.31185/wjps.257Keywords:
Intrusion detection system, Autoencoder, Feature selection, Classification, Chi-square, Pearson correlationAbstract
In today's digital landscape, the rapid expansion of computer networks and the increasing reliance on information technology have made network security a paramount concern. With the growing sophistication of cyber threats, traditional intrusion detection systems (IDS) face significant challenges in effectively identifying and mitigating security breaches. To address these evolving threats, novel approaches that combine cutting-edge technologies are required. This paper explores the fusion of autoencoder based classifier to training and classifying the attacks of IDS. This approach is applied on the most meaningful feature that selected based on the pearson correlation (for continues vales) and chi-square test (for binary values). The benchmark NSL-KDD database is utilized to assess the validity of the suggested IDS. The experimental outcomes demonstrate that the designed Intrusion Detection System (IDS) attains superior classification accuracy at 92.27%, outperforming both prior research efforts and alternative classifier methods.
References
A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges,” Cybersecurity, vol. 2, no. 1, pp. 1–22, 2019.
Z. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah, and F. Ahmad, “Network intrusion detection system: A systematic study of machine learning and deep learning approaches,” Trans. Emerg. Telecommun. Technol., vol. 32, no. 1, p. e4150, 2021.
R. Prasad, V. Rohokale, R. Prasad, and V. Rohokale, “Artificial intelligence and machine learning in cyber security,” Cyber Secur. Lifeline Inf. Commun. Technol., pp. 231–247, 2020.
B. Dong and X. Wang, “Comparison deep learning method to traditional methods using for network intrusion detection,” in 2016 8th IEEE international conference on communication software and networks (ICCSN), 2016, pp. 581–585.
G. Kumar, “An improved ensemble approach for effective intrusion detection,” J. Supercomput., vol. 76, no. 1, pp. 275–291, 2020.
Y. Gao, Y. Liu, Y. Jin, J. Chen, and H. Wu, “A novel semi-supervised learning approach for network intrusion detection on cloud-based robotic system,” IEEE Access, vol. 6, pp. 50927–50938, 2018.
R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep learning approach for intelligent intrusion detection system,” Ieee Access, vol. 7, pp. 41525–41550, 2019.
M. H. L. Louk and B. A. Tama, “Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system,” Expert Syst. Appl., vol. 213, p. 119030, 2023.
W. Xu, J. Jang-Jaccard, A. Singh, Y. Wei, and F. Sabrina, “Improving performance of autoencoder-based network anomaly detection on nsl-kdd dataset,” IEEE Access, vol. 9, pp. 140136–140146, 2021.
M. Esmaeili, S. H. Goki, B. H. K. Masjidi, M. Sameh, H. Gharagozlou, and A. S. Mohammed, “Ml-ddosnet: Iot intrusion detection based on denial-of-service attacks using machine learning methods and nsl-kdd,” Wirel. Commun. Mob. Comput., vol. 2022, 2022.
Y. Yu and N. Bian, “An intrusion detection method using few-shot learning,” IEEE Access, vol. 8, pp. 49730–49740, 2020.
X. Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An adaptive ensemble machine learning model for intrusion detection,” Ieee Access, vol. 7, pp. 82512–82521, 2019.
S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Comput. Commun., vol. 199, pp. 113–125, 2023.
“https://www.unb.ca/cic/datasets/nsl.html.”
N. B. Chikodili, M. D. Abdulmalik, O. A. Abisoye, and S. A. Bashir, “Outlier detection in multivariate time series data using a fusion of K-medoid, standardized euclidean distance and Z-score,” in International Conference on Information and Communication Technology and Applications, 2020, pp. 259–271.
A. Y. Hussein, P. Falcarin, and A. T. Sadiq, “Enhancement performance of random forest algorithm via one hot encoding for IoT IDS,” Period. Eng. Nat. Sci., vol. 9, no. 3, pp. 579–591, 2021.
R. Zebari, A. Abdulazeez, D. Zeebaree, D. Zebari, and J. Saeed, “A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction,” J. Appl. Sci. Technol. Trends, vol. 1, no. 2, pp. 56–70, 2020.
Y. Bae and H. Lee, “Sentiment analysis of twitter audiences: Measuring the positive or negative influence of popular twitterers,” J. Am. Soc. Inf. Sci. Technol., vol. 63, no. 12, pp. 2521–2535, 2012.
F. R. S. Rangkuti, M. A. Fauzi, Y. A. Sari, and E. D. L. Sari, “Sentiment analysis on movie reviews using ensemble features and pearson correlation based feature selection,” in 2018 International Conference on Sustainable Information Engineering and Technology (SIET), 2018, pp. 88–91.
I. S. Thaseen, C. A. Kumar, and A. Ahmad, “Integrated intrusion detection model using chi-square feature selection and ensemble of classifiers,” Arab. J. Sci. Eng., vol. 44, pp. 3357–3368, 2019.
J. Zhai, S. Zhang, J. Chen, and Q. He, “Autoencoder and its various variants,” in 2018 IEEE international conference on systems, man, and cybernetics (SMC), 2018, pp. 415–419.
A. Binbusayyis and T. Vaiyapuri, “Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM,” Appl. Intell., vol. 51, no. 10, pp. 7094–7108, 2021.
F. H. Almasoudy, W. L. Al-Yaseen, and A. K. Idrees, “Differential evolution wrapper feature selection for intrusion detection system,” Procedia Comput. Sci., vol. 167, pp. 1230–1239, 2020.
E. Mushtaq, A. Zameer, M. Umer, and A. A. Abbasi, “A two-stage intrusion detection system with auto-encoder and LSTMs,” Appl. Soft Comput., vol. 121, p. 108768, 2022.
M. Zakariah, S. A. AlQahtani, and M. S. Al-Rakhami, “Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection,” Appl. Sci., vol. 13, no. 11, p. 6504, 2023.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Abbas Alharan

This work is licensed under a Creative Commons Attribution 4.0 International License.



