A new ensemble based approach for intrusion detection system using voting

2021 ◽  
pp. 1-11
Author(s):  
Nitesh Singh Bhati ◽  
Manju Khari

With the increase in the amount of data available today, the responsibility of keeping that data safe has also taken a more severe form. To prevent confidential data from getting in the hands of an attacker, some measures need to be taken. Here comes the need for an effective system, which can classify the traffic as an attack or normal. Intrusion Detection Systems can do this work with perfection. Many machine learning algorithms are used to develop efficient IDS. These IDS provide remarkable results. However, ensemble-based IDS using voting have been seen to outperform individual approaches (Support Vector Machine and ExtraTree). Since the Voting methodology is able to work around both, theoretically similar and different classifiers and produce a single classifier based on the majority characteristics, it proved to be better than the other ensemble based techniques. In this paper, an ensemble IDS implementation is presented based on the voting ensemble method, using the two algorithms, Support Vector Machine (SVC) and ExtraTree. The experiment is performed on the KDDCup99 Dataset. The evaluation of the performance of the proposed method is based on the comparison with an unoptimized implementation of the same. The results based on performing the experiment in Python fetched an accuracy of 99.90%.

Author(s):  
Syed Ali Raza Shah ◽  
Biju Issac ◽  
Seibu Mary Jacob

In this paper, an existing rule-based intrusion detection system (IDS) is made more intelligent through the application of machine learning. Snort was chosen as it is an open source software and though it was performing well, it showed false positives (FPs). To find the best performing machine learning algorithms (MLAs) to use with Snort so as to improve its detection, we tested some algorithms on three available datasets. Support vector machine (SVM) was chosen along with fuzzy logic and decision tree based on their accuracy. Combined versions of algorithms through ensemble SVM along with other variants were tried on the generated traffic of normal and malicious packets at 10[Formula: see text]Gbps. Optimized versions of the SVM along with firefly and ant colony optimization (ACO) were also tried, and the accuracy improved remarkably. Thus, the application of combined and optimized MLAs to Snort at 10[Formula: see text]Gbps worked quite well.


2021 ◽  
Vol 11 (24) ◽  
pp. 11988
Author(s):  
Robin Singh Bhadoria ◽  
Naman Bhoj ◽  
Hatim G. Zaini ◽  
Vivek Bisht ◽  
Md. Manzar Nezami ◽  
...  

Advancement in network technology has vastly increased the usage of the Internet. Consequently, there has been a rise in traffic volume and data sharing. This has made securing a network from sophisticated intrusion attacks very important to preserve users’ information and privacy. Our research focuses on combating and detecting intrusion attacks and preserving the integrity of online systems. In our research we first create a benchmark model for detecting intrusions and then employ various combinations of feature selection techniques based upon ensemble machine learning algorithms to improve the performance of the intrusion detection system. The performance of our model was investigated using three evaluation metrics namely: elimination time, accuracy and F1-score. The results of the experiment indicated that the random forest feature selection technique had the minimum elimination time, whereas the support vector machine model had the best accuracy and F1-score. Therefore, conclusive evidence could be drawn that the combination of random forest and support vector machine is suitable for low latency and highly accurate intrusion detection systems.


2013 ◽  
Vol 655-657 ◽  
pp. 1787-1790
Author(s):  
Sheng Chen Yu ◽  
Li Min Sun ◽  
Yang Xue ◽  
Hui Guo ◽  
Xiao Ju Wang ◽  
...  

Intrusion detection algorithm based on support vector machine with pre-extracting support vector is proposed which combines the center distance ratio and classification algorithm. Given proper thresholds, we can use the support vector as a substitute for the training examples. Then the scale of dataset is decreased and the performance of support vector machine is improved in the detection rate and the training time. The experiment result has shown that the intrusion detection system(IDS) based on support vector machine with pre-extracting support needs less training time under the same detection performance condition.


Sign in / Sign up

Export Citation Format

Share Document