A Machine Learning Framework with Feature Selection and Hyperparameter Tuning Optimizations for Intrusion Detection

Authors

  • Sayyada Mubeen, Harikrishna Kamatham

Keywords:

Artificial Intelligence, Machine Learning, Intrusion Detection

Abstract

The recent increase in cyber-attacks has made cyber security upgrading an on-going task. Heuristics were the foundation of traditional security systems; they were designed to identify intrusions depending on how they were detected. But as artificial intelligence (AI) techniques like machine learning (ML) have become more popular, learning-based models have shown to be effective because of their capacity to constantly learn from tagged data. The research indicates that when training samples are not of the intended amount and quality, supervised learning-based machine learning models perform worse at detecting intrusions. Utilizing the performance of ML models with certain tweaks is crucial. The paper, which intends to create an intrusion detection system based on machine learning and feature engineering, is motivated by this. We proposed two algorithms named Hybrid Feature Selection (HFS) and Learning based Intrusion Detection (LbID). We evaluate the system with the CICIDS2017 dataset. Binomial and multi-class classification is applied in the implementation of intrusion detection systems. With 94.22% accuracy, the RF model has the best binomial classification accuracy. Decision Tree has the greatest accuracy (91.67%) when it comes to multi-class classification without optimizations. RF exhibits the maximum accuracy of 93.46% in the case of multi-class classification with optimizations.

Downloads

Download data is not yet available.

References

Lee, Chie-Hong; Su, Yann-Yean; Lin, Yu-Chun and Lee, Shie-Jue (2017). Machine learning based network intrusion detection, IEEE, pp.79–83. http://doi:10.1109/CIAPP.2017.8167184

Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., and Abuzneid, A. (2019). Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection. Electronics,8(3), pp.1. http://doi:10.3390/electronics8030322

Alhajjar, E., Maxwell, P., and Bastian, N. (2021). Adversarial machine learning in Network Intrusion Detection Systems. Expert Systems with Applications, 186, pp.1.13. http://doi:10.1016/j.eswa.2021.115782

De Carvalho Bertoli, G., Pereira Junior, L. A., Saotome, O., Dos Santos, A. L., Verri, F. A. N., Marcondes, C. A. C. and Parente De Oliveira, J. M. (2021). An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System. IEEEAccess,9,pp.106790–106805. http://doi:10.1109/access.2021.3101188

Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., and Ahmad, F. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies. Pp.1-29. http://doi:10.1002/ett.4150

Zaman, M., and Lung, C.-H. (2018). Evaluation of machine learning techniques for network intrusion detection. NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Pp.1-5. http://doi:10.1109/noms.2018.8406212

Sultana, N., Chilamkurti, N., Peng, W., and Alhadad, R. (2018). Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications. Pp.1-9. http://doi:10.1007/s12083-017-0630-0

Li, J., Qu, Y., Chao, F., Shum, H. P. H., Ho, E. S. L., and Yang, L. (2018). Machine Learning Algorithms for Network Intrusion Detection. Intelligent Systems Reference Library, 151–179. http://doi:10.1007/978-3-319-98842-9_6

Anshu Parashar, Kuljot Singh Saggu and Anupam Garg. (2022). Machine learning based framework for network intrusion detection system using stacking ensemble technique. Indian Journal of Engineering & Materials Sciences. 29, pp.509-518.

Taher, K. A., Mohammed Yasin Jisan, B., & Rahman, M. M. (2019). Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection. 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST). Pp.1-4. http://doi:10.1109/icrest.2019.8644161

Magán-Carrión, R., Urda, D., Díaz-Cano, I., and Dorronsoro, B. (2020). Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches. Applied Sciences, 10(5), pp.1-21. http://doi:10.3390/app10051775

A, Anish Halimaa and Sundarakantham, K. (2019). Machine Learning Based Intrusion Detection System. , IEEE, pp.916–920. http://doi:10.1109/ICOEI.2019.8862784

Phadke, A., Kulkarni, M., Bhawalkar, P., and Bhattad, R. (2019). A Review of Machine Learning Methodologies for Network Intrusion Detection. 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC). Pp.1-4. http://doi:10.1109/iccmc.2019.8819748

Dini, P. and Saponara, S. (2021). Analysis, Design, and Comparison of Machine-Learning Techniques for Networking Intrusion Detection. Designs, 5(1), pp.1-21. http://doi:10.3390/designs5010009

Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. S. (2018). A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection. IEEE Communications Surveys & Tutorials, pp.1–46. http://doi:10.1109/comst.2018.2847722

Da Costa, K. A. P., Papa, J. P., Lisboa, C. O., Munoz, R. and de Albuquerque, V. H. C. (2019). Internet of Things: A survey on machine learning-based intrusion detection approaches. Computer Networks, 151, pp.147–157. http://doi:10.1016/j.comnet.2019.01.023

Seraphim, B. I., Palit, S., Srivastava, K. and Poovammal, E. (2018). A Survey on Machine Learning Techniques in Network Intrusion Detection System. 2018 4th International Conference on Computing Communication and Automation (ICCCA). Pp.1-5. http://doi:10.1109/ccaa.2018.8777596

Satapathy, Suresh Chandra; Raju, K. Srujan; Shyamala, K.; Krishna, D. Rama and Favorskaya, Margarita N. (2020). A Review on Network Intrusion Detection System Using Machine Learning, ICETE, pp.598–607. http://doi:10.1007/978-3-030-24318-0_69

Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs and Mouhammd Alkasassbeh. (2017). Evaluation of Machine Learning Algorithms for Intrusion Detection System. IEEE 15th International Symposium on Intelligent Systems and Informatics, pp.1-6.

Liu, L., Wang, P., Lin, J., & Liu, L. (2021). Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning. IEEEAccess,9,pp.7550–7563. http://doi:10.1109/access.2020.3048198

Wu, F., Li, T., Wu, Z., Wu, S., & Xiao, C. (2021). Research on Network Intrusion Detection Technology Based on Machine Learning. International Journal of Wireless Information Networks, 28(3), pp.262–275. http://doi:10.1007/s10776-021-00520-z

Achmad Akbar Megantara and Tohari Ahmad. (2021). A hybrid machine learning method for increasing the performance of network intrusion detection systems. Megantara and Ahmad J Big Data, pp.1-19.

Chang, Y., Li, W., & Yang, Z. (2017). Network Intrusion Detection Based on Random Forest and Support Vector Machine. 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). Pp.1-4. http://doi:10.1109/cse-euc.2017.118

Abubakar, A., & Pranggono, B. (2017). Machine learning based intrusion detection system for software defined networks. 2017 Seventh International Conference on Emerging Security Technologies (EST). pp.1-6. http://doi:10.1109/est.2017.8090413

Farrukh Aslam Khan and Abdu Gumaei. (2019). A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection. Springer, p.75–86.

Thomas Rincy N 1 and Roopam Gupta. (2021). Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques. Hindawi Wireless Communications and Mobile Computing, pp.1-35.

Jing Li, Mohd Shahizan Othman, Hewan Chen and Lizawati Mi Yusuf. (2024). Optimizing IoT intrusion detection system feature selection versus feature extraction in machine learning. Journal of Big Data, pp.1-44.

Ameera S. Jaradat, Malek M. Barhoush and Rawan Bani Easa. (2022). Network intrusion detection system: machine learning approach. Indonesian Journal of Electrical Engineering and Computer Science. 25(2), p.1151~1158.

Zhihui Fan and Zhixuan You. (2024). Research on network intrusion detection based on XGBoost algorithm and multiple machine learning algorithms. Proceedings of the 3rd International Conference on Computing Innovation and Applied Physics, pp.162-167.

Chunying Zhang, Wenjie Wang, Lu Liu, Jing Ren 1 and Liya Wang. (2022). Three-Branch Random Forest Intrusion Detection Model. MDPI, pp.1-21.

Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin and Khondokar Fid. (2024). Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embe. Journal of Big Data, pp.1-44.

Dhaliwal, S., Nahid, A.-A., and Abbas, R. (2018). Effective Intrusion Detection System Using XGBoost. Information, 9(7), pp.1-24. doi:10.3390/info9070149

Chunying Zhang, Wenjie Wang, Lu Liu, Jing Ren and Liya Wang. (2022). Three-Branch Random Forest Intrusion Detection Model. MDPI, pp.1-21.

Witcha Chimphlee and Siriporn Chimphlee. (2023). INTRUSION DETECTION SYSTEM (IDS) DEVELOPMENT USING TREE- BASED MACHINE LEARNING ALGORITHMS. International Journal of Computer Networks & Communications (IJCNC). 15(4), pp.93-109.

Intrusion detection evaluation dataset (CIC-IDS2017). Retrieved from https://www.unb.ca/cic/datasets/ids-2017.html

Maldorad S and Weber R (2009) A wrapper method for feature selection using support vector. machines. Information Sciences 179:2208–2217.

Rice JA (2006) Mathematical Statistics and Data Analysis. Third Edition.

Kullback, S. and Leibler, R.A. (1951). "On Information and Sufficiency". Annals of Mathematical Statistics 22 (1): 79–86.

Downloads

Published

03.07.2024

How to Cite

Sayyada Mubeen. (2024). A Machine Learning Framework with Feature Selection and Hyperparameter Tuning Optimizations for Intrusion Detection. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 1083 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6352

Issue

Section

Research Article