Transmission Deviation based Windowed Training for Intrusion Detection on Streaming Data |
||
|
|
|
© 2024 by IJCTT Journal | ||
Volume-72 Issue-1 |
||
Year of Publication : 2024 | ||
Authors : A. Sagaya Priya, S. Britto Ramesh Kumar | ||
DOI : 10.14445/22312803/IJCTT-V72I1P107 |
How to Cite?
A. Sagaya Priya, S. Britto Ramesh Kumar, "Transmission Deviation based Windowed Training for Intrusion Detection on Streaming Data," International Journal of Computer Trends and Technology, vol. 72, no. 1, pp. 40-47, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I1P107
Abstract
New and increased cyber-attacks have been launched frequently on network systems due to the large number of highly sensitive data transmitted in these systems. Hence, it becomes mandatory to improve the intrusion detection systems' capability and handle the high variations in data distributions that are common on systems experiencing concept drift. The proposed Transmission Deviation based Windowed Model (TDWM) for intrusion detection on streaming network data is a novel approach that addresses the need for improved intrusion detection systems in the face of high variations in data distributions. The TDWM model considers imbalance levels and is designed to handle varied imbalance levels effectively, ensuring unbiased training. Two training models have been designed, each level capable of handling varied imbalance levels. Retraining of models is triggered based on the drift levels, ensuring that the model never becomes obsolete. Experiments were performed on three different intrusion detection datasets containing varied imbalances and varied drift levels. Experimental results and comparisons indicate the model exhibits high accuracy levels of >97% over all three datasets. Such high performance on varied datasets indicates the model's capability to handle data with varied distributions and its ability to be deployed in real time.
Keywords
Network intrusion detection, Ensemble modeling, Boosting, Stacking, Time window, Online training.
Reference
[1] Dylan Chou, and Meng Jiang, “A Survey on Data-Driven Network Intrusion Detection,” ACM Computing Surveys, vol. 54, no. 9, pp. 1– 36, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Kelton A.P. da Cost et al., “Internet of Things: A Survey on Machine Learning-Based Intrusion Detection Approaches,” Computer Networks, vol. 151, pp. 147–157, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Javier Martínez Torres, Carla Iglesias Comesaña, and Paulino J. García-Nieto, “Review: Machine Learning Techniques Applied to Cybersecurity,” International Journal of Machine Learning and Cybernetics, vol. 10, pp. 2823–2836, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Neha Srivastava, and Umesh Chandra Jaiswal, “Big Data Analytics Technique in Cyber Security: A Review,” 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, pp. 579-585, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[5] T. Ryan Hoens, Robi Polikar, and Nitesh V. Chawla, “Learning From Streaming Data with Concept Drift and Imbalance: An Overview,” Progress in Artificial Intelligence, vol. 1, no. 1, pp. 89–101, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Bartosz Krawczyk, and Alberto Cano, “Online Ensemble Learning with Abstaining Classifiers for Drifting and Noisy Data Streams”, Applied Soft Computing, vol. 68, pp. 677–692, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] B. Mukherjee, L.T. Heberlein, and K.N. Levitt, “Network Intrusion Detection,” IEEE Network, vol. 8, no. 3, pp. 26-41, 1994.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Robert C. Newman, Computer Security: Protecting Digital Resources, 1st ed., Jones and Barret Learning, 2010.
[Google Scholar] [Publisher Link]
[9] J.B.D. Caberera, B. Ravichandran, and R.K. Mehra, “Statistical Traffic Modeling for Network Intrusion Detection,” Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728), San Francisco, CA, USA, pp. 466-473, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Pedro Casas, Johan Mazel, and Philippe Owezarski, “Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge,” Computer Communications, vol. 35, no. 7, pp. 772–783, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ali H. Sayed, “Adaptation, Learning, and Optimization Over Networks,” University of California, Los Angeles, USA, vol. 7, no. 4-5, pp. 311-801, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[12] András A. Benczúr, Levente Kocsis, and Róbert Pálovics, “Online Machine Learning Algorithms Over Data Streams,” Encyclopedia of Big Data Technologies, pp. 1199–1207, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Nathan Martindale, Muhammad Ismail, and Douglas A. Talbert, “Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data,” Information, vol. 11, no. 6, p. 315, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Bian Shun, and Wenjia Wang, “On Diversity and Accuracy of Homogeneous and Heterogeneous Ensembles,” International Journal of Hybrid Intelligent Systems, vol. 4, no. 2, pp. 103–128, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Abhishek Verma, and Virender Ranga, “Machine Learning Based Intrusion Detection Systems for IoT Applications,” Wireless Personal Communications, vol. 111, pp. 289–312, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Laura Rettig et al., “Online Anomaly Detection Over Big Data Streams,” Applied Data Science, pp. 289–312, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Yanqing Yang et al., “Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder with Regularization,” IEEE Access, vol. 8, pp. 42169–42184, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Ketan Sanjay Desale, Chandrakant Namdev Kumathekar, and Arjun Pramod Chavan, “Efficient Intrusion Detection System Using Stream Data Mining Classification Technique,” 2015 International Conference on Computing Communication Control and Automation, pp. 469– 473, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Mustafa Amir Faisal et al., “Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining,” Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI) 2012: Intelligence and Security Informatics, pp. 96–111, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Fawaz S. Al-Anzi, “Design and Analysis of Intrusion Detection Systems for Wireless Mesh Networks,” Digital Communications and Networks, vol. 8, no. 6, pp. 1068–1076, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Linqing Gui, Wenyang Yuan, and Fu Xiao, “CSI-Based Passive Intrusion Detection Bound Estimation in Indoor NLos Scenario,” Fundamental Research, vol. 3, no. 6, pp. 988–996, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Ibrahim Hayatu Hassan et al., “An Improved Binary Manta Ray Foraging Optimization Algorithm Based Feature Selection and Random Forest Classifier for Network Intrusion Detection,” Intelligent Systems with Applications, vol. 16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Judy Simon et al., “Hybrid Intrusion Detection System for Wireless IoT Networks Using Deep Learning Algorithm,” Computers and Electrical Engineering, vol. 102, 2022. [CrossRef] [Google Scholar] [Publisher Link]
[24] Phanindra Reddy Kannari, Noorullah Shariff Chowdary, and Rajkumar Laxmikanth Biradar, “An Anomaly-Based Intrusion Detection System Using Recursive Feature Elimination Technique for Improved Attack Detection,” Theoretical Computer Science, vol. 931, pp. 56–64, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] M.P. Ramkumar et al., “Intrusion Detection in Big Data Using Hybrid Feature Fusion and Optimization Enabled Deep Learning Based on Spark Architecture,” Computers and Security, vol. 116, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Vinayakumar Ravi, Rajasekhar Chaganti, and Mamoun Alazab, “Recurrent Deep Learning-Based Feature Fusion Ensemble Meta-Classifier Approach for Intelligent Network Intrusion Detection System,” Computers and Electrical Engineering, vol. 102, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Emad-ul-Haq-Qazi et al., “An Intelligent and Efficient Network Intrusion Detection System Using Deep Learning,” Computers and Electrical Engineering, vol. 99, 2022.
[CrossRef] [Google Scholar] [Publisher Link]