Anomaly-based intrusion detection system based on feature selection and majority voting
نویسندگان
چکیده
Recently, cyberattacks have been more complex than in the past, as a new cyber-attack is initiated almost every day. Therefore, researchers should develop efficient intrusion detection systems (IDS) to detect cyber-attacks. In order improve and prevention of aforementioned cyber-attacks, several articles developed IDSs exploiting machine learning deep learning. this paper, way find network intrusions using combination feature selection adoptive voting investigated. NSL-KDD dataset, high-dimensional dataset that has widely used for detection, applied approach. Feature plays an important role improving accuracy testing time it eliminates less significant attributes from data set, thus saving computational power effort. The experimental results show proposed approach achieves 86.5% on test algorithm trained with selected features. addition, process each record 97.5 microseconds, which reflects model's superior performance. Comparing model existing models literature shows adaptive significantly improves accuracy, enhances efficiency, reduces false positives.
منابع مشابه
Ensemble Voting System for Anomaly Based Network Intrusion Detection
The growing dependence of modern society on telecommunication and information networks has become inevitable. Therefore, the security aspects of such networks play a strategic role in ensuring protection of data against misuse. Intrusion Detection systems (IDS) are meant to detect intruders who elude the “first line” protection. Data mining techniques are being used for building effective IDS. ...
متن کاملFeature Selection for Effective Anomaly-Based Intrusion Detection
Intrusion Detection system (IDs) has become the main research focus in the area of information security. Most of the existing IDs use all the features in the network packet to evaluate and look for known intrusive patterns. Some of these features are irrelevant and redundant. The drawback of this approach is a lengthy detection process and degrading performance of an ID system. In this paper a ...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملSOM-Based Anomaly Intrusion Detection System
In this paper, a SOM-based anomaly intrusion detection system is proposed, which can contract high-dimension data to lower, meanwhile keeping the primary relationship between clustering and topology. During the experiment, the theory of SOM is used to train three SOMs on the layers of system, process and network. Although our experiment environment is simpler than the real one, the result shows...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2023
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v30.i3.pp1699-1706