2019
DOI: 10.1155/2019/7130868
|View full text |Cite
|
Sign up to set email alerts
|

Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms

Abstract: Intrusion detection system (IDS) can effectively identify anomaly behaviors in the network; however, it still has low detection rate and high false alarm rate especially for anomalies with fewer records. In this paper, we propose an effective IDS by using hybrid data optimization which consists of two parts: data sampling and feature selection, called DO_IDS. In data sampling, the Isolation Forest (iForest) is used to eliminate outliers, genetic algorithm (GA) to optimize the sampling ratio, and the Random For… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(49 citation statements)
references
References 27 publications
0
42
0
Order By: Relevance
“…The Adaboost meta-algorithm was implemented to tackle the unbalanced data based on the actual plan, while the ABC was used for the IDS problem optimization. Incorporating both the redesigned density peak clustering algorithm (MDPCA) and the deep belief networks (DBNs) resulted in a novel fuzzy aggregation approach which was proposed in [21]. The MDPCA section of the algorithm splits the primal training dataset into numerous minor subsets based on the similarity of the training samples feature.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The Adaboost meta-algorithm was implemented to tackle the unbalanced data based on the actual plan, while the ABC was used for the IDS problem optimization. Incorporating both the redesigned density peak clustering algorithm (MDPCA) and the deep belief networks (DBNs) resulted in a novel fuzzy aggregation approach which was proposed in [21]. The MDPCA section of the algorithm splits the primal training dataset into numerous minor subsets based on the similarity of the training samples feature.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Yao et al [20] adopt machine learning techniques to propose a new intrusion detection framework to overcome the imbalance of different kinds of data in network traffic and the nonidentical distribution between the training set and the test set. Ren et al [21] adopt isolation forest, genetic algorithm, and RF to design a new intrusion detection system which mainly consists of data sampling and feature selection. Vijayakumar et al [22] explore the role of machine learning to reduce the false alarm rate of wireless intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%
“…In algorithm 1, it's worth noting that before calculating distance, the data need to be standardized. But the output dataset of this algorithm is a part of the raw dataset, not the standardized dataset as line (17). Line (1) performs 0-1 normalization.…”
Section: Data Balancing Algorithm Based On Improved Knn Outlier Detecmentioning
confidence: 99%
“…Therefore, it is necessary to construct an effective anomaly detection classifier. Based on a large number of experiments and the ability of the RF classifier in processing complex and multi-category data [17], the random forests algorithm is as the classification model in this paper.…”
Section: Introductionmentioning
confidence: 99%