2019
DOI: 10.1109/access.2019.2928048
|View full text |Cite
|
Sign up to set email alerts
|

TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System

Abstract: Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering and repealing malicious activities in computer networks. Anomaly-based IDS, in particular, rely on classification models trained using historical data to discover such malicious activities. In this paper, an improved IDS based on hybrid feature selection and two-level classifier ensembles are proposed. A hybrid feature selection technique comprising three methods, i.e., particle swarm optimization, ant colony algorithm, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
143
1
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 274 publications
(146 citation statements)
references
References 66 publications
(70 reference statements)
1
143
1
1
Order By: Relevance
“…The comparison results with some of the existing approaches on these two sets are shown in Table 12. The highest detection accuracy is achieved by the proposed approach based on the experimental results on KDDTest+, which outperforms the other recent IDS techniques, including FSSL [9], FSSL-EL [34], and TSE-IDS [82]. Besides having superior detection accuracy, the proposed method also outperforms significantly other approaches in terms of detection rate metric.…”
Section: Comparison With the State Of The Art Methodsmentioning
confidence: 73%
See 2 more Smart Citations
“…The comparison results with some of the existing approaches on these two sets are shown in Table 12. The highest detection accuracy is achieved by the proposed approach based on the experimental results on KDDTest+, which outperforms the other recent IDS techniques, including FSSL [9], FSSL-EL [34], and TSE-IDS [82]. Besides having superior detection accuracy, the proposed method also outperforms significantly other approaches in terms of detection rate metric.…”
Section: Comparison With the State Of The Art Methodsmentioning
confidence: 73%
“…Although the multi-class classification performance of our proposed method has been proven through experiments, to provide more reference for the readers, we still compare the results of our CFS-BA-Ensemble method with other earlier researches in binary classification based on NSL-KDD, AWID, and CIC-IDS2017 datasets, which is shown in Table 13. First of all, it can be seen in Table 13 that our proposed model outperforms other similar ensemble classifiers, such as FS-EL [83], XGBoost-IDS [13], and TSE-IDS [82] when using 10f cross-validation as a validation technique. There are also some deep learning methods for IDS in the current literature such as DEMISe [69], DeepWindow [79], and HELAD [99].…”
Section: Comparison With the State Of The Art Methodsmentioning
confidence: 86%
See 1 more Smart Citation
“…In order to further verify the superiority of the proposed model, we compared the proposed model with related models in other literature, including SCDNN [ 42 ], LSTM 4 [ 43 ], GRU 3 [ 43 ], CFBLS [ 43 ], TSE-IDS [ 44 ], ROS-DNN [ 45 ], SMOTE-DNN [ 45 ], and ADASYN-DNN [ 45 ]. To be fair, all the methods were implemented on NSL-KDDTest+ and NSL-KDDTest21.…”
Section: Discussionmentioning
confidence: 99%
“…Owing to this fact, they attract the researchers' attention by proposing new approaches aiming to improve the system security robustness against new potential unknown attacks. Actually, three types of methods used in IDS can be distinguished, namely (i) signature-based method [3], (ii) anomaly-based method [4], and (iii) hybrid signature/anomaly-based method to get a complementary intrusion detection. While signaturebased IDS technique matches the presented attack's signature with a database of known attacks [5], the anomaly-based IDS can effectively identify unknown attacks whose signatures do not exist in database, by learning about certain normal behaviors in the network.…”
Section: Introductionmentioning
confidence: 99%