基于特征选择优化的RF-SVM入侵检测系统

Dongliang Xuan, Huaping Hu, Bidong Wang, Bo Liu
{"title":"基于特征选择优化的RF-SVM入侵检测系统","authors":"Dongliang Xuan, Huaping Hu, Bidong Wang, Bo Liu","doi":"10.1109/CCCI52664.2021.9583206","DOIUrl":null,"url":null,"abstract":"With the emergence of increasingly growing network threats, network security becomes a major issue which causes huge existing and potential losses, such as WannaCry. Various methods had been adopted to maintain network security, among which Intrusion Detection System (IDS) is one of the most essential parts of cybersecurity to defense against sophisticated and ever-growing network attacks. A number of researchers have studied comprehensive datasets and effective approaches to build IDS. Machine learning models are also applied in IDS and obtained considerable results in building better network security system. In this paper, we proposed a two-stage IDS based on machine learning models RF and SVM optimized with Feature Selection algorithm CFS. We also conducted experiments on NSL-KDD benchmark datasets to evaluate the performance of the two-stage IDS, comparing against RF and SVM models respectively. The results demonstrated that our proposed two-stage IDS outperformed RF and SVM with an increase from 4.31% to 14.62% in Precision and a reduction of 93.84% in time than SVM.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection\",\"authors\":\"Dongliang Xuan, Huaping Hu, Bidong Wang, Bo Liu\",\"doi\":\"10.1109/CCCI52664.2021.9583206\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the emergence of increasingly growing network threats, network security becomes a major issue which causes huge existing and potential losses, such as WannaCry. Various methods had been adopted to maintain network security, among which Intrusion Detection System (IDS) is one of the most essential parts of cybersecurity to defense against sophisticated and ever-growing network attacks. A number of researchers have studied comprehensive datasets and effective approaches to build IDS. Machine learning models are also applied in IDS and obtained considerable results in building better network security system. In this paper, we proposed a two-stage IDS based on machine learning models RF and SVM optimized with Feature Selection algorithm CFS. We also conducted experiments on NSL-KDD benchmark datasets to evaluate the performance of the two-stage IDS, comparing against RF and SVM models respectively. The results demonstrated that our proposed two-stage IDS outperformed RF and SVM with an increase from 4.31% to 14.62% in Precision and a reduction of 93.84% in time than SVM.\",\"PeriodicalId\":136382,\"journal\":{\"name\":\"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCCI52664.2021.9583206\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCCI52664.2021.9583206","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着网络威胁的日益增多,网络安全成为一个重大问题,造成巨大的现有和潜在损失,如WannaCry。维护网络安全的方法多种多样,其中入侵检测系统(IDS)是网络安全最重要的组成部分之一,可以抵御复杂且日益增长的网络攻击。许多研究人员已经研究了构建入侵检测系统的综合数据集和有效方法。机器学习模型也应用于入侵检测中,并在构建更好的网络安全系统方面取得了可观的成果。本文提出了一种基于特征选择算法CFS优化的机器学习模型RF和SVM的两阶段入侵检测方法。我们还在NSL-KDD基准数据集上进行了实验,分别与RF和SVM模型进行了比较,以评估两阶段IDS的性能。结果表明,我们提出的两阶段IDS比RF和SVM的精度提高了4.31%到14.62%,时间比SVM减少了93.84%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection
With the emergence of increasingly growing network threats, network security becomes a major issue which causes huge existing and potential losses, such as WannaCry. Various methods had been adopted to maintain network security, among which Intrusion Detection System (IDS) is one of the most essential parts of cybersecurity to defense against sophisticated and ever-growing network attacks. A number of researchers have studied comprehensive datasets and effective approaches to build IDS. Machine learning models are also applied in IDS and obtained considerable results in building better network security system. In this paper, we proposed a two-stage IDS based on machine learning models RF and SVM optimized with Feature Selection algorithm CFS. We also conducted experiments on NSL-KDD benchmark datasets to evaluate the performance of the two-stage IDS, comparing against RF and SVM models respectively. The results demonstrated that our proposed two-stage IDS outperformed RF and SVM with an increase from 4.31% to 14.62% in Precision and a reduction of 93.84% in time than SVM.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Optimization Method of Pneumonia Image Classification Model Based on Deep Transfer Learning Comparison and analysis of secret image sharing principles Capsule: All you need to know about Tactile Internet in a Nutshell Energy Management Systems and Smart Phones: A Systematic Literature Survey Cross-modal Retrieval of Archives based on Principal Affinity Representation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1