Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

被引:78
|
作者
Al-Jarrah, Omar Y. [1 ]
Alhussein, Omar [2 ]
Yoo, Paul D. [3 ]
Muhaidat, Sami [1 ,4 ]
Taha, Kamal
Kim, Kwangjo [1 ,5 ]
机构
[1] Khalifa Univ Sci Technol & Res, Elect & Comp Engn Dept, Abu Dhabi, U Arab Emirates
[2] Simon Fraser Univ, Sch Engn Sci, Burnaby, BC V5A 1S6, Canada
[3] Bournemouth Univ, Dept Comp & Informat, Poole, Dorset, England
[4] Univ Surrey, Guldford GU2 7XH, England
[5] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon 34141, South Korea
基金
新加坡国家研究基金会;
关键词
Botnet intrusion detection; efficient learning; ensembles; feature selection; machine-learning (ML); ANOMALY DETECTION; BEHAVIOR ANALYSIS; CLASSIFIER;
D O I
10.1109/TCYB.2015.2490802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.
引用
收藏
页码:1796 / 1806
页数:11
相关论文
共 50 条
  • [1] Cluster-based Intrusion Detection Method for Internet of Things
    Choudhary, Sarika
    Kesswani, Nishtha
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [2] An adaptive approach for cluster-based intrusion detection in VANET
    Muthumeenakshi, R.
    Katharine, A. Vanitha
    [J]. INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2022, 20 (01) : 58 - +
  • [3] Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks
    Spinosa, Eduardo J.
    de Carvalho, Andre Ponce de Leon F.
    Gama, Joao
    [J]. APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 976 - 980
  • [4] Hybrid Learning Approach of Combining Cluster-Based Partitioning and Hidden Markov Model for IoT Intrusion Detection
    Alhaidari, Sulaiman
    Zohdy, Mohamed
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019), 2019, : 27 - 31
  • [5] Intrusion Detection Framework of Cluster-based Wireless Sensor Network
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Feham, Mohammed
    [J]. 2012 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2012, : 893 - 897
  • [6] Intrusion Detection Framework of Cluster-based Wireless Sensor Network
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Feham, Mohammed
    [J]. 2012 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2012, : 857 - 861
  • [7] An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network
    Sun, Xuemei
    Yan, Bo
    Zhang, Xinzhong
    Rong, Chuitian
    [J]. PLOS ONE, 2015, 10 (10):
  • [8] Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
    Di Wu 1 Zhisheng Liu 1 Yongxin Feng 2
    [J]. 计算机工程与应用, 2004, (29) : 122 - 125
  • [9] Nearest cluster-based intrusion detection through convolutional neural networks
    Andresini, Giuseppina
    Appice, Annalisa
    Malerba, Donato
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 216
  • [10] An efficient intrusion detection framework in cluster-based wireless sensor networks
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Feham, Mohammed
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1211 - 1224