Abstract
The enormous growth of cyber threats has become a calamitous issue in today’s technically advanced world where data and information play a crucial role in identifying patterns and automatic predictive analysis. Network packet analysis is a pivotal technique in cybersecurity to protect our network and computer from unauthorized access. A network intrusion detection system (NIDS) is a network packet monitoring tool that intently inspects all the incoming and outgoing packets passing through a network and recognizes malicious incidents. This paper proposes a novel NIDS using the decision tree-based Bagging ensemble method, where the NSL-KDD dataset has been used for experimental purposes. The optimal features from the mentioned dataset have been filtered through the application of the wrapper-based Moth Flame optimization (MFO) technique and the effectiveness of the selected features has been evaluated using various machine learning, deep learning, and ensemble learning frameworks. All the experiments have been conducted in accordance with both binary and multiclass categories. Exhaustive performance evaluation confirms that the proposed MFO-ENSEMBLE method achieves an 87.43% detection rate and incurs minimal time overhead amongst all classification techniques. Practical implementation of the proposed methodology in a custom-built real-time test-bed confirms both the novelty as well as the feasibility of this work.
Similar content being viewed by others
References
Abd El Aziz M, Ewees AA, Hassanien AE (2017) Whale optimization algorithm and moth-flame optimization for multilevel thresholding image segmentation. Expert Syst Appl 83:242–256
Aburomman AA, Reaz MBI (2016) Survey of learning methods in intrusion detection systems. In: 2016 International conference on advances in electrical, electronic and systems engineering (ICAEES). IEEE, pp 362–365
Akinbo RS, Daramola OA (2021) Ensemble machine learning algorithms for prediction and classification of medical images. In: Machine learning-algorithms, models and applications. Intechopen
Bajaj K, Arora A (2013) Improving the intrusion detection using discriminative machine learning approach and improve the time complexity by data mining feature selection methods. Int J Comput Appl 76(1):5–11
Buczak AL, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1176
Bühlmann P (2012) Bagging, boosting and ensemble methods. In: Handbook of computational statistics. Springer, pp 985–1022
Chen CM, Chen YL, Lin HC (2010) An efficient network intrusion detection. Comput Commun 33(4):477–484
Chowdhury R, Roy A, Saha B, Bandyopadhyay SK (2021) A step forward to revolutionize intrusion detection system using deep convolutional neural network. In: Data driven approach towards disruptive technologies: proceedings of MIDAS 2020. Springer, Singapore, pp 337–352
Esmaily J, Moradinezhad R, Ghasemi J (2015) Intrusion detection system based on multi-layer perceptron neural networks and decision tree. In: 2015 7th Conference on information and knowledge technology (IKT). IEEE, pp 1–5
Farahnakian F, Heikkonen J (2018) A deep auto-encoder based approach for intrusion detection system. In: 2018 20th International conference on advanced communication technology (ICACT). IEEE, pp 178–183
Ferreira PJG (2020) Benchmark de Sistemas de detecção de intrusões baseados em comportamento com recurso a algoritmos bioinspirados. Ph.D thesis
Gaikwad D, Thool RC (2015) Intrusion detection system using bagging ensemble method of machine learning. In: 2015 International conference on computing communication control and automation. IEEE, pp 291–295
Goutte C, Gaussier E (2005) A probabilistic interpretation of precision, recall and f-score, with implication for evaluation. In: European conference on information retrieval. Springer, pp 345–359
Ingre B, Yadav A (2015) Performance analysis of nsl-kdd dataset using ann. In: 2015 International conference on signal processing and communication engineering systems. IEEE, pp 92–96
Ioulianou P, Vasilakis V, Moscholios I, Logothetis M (2018) A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form
Jha J, Ragha L (2013) Intrusion detection system using support vector machine. Int J Appl Inf Syst (IJAIS) 3:25–30
Khalaf M, Alaskar H, Hussain AJ, Baker T, Maamar Z, Buyya R, Liatsis P, Khan W, Tawfik H, Al-Jumeily D (2020) Iot-enabled flood severity prediction via ensemble machine learning models. IEEE Access 8:70375–70386
Lakhina S, Joseph S, Verma B (2010) Feature reduction using principal component analysis for effective anomaly–based intrusion detection on nsl-kdd
Lashkari AH, Draper-Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: ICISSp, pp 253–262
Li Z, Qin Z, Huang K, Yang X, Ye S (2017) Intrusion detection using convolutional neural networks for representation learning. In: International conference on neural information processing. Springer, pp 858–866
Mahfouz A, Abuhussein A, Venugopal D, Shiva S (2020) Ensemble classifiers for network intrusion detection using a novel network attack dataset. Future Internet 12(11):180
MeeraGandhi G, Appavoo K, Srivasta S (2010) Effective network intrusion detection using classifiers decision trees and decision rules. Int J Adv Netw Appl 2
Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl-Based Syst 89:228–249
Moustafa N, Turnbull B, Choo KKR (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J 6(3):4815–4830
Neethu B (2012) Classification of intrusion detection dataset using machine learning approaches. Int J Electron Comput Sci Eng 1(3):1044–1051
Patro S, Sahu KK (2015) Normalization: a preprocessing stage. arXiv:1503.06462
Rai K, Devi MS, Guleria A (2016) Decision tree based algorithm for intrusion detection. Int J Adv Netw Appl 7(4):2828
Sanders C, Smith J (2013) Applied network security monitoring: collection, detection, and analysis. Elsevier
Shehab M, Abualigah L, Al Hamad H, Alabool H, Alshinwan M, Khasawneh AM (2020) Moth–flame optimization algorithm: variants and applications. Neural Comput Appl 32(14):9859–9884
Shi JY, Zhang DY, Xue F, Li YJ, Qiao W, Yang WJ, Xu YM, Yang T (2019) Moth-flame optimization-based maximum power point tracking for photovoltaic systems under partial shading conditions. J Power Electron 19(5):1248–1258
Sommer R (2007) The bro network intrusion detection system
Su T, Sun H, Zhu J, Wang S, Li Y (2020) Bat: deep learning methods on network intrusion detection using nsl-kdd dataset. IEEE Access 8:29575–29585
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1–6
Trivedi I, Kumar A, Ranpariya AH, Jangir P (2016) Economic load dispatch problem with ramp rate limits and prohibited operating zones solve using levy flight moth-flame optimizer. In: 2016 International conference on energy efficient technologies for sustainability (ICEETS). IEEE, pp 442–447
Vinayakumar R, Soman K, Poornachandran P (2017) Applying convolutional neural network for network intrusion detection. In: 2017 International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 1222–1228
Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961
Zawbaa HM, Emary E, Parv B, Sharawi M (2016) Feature selection approach based on moth-flame optimization algorithm. In: 2016 IEEE Congress on evolutionary computation (CEC). IEEE, pp 4612–4617
Funding
This research received no external funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Ratul Chowdhury, Shibaprasad Sen, Arindam Roy, and Banani Saha declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chowdhury, R., Sen, S., Roy, A. et al. An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis. Multimed Tools Appl 81, 41225–41247 (2022). https://doi.org/10.1007/s11042-022-12330-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12330-3