Enhanced anomaly detection in network security: a comprehensive ensemble approach
https://doi.org/10.17586/2226-1494-2024-24-5-788-796
Abstract
Detection and handling of anomalous behavior in the network systems are peremptory efforts to ensure security for vulnerable infrastructures amidst the dynamic context of cybersecurity. In this paper, we propose an ensemble machine learning model architecture that leverages the strengths of XGBoost, Gradient Boosting, Random Forest, and Support Vector Machine models to identify anomalies in the dataset. This method utilizes an ensemble of these models with weighted voting based on accuracy to enhance anomaly detection for robust and adaptive real-world network security. The proposed ensemble learning model is evaluated on standard metrics and demonstrates exceptional efficacy, achieving an impressive accuracy of 99.68 % on NSL KDD dataset. This remarkable performance extends the model prowess in discerning anomalies within network traffic showcasing its potential as a robust tool for enhancing cybersecurity measures against evolving threats.
About the Authors
R. PandeyRussian Federation
Rashmikiran Pandey - PhD Student
Moscow region, Dolgoprudny, 141701
M. Pandey
Russian Federation
Mrinal Pandey - PhD Student, Moscow Institute of Physics and Technology (National Research University)
Moscow region, Dolgoprudny, 141701
A. N. Nazarov
Russian Federation
Alexey N. Nazarov - D.Sc., Professor
Moscow, 119333
References
1. Reichenbach M. New challenges in electronic payments // Intelligent Enterprises of the 21st Century / ed. by J.N.D. Gupta, S. Sharma. IGI Global, 2004. P. 153–162. https://doi.org/10.4018/9781591401605.ch010
2. Kebande V.R., Karie N.M., Ikuesan R.A. Real-time monitoring as a supplementary security component of vigilantism in modern network environments // International Journal of Information Technology. 2021. V. 13. N 1. P. 5–17. https://doi.org/10.1007/s41870-020-00585-8
3. Hareesh R., Senthil Kumar R.K., Kalluri R., Bindhumadhava B.S. Critical infrastructure asset discovery and monitoring for cyber security // Lecture Notes in Electrical Engineering. 2022. V. 847. P. 289–300. https://doi.org/10.1007/978-981-16-9008-2_27
4. Savage D., Zhang X., Yu X., Chou P., Wang Q. Anomaly detection in online social networks // Social Networks. 2014. V. 39. P. 62–70. https://doi.org/10.1016/j.socnet.2014.05.002
5. Benaddi H., Ibrahimi K., Benslimane A. Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN // Proc. of the 6th International Conference on Wireless Networks and Mobile Communications (WINCOM). 2018. P. 1–6. https://doi.org/10.1109/wincom.2018.8629718
6. Su T., Sun H., Zhu J., Wang S., Li Y. BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset // IEEE Access. 2020. V. 8. P. 29575–29585. https://doi.org/10.1109/access.2020.2972627
7. Wang C., Zhou H., Hao Z., Hu S., Li J., Zhang X., Jiang B., Chen X. Network traffic analysis over clustering-based collective anomaly detection // Computer Networks. 2022. V. 205. P. 108760. https://doi.org/10.1016/j.comnet.2022.108760
8. Keim Y., Mohapatra A.K. Cyber threat intelligence framework using advanced malware forensics // International Journal of Information Technology. 2022. V. 14. N 1. P. 521–530. https://doi.org/10.1007/s41870-019-00280-3
9. Xu B., Jang-Jaccard J., Singh A., Wei Y., Sabrina F. Improving performance of autoencoder-based network anomaly detection on nsl-kdd dataset // IEEE Access. 2021. V. 9. P. 140136–140146. https:// doi.org/10.1109/access.2021.3116612
10. Shone N., Ngoc T.N., Phai V.D., Shi Q. A deep learning approach to network intrusion detection // IEEE Transactions on Emerging Topics in Computational Intelligence. 2018. V. 2. N 1. P. 41–50. https://doi.org/10.1109/tetci.2017.2772792
11. Sharma B., Sharma L., Lal C. Anomaly based network intrusion detection for IoT attacks using convolution neural network // Proc. of the IEEE 7th International Conference for Convergence in Technology (I2CT). 2022. P. 1–6. https://doi.org/10.1109/i2ct54291.2022.9824229
12. Krzemień W., Jędrasiak K., Nawrat A. Anomaly detection in software defined networks using ensemble learning // Lecture Notes in Networks and Systems. 2022. V. 439. P. 629–643. https://doi.org/10.1007/978-3-030-98015-3_44
13. Staudemeyer R.C. Applying long short-term memory recurrent neural networks to intrusion detection // South African Computer Journal. 2015. V. 56. P. 136–154. https://doi.org/10.18489/sacj.v56i1.248
14. Kim J., Kim J., Thu H.L.T., Kim H. Long short term memory recurrent neural network classifier for intrusion detection // Proc. of the International Conference on Platform Technology and Service (PlatCon). 2016. P. 1–5. https://doi.org/10.1109/platcon.2016.7456805
15. Liu Z., Thapa N., Shaver A., Roy K., Yuan X., Khorsandroo S. Anomaly detection on IoT network intrusion using machine learning // Proc. of the International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (ICABCD). 2020. P. 1–5. https://doi.org/10.1109/icabcd49160.2020.9183842
16. Khan W., Haroon M. An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks // International Journal of Cognitive Computing in Engineering. 2022. V. 3. P. 153–160. https://doi.org/10.1016/j.ijcce.2022.08.002
17. Gupta K., Sharma D.K., Gupta K.D., Kumar A. A tree classifier based network intrusion detection model for Internet of Medical Things // Computers and Electrical Engineering. 2022. V. 102. P. 108158. https://doi.org/10.1016/j.compeleceng.2022.108158
18. Ma Q., Sun C., Cui B. A novel model for anomaly detection in network traffic based on support vector machine and clustering // Security and Communication Networks. 2021. P. 170788. https://doi.org/10.1155/2021/2170788
19. Iliyasu A.S., Deng H. N-GAN: a novel anomaly-based network intrusion detection with generative adversarial networks // International Journal of Information Technology. 2022. V. 14. N 7. P. 3365–3375. https://doi.org/10.1007/s41870-022-00910-3
20. Tavallaee M., Bagheri E., Lu W., Ghorbani A.A. A detailed analysis of the KDD CUP 99 data set // Proc. of the IEEE Symposium on Computational Intelligence for Security and Defense Applications. 2009. P. 1–6. https://doi.org/10.1109/cisda.2009.5356528
21. Panesar A. Evaluating machine learning models // Machine Learning and AI for Healthcare. Apress, Berkeley, CA, 2021. P. 189–205. https://doi.org/10.1007/978-1-4842-6537-6_7
22. Assy A.T., Mostafa Y., Abd El-khaleq A., Mashaly M. Anomaly-based intrusion detection system using one-dimensional convolutional neural network // Procedia Computer Science. 2023. V. 220. P. 78–85. https://doi.org/10.1016/j.procs.2023.03.013
23. Acharya T., Annamalai A., Chouikha M.F. Efficacy of bidirectional LSTM model for network-based anomaly detection // Proc. of the IEEE 13th Symposium on Computer Applications & Industrial Electronics (ISCAIE). 2023. P. 336–341. https://doi.org/10.1109/iscaie57739.2023.10165336
24. Kavitha S., Uma Maheswari N., Venkatesh R. Network anomaly detection for NSL-KDD dataset using deep learning // Information Technology in Industry. 2021. V. 9. N 2. P. 821–827. https://doi.org/10.17762/itii.v9i2.419
25. Gadal S., Mokhtar R., Abdelhaq M., Alsaqour R., Ali E.S., Saeed R. Machine learning-based anomaly detection using K-mean array and sequential minimal optimization // Electronics. 2022. V. 11. N 14. P. 2158. https://doi.org/10.3390/electronics11142158
Review
For citations:
Pandey R., Pandey M., Nazarov A.N. Enhanced anomaly detection in network security: a comprehensive ensemble approach. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2024;24(5):788-796. https://doi.org/10.17586/2226-1494-2024-24-5-788-796