| Electronics | |
| Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine | |
| Ansam Khraisat1  Ammar Alazab1  Iqbal Gondal1  Joarder Kamruzzaman1  Peter Vamplew1  | |
| [1] Internet Commerce Security Laboratory, Federation University Australia, Mount Helen 3350, Australia; | |
| 关键词: anomaly detection; hybrid approach; c5.0 decision tree; cyber analytics; data mining; machine learning; zero-day malware; intrusion; intrusion detection system; | |
| DOI : 10.3390/electronics9010173 | |
| 来源: DOAJ | |
【 摘 要 】
Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion detection mechanisms to monitor computer resources and generate reports on anomalous or suspicious activities. Many Intrusion Detection Systems (IDSs) use a single classifier for identifying intrusions. Single classifier IDSs are unable to achieve high accuracy and low false alarm rates due to polymorphic, metamorphic, and zero-day behaviors of malware. In this paper, a Hybrid IDS (HIDS) is proposed by combining the C5 decision tree classifier and One Class Support Vector Machine (OC-SVM). HIDS combines the strengths of SIDS) and Anomaly-based Intrusion Detection System (AIDS). The SIDS was developed based on the C5.0 Decision tree classifier and AIDS was developed based on the one-class Support Vector Machine (SVM). This framework aims to identify both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the benchmark datasets, namely, Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) and Australian Defence Force Academy (ADFA) datasets. Studies show that the performance of HIDS is enhanced, compared to SIDS and AIDS in terms of detection rate and low false-alarm rates.
【 授权许可】
Unknown