Skip to main content
Log in

2-layer classification model with correlated common feature selection for intrusion detection system in networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The proliferation of wireless networks as a primary data transmission channel has brought about a surge in data volume but also raised security threats and privacy concerns. Intrusion Detection Systems (IDS) have proven effective in safeguarding data transmission, yet they struggle to detect minor or rare attacks that mimic normal traffic. To address this challenge, we propose a novel two-layer classification model integrating K-nearest neighbor (KNN) and support vector machines (SVMs). In the first layer, KNN classifies data into Normal, Major, and Minor Attack categories, while the second layer further distinguishes Major Attacks into DoS or Probe and Minor Attacks into U2R or R2. Our framework incorporates Common Correlated Feature Selection (CCFS) to optimize feature discrimination, partitioning training data into three groups. Furthermore, we explore data preprocessing techniques to enhance data interpretation and maintain statistical normalcy in traffic connection features. Our experimental analysis utilizes the NSL-KDD dataset, demonstrating that our approach significantly improves detection rates, particularly for Minor Attacks, achieving a remarkable 92.33% detection rate for U2R and 91.33% for R2L attacks. This represents a substantial 10% enhancement over existing methods, outperforming Multi-Layer Perceptron (MLP) by 13.23%, Random Forest (RF) by 10.11%, J48- Decision Tree (DT) by 9.23%, and Naïve Bayes (NB) by 9.42% and 8.17% in terms of detection rates. These results underscore the effectiveness of our approach in enhancing intrusion detection performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Eddermoug N, Mansour A, Sadik, M, Sabir E and Azmi M (2019) Klm-PPSA: Klm-based profiling and preventing security attacks for cloud environments. In 2019 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE 1–7

  2. Eddermoug N, Mansour A, Sadik M, Sabir E,  Azmi M (2021) KLM-based profiling and preventing security attacks for cloud computing: A comparative study. In 2021 28th International Conference on Telecommunications (ICT). IEEE 1–6

  3. Abusitta A, Bellaiche M, Dagenais M (2018) A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments. In 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN). IEEE 1–8

  4. Cirillo S, Desiato D, Scalera M, Solimando G (2023) A visual privacy tool to help users in preserving social network data

  5. Resende PAA, Drummond AC (2019) A survey of random forest based methods for intrusion detection systems. ACM Comput Surv 51(3):1–36

    Article  Google Scholar 

  6. Hasson and Timothy. Bad BOT report 2021. Available: https://www.imperva.com/blog/bad-bot-report-2021-the-pandemic-of-the-internet/

  7. Aburomman AA, Reaz MBI (2017) A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput Secur 65:135–152

    Article  Google Scholar 

  8. Pacheco F, Exposito E, Gineste M, Baudoin C, Aguilar J (2019) Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun Surveys Tuts 21(2):1988–2014

    Article  Google Scholar 

  9. I. A. N. Authority. Protocol ASSIGNMENTS. Available: https://www.iana.org/protocols

  10. Erlacher F, Dressler F (2022) On high-speed flow-based intrusion detection using snort-compatible signatures. IEEE Trans Dependable Secure Comput 19(1):495–506

    Article  Google Scholar 

  11. Ahmad Z, Khan AS, Shiang CW, Abdullah J, Ahmad F (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32(1):e4150

    Article  Google Scholar 

  12. Krishnan N, Salim A (2018) Machine learning based intrusion detection for virtualized infrastructures. In 2018 International CET Conference on Control, Communication, and Computing (IC4). IEEE 366–371

  13. Sharma S, Zavarsky P, Butakov S (2020) Machine learning based intrusion detection system for web-based attacks. In 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE 227–230

  14. Ahmad I, Basheri M, Iqbal MJ, Raheem A (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33789–33795

    Article  Google Scholar 

  15. Vinayakumar R, Alazab M, Soman K, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550

    Article  Google Scholar 

  16. Li W, Yi P, Wu Y, Pan L, Li J (2014) A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J Electr Comput Eng 2014:1–8

    Google Scholar 

  17. Zhang B, Liu Z, Jia Y, Ren J, Zhao X (2018) Network intrusion detection method based on PCA and Bayes algorithm. Secur Commun Netw 2018:1–11

    Google Scholar 

  18. Zhang Y, Yang Q, Lambotharan S, Kyriakopoulos K, Ghafir I, AsSadhan B (2019) Anomaly-based network intrusion detection using SVM. In 2019 11th International conference on wireless communications and signal processing (WCSP). IEEE 1–6

  19. Sahu S, Mehtre BM (2015) Network intrusion detection system using J48 Decision Tree. In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE  2023–2026

  20. Fouladi RF, Kayatas CE, Anarim E (2016) Frequency based DDoS attack detection approach using naive Bayes classification. In 2016 39th International Conference on Telecommunications and Signal Processing (TSP). IEEE 104–107

  21. Li M (2017) Application of CART decision tree combined with PCA algorithm in intrusion detection. In 2017 8th IEEE international conference on software engineering and service science (ICSESS). IEEE 38–41

  22. Sukumar JA, Pranav I, Neetish MM, Narayanan J (2018) Network intrusion detection using improved genetic k-means algorithm. In 2018 international conference on advances in computing, communications and informatics (ICACCI). IEEE 2441–2446 

  23. Khalid S, Khalil T, Nasreen S (2014) A survey of feature selection and feature extraction techniques in machine learning. In 2014 science and information conference. IEEE 372–378

  24. Thaseen IS, Kumar CA (2016) Intrusion detection model using fusion of chi-square feature selection and multi class SVM. J King Saud Univ-Comput Inf Sci 29(4):462–472

    Google Scholar 

  25. Yao H, Wang Q, Wang L, Zhang P, Li M, Liu Y (2019) An intrusion detection framework based on hybrid multi-level data mining. Int J Parallel Program 47(4):740–758

    Article  Google Scholar 

  26. Li G, Yan Z, Fu Y, Chen H (2018) Data fusion for network intrusion detection: a review. Secur Commun Netw 2018:1–16

    Google Scholar 

  27. Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160

    Article  Google Scholar 

  28. Jiang K, Wang W, Wang A, Wu H (2020) Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8:32464–32476

    Article  Google Scholar 

  29. Mazini M, Shirazi B, Mahdavi I (2019) Anomaly network-based intrusion detection system using a reliable hybrid arti_cial bee colony and Adaboost algorithms. J King Saud Univ Comput Inf Sci 31(4):541–553

    Google Scholar 

  30. Çavuşoğlu Ü (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49(7):2735–2761

    Article  Google Scholar 

  31. Pajouh HH, Dastghaibyfard G, Hashemi S (2017) Two-tier network anomaly detection model: A machine learning approach. J Intell Inf Syst 48(1):61–74

    Article  Google Scholar 

  32. Tama BA, Comuzzi M, Rhee K (2019) TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7:94497–94507

    Article  Google Scholar 

  33. Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512–82521

    Article  Google Scholar 

  34. Li L, Yu Y, Bai S, Hou Y, Chen X (2018) An effective two-step intrusion detection approach based on binary classification and KNN. IEEE Access 6:12060–12073

    Article  Google Scholar 

  35. Ieracitano C, Adeel A, Morabito FC, Hussain A (2020) A novel statistical analysis and auto-encoder driven intelligent intrusion detection approach. Neurocomputing 387:51–62

    Article  Google Scholar 

  36. Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inf Secur Appl 44:80–88

    Google Scholar 

  37. Golrang A, Golrang AM, YildrimYayilgan S, Elezaj O (2020) A novel hybrid IDS based on modified NSGAII-ANN and random forest. Electronics 9(4):577

    Article  Google Scholar 

  38. Liu C, Gu Z, Wang J (2021) A hybrid intrusion detection system based on scalable K-means+ random forest and deep learning. IEEE Access 9:75729–75740

    Article  Google Scholar 

  39. Zhao R, Yingxue M, Zou L, Wen X (2022) A hybrid intrusion detection system based on feature selection and weighted stacking classifier. IEEE Access 10:71414–71426

    Article  Google Scholar 

  40. Chkirbene Z, Erbad A, Hamila R, Mohamed A, Guizani M, Hamdi M (2020) TIDCS: a dynamic intrusion detection and classification system based feature selection. IEEE Access 8:95864–95877

    Article  Google Scholar 

  41. Sarvari S, Mohd Sani NF, Hanapi ZM, Abdullah MT (2020) An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access 8:70651–70663

    Article  Google Scholar 

  42. Stiawan D, Heryanto A, Bardadi A, PalupiRini D, Subroto IMI, Kurniabudi, Idris MYB, Abdullah AH, Kerim B, Budiarto R (2021) An approach for optimizing ensemble intrusion detection systems. IEEE Access 9:6930–6947

    Article  Google Scholar 

  43. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE 1–6 

  44. Revathi S, Malathi A (2013) A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int J Eng Res Technol 2(12):1848–1853

    Google Scholar 

  45. Sugumaran VR, Rajaram A Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs. Journal of Intelligent & Fuzzy Systems, (Preprint) 1–16

  46. Arulselvan G, Rajaram A (2023) Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs. Journal of Intelligent & Fuzzy Systems, (Preprint) 1–16

  47. Ilakkiya N, Rajaram A (2023) Blockchain-assisted secure routing protocol for cluster-based mobile-ad hoc networks. Int J Comput Commun Control 18(2):1

    Article  Google Scholar 

  48. Rathish CR, Rajaram A (2018) Sweeping inclusive connectivity based routing in wireless sensor networks. ARPN J Eng Appl Sci 3(5):1752–1760

    Google Scholar 

Download references

Acknowledgements

There is no acknowledgement involved in this work.

Funding

No funding is involved in this work.

Author information

Authors and Affiliations

Authors

Contributions

All authors are contributed equally to this work.

Corresponding author

Correspondence to Sridhar Patthi.

Ethics declarations

Ethics approval and consent to participate

No participation of humans takes place in this implementation process.

Conflict of interest

Conflict of Interest is not applicable in this work.

Human and animal rights

No violation of Human and Animal Rights is involved.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Patthi, S., Singh, S. & P, I.C.K. 2-layer classification model with correlated common feature selection for intrusion detection system in networks. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-023-17781-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-023-17781-w

Keywords

Navigation