Skip to main content
Log in

Intelligent intrusion detection based on fuzzy Big Data classification

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

To cope with the rapid evolution of various attacks and the computer networks’ increase, an intelligent intrusion detection system is considered as a promising emerging technique for the security of computer networks. Individual classification approaches have not provided complete protection. Indeed, it has been shown that none of them is efficient enough to provide good detection rates and reduce the false alarms rates. In previous works, a comparative study was conducted between the neuro-fuzzy and the genetic-fuzzy approaches. In this study, a hybrid approach is proposed based on the stacking scheme. This approach offers a solution to combine the two basic classifiers in order to take advantage of each one of them. The experimental results have shown the effectiveness of the proposed approach in terms of maximizing the detection rates and reducing the false alarm rates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

The datasets generated during and/or analyzed during the current study are available from the author.

References

  1. Zhang, Y., Li, P., Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019)

    Article  Google Scholar 

  2. Alazzam, H., Alsmady, A., Shorman, A.A.: Supervised detection of iot botnet attacks. In: Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems, pp. 1–6 (2019)

  3. Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. 45, 100–123 (2014)

    Article  Google Scholar 

  4. Alieyan, K., Almomani, A., Manasrah, A., Kadhum, M.M.: A survey of botnet detection based on dns. Neural Comput. Appl. 28(7), 1541–1558 (2017)

    Article  Google Scholar 

  5. Garasia, S., Rana, D., Mehta, R.: Http botnet detection using frequent pattern set mining. Int. J. Eng. Sci. Adv. Technol. (IJESAT) 3, 619–624 (2012)

    Google Scholar 

  6. Mondher, E., Jemili, F.: Combining intrusion detection datasets using MapReduce. In: Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). https://doi.org/10.1109/SMC.2016.7844977 (2016)

  7. Adeyemo, V.E., Abdullah, A., JhanJhi, N.Z., Supramaniam, M., Balogun, A.O.: Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. Int. J. Adv. Comput. Sci. Appl. (2019). https://doi.org/10.14569/IJACSA.2019.0100969

    Article  Google Scholar 

  8. Alauthaman, M., Aslam, N., Zhang, L., Alasem, R., Hossain, M.A.: A p2p botnet detection scheme based on decision tree and adaptive multilayer neural networks. Neural Comput. Appl. (2016). https://doi.org/10.1007/s00521-016-2564-5

    Article  Google Scholar 

  9. Kirubavathi, G., Anitha, R.: Botnet detection via mining of traffic flow characteristics. Comput. Electr. Eng. 50, 91–101 (2016)

    Article  Google Scholar 

  10. Kozik, R., Choras, M.: Pattern extraction algorithm for netflow-based botnet activities detection. Secur. Commun. Netw. 2017, 10 (2017). https://doi.org/10.1155/2017/6047053

    Article  Google Scholar 

  11. Ye, W., Cho, K.: P2p and p2p botnet traffic classification in two stages. Soft Comput. 21(5), 1315–1326 (2017)

    Article  Google Scholar 

  12. Gaied, I., Jemili, F., Korbaa, O.: Intrusion detection based on neuro-fuzzy classification. In: Proceedings of the IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), Marrakech (2015)

  13. Gaied, I., Jemili, F., Korbaa, O.: A genetic fuzzy classification approach to improve high-dimensional intrusion detection system. In: Proceedings of the 16th International Conference on Intelligent Systems Design and Applications, Porto (2016)

  14. Gaied, I., Jemili, F., Korbaa, O.: Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: comparative study. In: Proceedings of the 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2017), split (2017)

  15. Elhag, S., Fernandez, A., Bawakid, A., Alshomrani, S., Herrera, F.: On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst. Appl. 42(1), 193–202 (2015)

    Article  Google Scholar 

  16. Huang, J.: International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), IEEE, 12–14 June (2020)

  17. Gaikwad, D., Thool, R.C.: Intrusion detection system using bagging with partial decision tree base classifier. Procedia Comput. Sci. 49, 92–98 (2015)

    Article  Google Scholar 

  18. Bisht, N., Ahmad, A., Bisht, S.: Application of feature selection methods and ensembles on network security dataset. Int. J. Comput. Appl. 135(1–5), 11 (2016)

    Google Scholar 

  19. Prusti, D.: Efficient intrusion detection model using ensemble methods. PhD thesis (2015)

  20. Revanth, B.: Hybrid intelligent intrusion detection system using bayesian and genetic algorithm (baga): comparitive study. Int. J. Comput. Appl. 99(2), 1–8 (2014)

    Google Scholar 

  21. Meng, Y., Kwok, L.-F.: Enhancing false alarm reduction using voted ensemble selection in intrusion detection. Int. J. Comput. Intell. Syst. 6(4), 626–638 (2013)

    Article  Google Scholar 

  22. Govindarajan, M., Chandrasekaran, R.: Intrusion detection using an ensemble of classification methods. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 1, pp. 459–464 (2012)

  23. Amini, M., Rezaeenour, J., Hadavandi, E.: A neural network ensemble classifier for effective intrusion detection using fuzzy clustering and radial basis function networks. Int. J. Artif. Intell. Tools 25(02), 1–32 (2016)

    Article  Google Scholar 

  24. Pan, J.S., Shan, J., Zheng, S.G., et al.: Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm. Clust. Comput. 24, 2083–2098 (2021). https://doi.org/10.1007/s10586-021-03247-x

    Article  Google Scholar 

  25. Alani, M.M.: Big data in cybersecurity: a survey of applications and future trends. J. Reliab. Intell. Environ. 7(2), 85–114 (2021)

    Article  Google Scholar 

  26. Sesmero, M.P., Ledezma, A.I., Sanchis, A.: Generating ensembles of heterogeneous classifiers using stacked generalization. Wiley Interdiscip. Rev. 5(1), 21–34 (2015)

    Google Scholar 

  27. Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., Alsaadi, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234, 11–26 (2017)

    Article  Google Scholar 

  28. Abdulrahaman, M.D., Alhassan, J.K.: Ensemble learning approach for the enhancement of performance of intrusion detection system. In: Proceedings of the International Conference on Information and Communication Technology and its Applications (ICTA), pp. 1– 8 (2018)

  29. El Motaki, S., Yahyaouy, A., Gualous, H., et al.: A new weighted fuzzy C-means clustering for workload monitoring in cloud datacenter platforms. Clust. Comput. 24, 3367–3379 (2021). https://doi.org/10.1007/s10586-021-03331-2

    Article  Google Scholar 

  30. Fernandez, A., Calderon, M., Barrenechea, E., Bustince, H., Herrera, F.: Solving multi-class problems with linguistic fuzzy rule based classification systems based on pairwise learning and preference relations. Fuzzy Sets Syst. 161(23), 3064–3080 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  31. Guo, C., Ping, Y., Liu, N., Luo, S.S.: A two-level hybrid approach for intrusion detection. Neurocomputing 214, 391–400 (2016)

    Article  Google Scholar 

  32. Microsoft. Azure Regions. https://azure.microsoft.com/en-us/global-infrastructure/regions/

  33. Mllib Evaluation Metrics. https://spark.apache.org/docs/2.1.0/mllib-evaluation-metrics.html

  34. Premasundari, M., Yamini, C.: A violent crime analysis using fuzzy C-means clustering approach, 6956 (2019)

  35. Belhor, M., Jemili, F.: Intrusion detection based on genetic fuzzy classification system. In: Proceedings of the 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA. https://doi.org/10.1109/AICCSA.2016.7945690 (2016)

  36. Hafsa, M., Jemili, F.: Comparative study between big data analysis techniques in intrusion detection. Big Data Cognit. Comput. 3(1), 1 (2018). https://doi.org/10.3390/bdcc3010001

    Article  Google Scholar 

  37. Panda, M., Abd Allah, A.M., Hassanien, A.E.: Developing an efficient feature engineering and machine learning model for detecting IoT-Botnet cyber attacks. IEEE Access 9, 91038–91052 (2021)

    Article  Google Scholar 

  38. Nauck, D., Kruse, R.: A neuro-fuzzy method to learn fuzzy classification rules from data. Fuzzy Sets Syst. 89(3), 277–288 (1997)

    Article  MathSciNet  Google Scholar 

  39. Krishnaveni, S., Sivamohan, S., Sridhar, S.S., et al.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Clust. Comput. 24, 1761–1779 (2021). https://doi.org/10.1007/s10586-020-03222-y

    Article  Google Scholar 

  40. Garcia, S.: Dataset ctu-13, web page, Tech. rep. https://stratosphereips.org/category/dataset.html (2015)

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farah Jemili.

Ethics declarations

Conflict of interest

The author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jemili, F. Intelligent intrusion detection based on fuzzy Big Data classification. Cluster Comput 26, 3719–3736 (2023). https://doi.org/10.1007/s10586-022-03769-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03769-y

Keywords

Navigation