Evaluating the Impact of Different Feature as a Counter Data Aggregation approaches on the Performance of NIDSs and Their Selected Features

Author:

Magán-Carrión Roberto1,Urda Daniel2,Diaz-Cano Ignacio3,Dorronsoro Bernabé4

Affiliation:

1. Network Engineering & Security Group , Department of Signal Theory, Communications and Telematics, CITIC-University of Granada, 18014, Granada, Spain , rmagan@ugr.es

2. Grupo de Inteligencia Computacional Aplicada (GICAP) , Departamento de Digitalización, Escuela Politécnica Superior, Universidad de Burgos, Av. Cantabria s/n, 09006, Burgos, Spain , durda@ubu.es

3. Applied Robotics Group , Department of Automatic, Electronic, Computer Architecture and Com. Net. Engineering, University of Cádiz, 11519, Puerto Real, Cádiz, Spain , ignacio.diaz@uca.es

4. Graphical Methods , Optimization & Learning (GOAL) Group, Department of Computer Engineering, University of Cádiz, 11519, Puerto Real, Cádiz, Spain; School of Computer Science, Faculty of Engineering, The University of Sydney, 2008, Darlington, NSW, Australia , bernabe.dorronsorodiaz@sydney.edu.au

Abstract

Abstract There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming network traffic raw data onto derived one suitable for ML models. In this work, we study the effects of applying one such FE technique in different ways on the performance of two ML models (linear and non-linear) and their selected features. This the Feature as a Counter approach. The derived observations are computed from either with the same number of raw samples, (batch-based approaches) or by aggregating them by time intervals (timestamp-based approach). Results show that there is no significant differences between the proposed approaches neither in the performance of the models nor in the selected features that validate our proposal making it feasible to be widely used as a standard FE method.

Publisher

Oxford University Press (OUP)

Reference36 articles.

1. Deep-intrusion detection system with enhanced unsw-nb15 dataset based on deep learning techniques;Aleesa;Journal of Engineering Science and Technology,2021

2. A systematic review of artificial intelligence and machine learning techniques for cyber security;Ali,2020

3. Performance evaluation of intrusion detection based on machine learning using Apache Spark;Belouch;Procedia Computer Science,2018

4. FCM: the fuzzy c-means clustering algorithm;Bezdek;Computers & Geosciences,1984

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3