DOI QR코드

DOI QR Code

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

  • Received : 2021.07.05
  • Published : 2021.07.30

Abstract

The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.

Keywords

References

  1. A. Verma and V. Ranga, "Machine Learning Based Intrusion Detection Systems for IoT Applications," Wirel. Pers. Commun., vol. 111, no. 4, pp. 2287-2310, 2020. https://doi.org/10.1007/s11277-019-06986-8
  2. J. Li, Z. Zhao, R. Li, and H. Zhang, "AI-based two-stage intrusion detection for software defined IoT networks," IEEE Internet Things J., vol. 6, no. 2, pp. 2093-2102, 2019. https://doi.org/10.1109/jiot.2018.2883344
  3. S. Anindita, S. R. Chatterjee, and M. Chakraborty, "Role of Cryptography in Network Security," in The "Essence" of Network Security: An End-to-End Panorama, 2021, pp. 103-143.
  4. A. V. Elijah, A. Abdullah, N. Z. JhanJhi, M. Supramaniam, B. A. O, and O. Balogun Abdullateef, "Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 9, pp. 520-528, 2019.
  5. Y. A. Alsariera, V. E. Adeyemo, A. O. Balogun, and A. K. Alazzawi, "AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites," IEEE Access, vol. 8, no. August, pp. 142532-142542, 2020. https://doi.org/10.1109/ACCESS.2020.3013699
  6. A. Alsadhan et al., "Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks," Trans. Emerg. Telecommun. Technol., no. June, pp. 1-15, 2019.
  7. F. Feng, X. Liu, B. Yong, R. Zhou, and Q. Zhou, "Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device," Ad Hoc Networks, vol. 84, pp. 82-89, 2019. https://doi.org/10.1016/j.adhoc.2018.09.014
  8. Y. Xin et al., "Machine Learning and Deep Learning Methods for Cybersecurity," IEEE Access, vol. 6, pp. 35365-35381, 2018. https://doi.org/10.1109/ACCESS.2018.2836950
  9. M. Nawir, A. Amir, N. Yaakob, and O. N. G. B. I. Lynn, "Multi-Classification of Unsw-Nb15 Dataset for Network Anomaly Detection System," J. Theor. Appl. Inf. Technol., vol. 96, no. 15, pp. 5094-5104, 2018.
  10. T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, "Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments," Proc. - 4th IEEE Int. Conf. Cyber Secur. Cloud Comput. CSCloud 2017 3rd IEEE Int. Conf. Scalable Smart Cloud, SSC 2017, pp. 97-103, 2017.
  11. V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami, "An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset," Cluster Comput., vol. 23, no. 2, pp. 1397-1418, 2020. https://doi.org/10.1007/s10586-019-03008-x
  12. O. O. Olasehinde, "A Stacked Ensemble Intrusion Detection Approach for the Protection of Information System," Int. J. Infomation Secur. Res., vol. 10, no. 1, pp. 910-923, 2020. https://doi.org/10.20533/ijisr.2042.4639.2020.0105
  13. Y. A. Alsariera, "Detecting Generic Network Intrusion Attacks using Tree-based Machine Learning Methods," Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 2, pp. 597-603, 2021.
  14. N. Moustafa and J. Slay, "UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings IEEE, 2015, pp. 1-6.
  15. T. Hamed, J. B. Ernst, and S. C. Kremer, "A Survey and Taxonomy of Classifiers of Intrusion Detection Systems," 2018, pp. 21-39.
  16. S. Lee and C. H. Jun, "Fast incremental learning of logistic model tree using least angle regression," Expert Syst. Appl., vol. 97, pp. 137-145, 2018. https://doi.org/10.1016/j.eswa.2017.12.014
  17. T. D. Pham, D. T. Bui, K. Yoshino, and N. N. Le, "Optimized rule-based logistic model tree algorithm for mapping mangrove species using ALOS PALSAR imagery and GIS in the tropical region," Environ. Earth Sci., vol. 77, no. 5, p. 159, 2018. https://doi.org/10.1007/s12665-018-7373-y
  18. R. Kohavi, "Scaling Up the Accuracy of Naive-Bayes Classi ers : a Decision-Tree Hybrid Accuracy Scale-Up : the Learning," Kdd, vol. 96, pp. 202-207, 1996.
  19. N. Landwehr, M. Hall, and E. Frank, "Logistic model trees," Mach. Learn., vol. 59, no. 1-2, pp. 161-205, 2005. https://doi.org/10.1007/s10994-005-0466-3
  20. Y. A. Alsariera, A. V. Elijah, and A. O. Balogun, "Phishing Website Detection: Forest by Penalizing Attributes Algorithm and Its Enhanced Variations," Arab. J. Sci. Eng., vol. 45, no. 12, pp. 10459-10470, 2020. https://doi.org/10.1007/s13369-020-04802-1
  21. Y. A. Alsariera, "Detecting Generic Network Intrusion Attacks using Tree-based Machine Learning Methods," Inter. J. of Adv. Comp. & Science and Applications., vol. 12, no. 2, pp. 597-603, 2021.