Research Article
BibTex RIS Cite

USB-IDS-1 dataset feature reduction with genetic algorithm

Year 2024, , 26 - 44, 14.06.2024
https://doi.org/10.33769/aupse.1320795

Abstract

Technology and online opportunities brought by technology are increasing day by day. Many transactions, from banking to shopping, can be done online. However, the abuse of technology is also increasing at the same rate. Therefore, it is very important to ensure the security of the network for data protection. The application of artificial intelligence-based approaches has also become popular in the field of information security. When the data collected for intrusion detection is examined, it is seen that there are many features. In this study, the features in the USB-IDS-1 dataset were reduced by genetic algorithm and its success was examined with various classifiers. Among the selected methods, there are decision trees, random forest, k-NN, Naive Bayes and artificial neural networks. Accuracy, sensitivity, precision and F1-score were used as metrics. According to the results obtained, it was seen that the genetic algorithm was quite successful in the Hulk and Slowloris data set, it was partially effective in the Slowhttptest data, but was not successful in the TCP set. However, the performance of the algorithms was poor as a result of using all features in Slowhttptest and TCP data.

References

  • Kaplan, A., Haenlein, M., Siri, Siri, in my hand: Who's the fairest in the land? on the interpretations, illustrations, and implications of Artificial Intelligence, Bus. Horiz., 62 (1) (2019), 15-25, https://doi.org/10.1016/j.bushor.2018.08.004.
  • Samuel, A. L., Some studies in machine learning using the game of checkers, IBM J. Res. Dev., 3 (3) (1959), 210-229, https://doi.org/10.1147/rd.33.0210.
  • Aburomman, A. A., Reaz, M. B. I., Ensemble of binary SVM classifiers based on PCAand LDA feature extraction for intrusion detection, Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), (2016), 636-640.
  • Al-Jarrah, O. Y., Al-Hammdi, Y., Yoo, P. D., Muhaidat, S., Al-Qutayri, M. Semisupervised multi-layered clustering model for intrusion detection, Digit. Commun. Netw., 4 (4) (2018), 277-286.
  • Al-Yaseen, W. L., Othman, Z. A., Nazri, M. Z. A. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system, Expert Syst. Appl., 67 (1) (2017), 296-303.
  • An, X., Su, J., Lü, X., Lin, F., Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system, EURASIP JWCN, 249 (1) (2018), 1-9.
  • Belavagi, M. C., Muniyal, B., Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Comput. Sci., 89 (1) (2016), 117-123.
  • KDD, The 1999 KDD intrusion detection, 1999, http://kdd.ics.uci.edu/databases/kddcup99/task.html.
  • Hick, P., Aben, E., Claffy, K., Polterock, J., The CAIDA DDoS attack 2007 dataset, 2007.
  • Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A. A., A detailed analysis of the KDD CUP 99 data set, in 2009 CISDA, (2009), 1-6.
  • Catillo, M., Del Vecchio, A., Ocone, L., Pecchia, A., Villano, U., USB-IDS-1: a public multilayer dataset of labeled network flows for IDS evaluation, 51st Annual IEEE/IFIP DSN-W, (2021), 1-6, https://doi.org/10.1109/DSN-W52860.2021.00012.
  • Holland, J. H., Genetic algorithms, Sci. Am., 267 (1) (1992), 66-73.
  • Catillo, M., Pecchia, A., Villano, U., Measurement-based analysis of a DoS defense module for an open source web server, Testing Software and Systems: 32nd IFIP WG 6.1 International Conference, ICTSS, (2020), 121-134.
  • Catillo, M., Del Vecchio, A., Pecchia, A., Villano, U., Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study, Softw. Qual. J., (2022), 1-27.
  • Kalutharage, C. S., Liu, X., Chrysoulas, C., Explainable AI and deep autoencoders based security framework for IoT network attack certainty, Lect. Notes Comput. Sci., (2022), 13745, https://doi.org/10.1007/978-3-031-21311-3_8.
  • Russell, S. J., Norvig, P., Artificial Intelligence a Modern Approach, Pearson Education, Inc., New York, 2010.
  • Breiman, L., Random forests, Mach. Learn., 45 (2001), 5-32.
  • Cover, T., Hart, P., Nearest neighbor pattern classification, IEEE Trans. Inf. Theory, 13 (1) (1967), 21-27.
  • Li, X., Ye, N., Decision tree classifiers for computer intrusion detection, In Real-Time System Security, (2003), 77-93.
  • Ozsari, S., Uguz, H., Hakli, H., Implementation of meta-heuristic optimization algorithms for interview problem in land consolidation: A case study in Konya/Turkey, Land Use Policy, 108 (2021), 105511.
  • Google colab., (2023). Available: https://research.google.com/colaboratory/faq.html. [Accessed: May 2023].
  • Ozsari, S., Yapicioglu, F. R., Yilmaz, D., Kamburoglu, K., Guzel, M. S., Bostanci, G. E., Acici, K., Asuroglu, T., Interpretation of magnetic resonance images of temporomandibular joint disorders by using deep learning, IEEE Access, 11 (2023), 49102-49113, https://doi.org/10.1109/ACCESS.2023.3277756.
  • Kingma, D. P., Jimmy, Ba., Adam: a method for stochastic optimization, arXiv:1412.6980, 2014.
  • Kennedy, J., Eberhart, R., Particle swarm optimization, Proceedings of IEEE International Conference on Neural Networks, 4 (1995), 1942-1948, https://doi.org/10.1109/ICNN.1995.488968.
  • Karaboga, D., An idea based on honey bee swarm for numerical optimization, Technical Report-TR06, Erciyes University, Engineering Faculty, Computer Engineering Department, 2005.
Year 2024, , 26 - 44, 14.06.2024
https://doi.org/10.33769/aupse.1320795

Abstract

References

  • Kaplan, A., Haenlein, M., Siri, Siri, in my hand: Who's the fairest in the land? on the interpretations, illustrations, and implications of Artificial Intelligence, Bus. Horiz., 62 (1) (2019), 15-25, https://doi.org/10.1016/j.bushor.2018.08.004.
  • Samuel, A. L., Some studies in machine learning using the game of checkers, IBM J. Res. Dev., 3 (3) (1959), 210-229, https://doi.org/10.1147/rd.33.0210.
  • Aburomman, A. A., Reaz, M. B. I., Ensemble of binary SVM classifiers based on PCAand LDA feature extraction for intrusion detection, Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), (2016), 636-640.
  • Al-Jarrah, O. Y., Al-Hammdi, Y., Yoo, P. D., Muhaidat, S., Al-Qutayri, M. Semisupervised multi-layered clustering model for intrusion detection, Digit. Commun. Netw., 4 (4) (2018), 277-286.
  • Al-Yaseen, W. L., Othman, Z. A., Nazri, M. Z. A. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system, Expert Syst. Appl., 67 (1) (2017), 296-303.
  • An, X., Su, J., Lü, X., Lin, F., Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system, EURASIP JWCN, 249 (1) (2018), 1-9.
  • Belavagi, M. C., Muniyal, B., Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Comput. Sci., 89 (1) (2016), 117-123.
  • KDD, The 1999 KDD intrusion detection, 1999, http://kdd.ics.uci.edu/databases/kddcup99/task.html.
  • Hick, P., Aben, E., Claffy, K., Polterock, J., The CAIDA DDoS attack 2007 dataset, 2007.
  • Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A. A., A detailed analysis of the KDD CUP 99 data set, in 2009 CISDA, (2009), 1-6.
  • Catillo, M., Del Vecchio, A., Ocone, L., Pecchia, A., Villano, U., USB-IDS-1: a public multilayer dataset of labeled network flows for IDS evaluation, 51st Annual IEEE/IFIP DSN-W, (2021), 1-6, https://doi.org/10.1109/DSN-W52860.2021.00012.
  • Holland, J. H., Genetic algorithms, Sci. Am., 267 (1) (1992), 66-73.
  • Catillo, M., Pecchia, A., Villano, U., Measurement-based analysis of a DoS defense module for an open source web server, Testing Software and Systems: 32nd IFIP WG 6.1 International Conference, ICTSS, (2020), 121-134.
  • Catillo, M., Del Vecchio, A., Pecchia, A., Villano, U., Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study, Softw. Qual. J., (2022), 1-27.
  • Kalutharage, C. S., Liu, X., Chrysoulas, C., Explainable AI and deep autoencoders based security framework for IoT network attack certainty, Lect. Notes Comput. Sci., (2022), 13745, https://doi.org/10.1007/978-3-031-21311-3_8.
  • Russell, S. J., Norvig, P., Artificial Intelligence a Modern Approach, Pearson Education, Inc., New York, 2010.
  • Breiman, L., Random forests, Mach. Learn., 45 (2001), 5-32.
  • Cover, T., Hart, P., Nearest neighbor pattern classification, IEEE Trans. Inf. Theory, 13 (1) (1967), 21-27.
  • Li, X., Ye, N., Decision tree classifiers for computer intrusion detection, In Real-Time System Security, (2003), 77-93.
  • Ozsari, S., Uguz, H., Hakli, H., Implementation of meta-heuristic optimization algorithms for interview problem in land consolidation: A case study in Konya/Turkey, Land Use Policy, 108 (2021), 105511.
  • Google colab., (2023). Available: https://research.google.com/colaboratory/faq.html. [Accessed: May 2023].
  • Ozsari, S., Yapicioglu, F. R., Yilmaz, D., Kamburoglu, K., Guzel, M. S., Bostanci, G. E., Acici, K., Asuroglu, T., Interpretation of magnetic resonance images of temporomandibular joint disorders by using deep learning, IEEE Access, 11 (2023), 49102-49113, https://doi.org/10.1109/ACCESS.2023.3277756.
  • Kingma, D. P., Jimmy, Ba., Adam: a method for stochastic optimization, arXiv:1412.6980, 2014.
  • Kennedy, J., Eberhart, R., Particle swarm optimization, Proceedings of IEEE International Conference on Neural Networks, 4 (1995), 1942-1948, https://doi.org/10.1109/ICNN.1995.488968.
  • Karaboga, D., An idea based on honey bee swarm for numerical optimization, Technical Report-TR06, Erciyes University, Engineering Faculty, Computer Engineering Department, 2005.
There are 25 citations in total.

Details

Primary Language English
Subjects Information Security Management
Journal Section Research Articles
Authors

Mustafa Veysel Özsarı 0000-0002-1997-9971

Şifa Özsarı 0000-0002-0531-4645

Ayhan Aydın 0000-0001-7938-0509

Mehmet Serdar Güzel 0000-0002-3408-0083

Early Pub Date April 7, 2024
Publication Date June 14, 2024
Submission Date June 28, 2023
Acceptance Date August 31, 2023
Published in Issue Year 2024

Cite

APA Özsarı, M. V., Özsarı, Ş., Aydın, A., Güzel, M. S. (2024). USB-IDS-1 dataset feature reduction with genetic algorithm. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering, 66(1), 26-44. https://doi.org/10.33769/aupse.1320795
AMA Özsarı MV, Özsarı Ş, Aydın A, Güzel MS. USB-IDS-1 dataset feature reduction with genetic algorithm. Commun.Fac.Sci.Univ.Ank.Series A2-A3: Phys.Sci. and Eng. June 2024;66(1):26-44. doi:10.33769/aupse.1320795
Chicago Özsarı, Mustafa Veysel, Şifa Özsarı, Ayhan Aydın, and Mehmet Serdar Güzel. “USB-IDS-1 Dataset Feature Reduction With Genetic Algorithm”. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering 66, no. 1 (June 2024): 26-44. https://doi.org/10.33769/aupse.1320795.
EndNote Özsarı MV, Özsarı Ş, Aydın A, Güzel MS (June 1, 2024) USB-IDS-1 dataset feature reduction with genetic algorithm. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering 66 1 26–44.
IEEE M. V. Özsarı, Ş. Özsarı, A. Aydın, and M. S. Güzel, “USB-IDS-1 dataset feature reduction with genetic algorithm”, Commun.Fac.Sci.Univ.Ank.Series A2-A3: Phys.Sci. and Eng., vol. 66, no. 1, pp. 26–44, 2024, doi: 10.33769/aupse.1320795.
ISNAD Özsarı, Mustafa Veysel et al. “USB-IDS-1 Dataset Feature Reduction With Genetic Algorithm”. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering 66/1 (June 2024), 26-44. https://doi.org/10.33769/aupse.1320795.
JAMA Özsarı MV, Özsarı Ş, Aydın A, Güzel MS. USB-IDS-1 dataset feature reduction with genetic algorithm. Commun.Fac.Sci.Univ.Ank.Series A2-A3: Phys.Sci. and Eng. 2024;66:26–44.
MLA Özsarı, Mustafa Veysel et al. “USB-IDS-1 Dataset Feature Reduction With Genetic Algorithm”. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering, vol. 66, no. 1, 2024, pp. 26-44, doi:10.33769/aupse.1320795.
Vancouver Özsarı MV, Özsarı Ş, Aydın A, Güzel MS. USB-IDS-1 dataset feature reduction with genetic algorithm. Commun.Fac.Sci.Univ.Ank.Series A2-A3: Phys.Sci. and Eng. 2024;66(1):26-44.

Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.