An Effective Classifier Model for Imbalanced Network Attack Data

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

Recently, machine learning algorithms have been used in the detection and classification of network attacks. The performance of the algorithms has been evaluated by using benchmark network intrusion datasets such as DARPA98, KDD’99, NSL-KDD, UNSW-NB15, and Caida DDoS. However, these datasets have two major challenges: imbalanced data and high-dimensional data. Obtaining high accuracy for all attack types in the dataset allows for high accuracy in imbalanced datasets. On the other hand, having a large number of features increases the runtime load on the algorithms. A novel model is proposed in this paper to overcome these two concerns. The number of features in the model, which has been tested at CICIDS2017, is initially optimized by using genetic algorithms. This optimum feature set has been used to classify network attacks with six well-known classifiers according to high f1-score and g-mean value in minimum time. Afterwards, a multi-layer perceptron based ensemble learning approach has been applied to improve the models’ overall performance. The experimental results show that the suggested model is acceptable for feature selection as well as classifying network attacks in an imbalanced dataset, with a high f1-score (0.91) and g-mean (0.99) value. Furthermore, it has outperformed base classifier models and voting procedures.

References Powered by Scopus

Toward generating a new intrusion detection dataset and intrusion traffic characterization

3035Citations
1639Readers
Get full text

This article is free to access.

This article is free to access.

Cited by Powered by Scopus

This article is free to access.

Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Çetin, G. (2022). An Effective Classifier Model for Imbalanced Network Attack Data. Computers, Materials and Continua, 73(3), 4519–4539. https://doi.org/10.32604/cmc.2022.031734

Readers over time

‘22‘23‘24‘25036912

Readers' Seniority

Tooltip

Lecturer / Post doc 3

50%

PhD / Post grad / Masters / Doc 3

50%

Readers' Discipline

Tooltip

Computer Science 4

67%

Mathematics 1

17%

Engineering 1

17%

Save time finding and organizing research with Mendeley

Sign up for free
0