Loading…

An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies

Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection r...

Full description

Saved in:
Bibliographic Details
Published in:Computational intelligence 2022-08, Vol.38 (4), p.1216-1231
Main Authors: Karthikraja, Chinnathangam, Senthilkumar, Jayaprakasam, Hariharan, Rajadurai, Usha Devi, Gandhi, Suresh, Yuvaraj, Mohanraj, Vijayakumar
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 1231
container_issue 4
container_start_page 1216
container_title Computational intelligence
container_volume 38
creator Karthikraja, Chinnathangam
Senthilkumar, Jayaprakasam
Hariharan, Rajadurai
Usha Devi, Gandhi
Suresh, Yuvaraj
Mohanraj, Vijayakumar
description Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection rate is low. An efficient attack detection system requires a huge volume of network transactions and relevant features for training. But the existing datasets have significant and nonsignificant features together. Hence, the significant feature selection plays a major role to detect the attacks. For this reason, this paper adopts the XGBoost approach to identify the relevant (significant) features of the attacks in the dataset. After this XGBoost, this article applies the bidirectional long short term model (Bi‐LSTM) for the detection and classification of the attacks. This Bi‐LSTM model is a novel approach to the IDS and very effective to increase the detection rate. Thus, this article focuses on feature reduction and classification of the attacks. The experimental results show that the proposed XGBoost and Bi‐LSTM combination outperforms in detecting attacks.
doi_str_mv 10.1111/coin.12497
format article
fullrecord <record><control><sourceid>wiley</sourceid><recordid>TN_cdi_wiley_primary_10_1111_coin_12497_COIN12497</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>COIN12497</sourcerecordid><originalsourceid>FETCH-LOGICAL-s1977-3d7f233f555e8855da43d5b716bdbbb2bd564c45bbe9f29488591d10ff3945813</originalsourceid><addsrcrecordid>eNotUEtOwzAQtRBIlMKGE_gCKXZsx_GyVFAqVXQDErsojp3WyJ_KdoW64wiII3IS0sBs5o3mfaQHwC1GMzzMXReMn-GSCn4GJphWvKgris7BBNUlLbgg7BJcpfSOEMKE1hPwPfdQu72JpmstND7HQzLBQ6Wz7vIJpWPK2kHZJq3gcL8t70NIGbZeQWmUiX-8QW2D3_58fqVdiBlmHR10QWkL-xAhW46CkHc6Dj-ru-DcwQ-pY8gQtvPBhq3R6Rpc9K1N-uZ_T8Hr48PL4qlYb5arxXxdJCw4L4jifUlIzxjTdc2YailRTHJcSSWlLKViFe0ok1KLvhR04AisMOp7IiirMZkC_Of7Yaw-NvtoXBuPDUbNqcrmVGUzVtksNqvnEZFft7VuRA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies</title><source>Wiley-Blackwell Read &amp; Publish Collection</source><source>BSC - Ebsco (Business Source Ultimate)</source><creator>Karthikraja, Chinnathangam ; Senthilkumar, Jayaprakasam ; Hariharan, Rajadurai ; Usha Devi, Gandhi ; Suresh, Yuvaraj ; Mohanraj, Vijayakumar</creator><creatorcontrib>Karthikraja, Chinnathangam ; Senthilkumar, Jayaprakasam ; Hariharan, Rajadurai ; Usha Devi, Gandhi ; Suresh, Yuvaraj ; Mohanraj, Vijayakumar</creatorcontrib><description>Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection rate is low. An efficient attack detection system requires a huge volume of network transactions and relevant features for training. But the existing datasets have significant and nonsignificant features together. Hence, the significant feature selection plays a major role to detect the attacks. For this reason, this paper adopts the XGBoost approach to identify the relevant (significant) features of the attacks in the dataset. After this XGBoost, this article applies the bidirectional long short term model (Bi‐LSTM) for the detection and classification of the attacks. This Bi‐LSTM model is a novel approach to the IDS and very effective to increase the detection rate. Thus, this article focuses on feature reduction and classification of the attacks. The experimental results show that the proposed XGBoost and Bi‐LSTM combination outperforms in detecting attacks.</description><identifier>ISSN: 0824-7935</identifier><identifier>EISSN: 1467-8640</identifier><identifier>DOI: 10.1111/coin.12497</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley &amp; Sons, Inc</publisher><subject>bidirectional long short term model ; intrusion detection system ; NDL‐KDD ; XGBoost</subject><ispartof>Computational intelligence, 2022-08, Vol.38 (4), p.1216-1231</ispartof><rights>2022 Wiley Periodicals LLC.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0001-9970-366X ; 0000-0002-0164-4372</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Karthikraja, Chinnathangam</creatorcontrib><creatorcontrib>Senthilkumar, Jayaprakasam</creatorcontrib><creatorcontrib>Hariharan, Rajadurai</creatorcontrib><creatorcontrib>Usha Devi, Gandhi</creatorcontrib><creatorcontrib>Suresh, Yuvaraj</creatorcontrib><creatorcontrib>Mohanraj, Vijayakumar</creatorcontrib><title>An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies</title><title>Computational intelligence</title><description>Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection rate is low. An efficient attack detection system requires a huge volume of network transactions and relevant features for training. But the existing datasets have significant and nonsignificant features together. Hence, the significant feature selection plays a major role to detect the attacks. For this reason, this paper adopts the XGBoost approach to identify the relevant (significant) features of the attacks in the dataset. After this XGBoost, this article applies the bidirectional long short term model (Bi‐LSTM) for the detection and classification of the attacks. This Bi‐LSTM model is a novel approach to the IDS and very effective to increase the detection rate. Thus, this article focuses on feature reduction and classification of the attacks. The experimental results show that the proposed XGBoost and Bi‐LSTM combination outperforms in detecting attacks.</description><subject>bidirectional long short term model</subject><subject>intrusion detection system</subject><subject>NDL‐KDD</subject><subject>XGBoost</subject><issn>0824-7935</issn><issn>1467-8640</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid/><recordid>eNotUEtOwzAQtRBIlMKGE_gCKXZsx_GyVFAqVXQDErsojp3WyJ_KdoW64wiII3IS0sBs5o3mfaQHwC1GMzzMXReMn-GSCn4GJphWvKgris7BBNUlLbgg7BJcpfSOEMKE1hPwPfdQu72JpmstND7HQzLBQ6Wz7vIJpWPK2kHZJq3gcL8t70NIGbZeQWmUiX-8QW2D3_58fqVdiBlmHR10QWkL-xAhW46CkHc6Dj-ru-DcwQ-pY8gQtvPBhq3R6Rpc9K1N-uZ_T8Hr48PL4qlYb5arxXxdJCw4L4jifUlIzxjTdc2YailRTHJcSSWlLKViFe0ok1KLvhR04AisMOp7IiirMZkC_Of7Yaw-NvtoXBuPDUbNqcrmVGUzVtksNqvnEZFft7VuRA</recordid><startdate>202208</startdate><enddate>202208</enddate><creator>Karthikraja, Chinnathangam</creator><creator>Senthilkumar, Jayaprakasam</creator><creator>Hariharan, Rajadurai</creator><creator>Usha Devi, Gandhi</creator><creator>Suresh, Yuvaraj</creator><creator>Mohanraj, Vijayakumar</creator><general>John Wiley &amp; Sons, Inc</general><scope/><orcidid>https://orcid.org/0000-0001-9970-366X</orcidid><orcidid>https://orcid.org/0000-0002-0164-4372</orcidid></search><sort><creationdate>202208</creationdate><title>An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies</title><author>Karthikraja, Chinnathangam ; Senthilkumar, Jayaprakasam ; Hariharan, Rajadurai ; Usha Devi, Gandhi ; Suresh, Yuvaraj ; Mohanraj, Vijayakumar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-s1977-3d7f233f555e8855da43d5b716bdbbb2bd564c45bbe9f29488591d10ff3945813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>bidirectional long short term model</topic><topic>intrusion detection system</topic><topic>NDL‐KDD</topic><topic>XGBoost</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Karthikraja, Chinnathangam</creatorcontrib><creatorcontrib>Senthilkumar, Jayaprakasam</creatorcontrib><creatorcontrib>Hariharan, Rajadurai</creatorcontrib><creatorcontrib>Usha Devi, Gandhi</creatorcontrib><creatorcontrib>Suresh, Yuvaraj</creatorcontrib><creatorcontrib>Mohanraj, Vijayakumar</creatorcontrib><jtitle>Computational intelligence</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Karthikraja, Chinnathangam</au><au>Senthilkumar, Jayaprakasam</au><au>Hariharan, Rajadurai</au><au>Usha Devi, Gandhi</au><au>Suresh, Yuvaraj</au><au>Mohanraj, Vijayakumar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies</atitle><jtitle>Computational intelligence</jtitle><date>2022-08</date><risdate>2022</risdate><volume>38</volume><issue>4</issue><spage>1216</spage><epage>1231</epage><pages>1216-1231</pages><issn>0824-7935</issn><eissn>1467-8640</eissn><abstract>Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection rate is low. An efficient attack detection system requires a huge volume of network transactions and relevant features for training. But the existing datasets have significant and nonsignificant features together. Hence, the significant feature selection plays a major role to detect the attacks. For this reason, this paper adopts the XGBoost approach to identify the relevant (significant) features of the attacks in the dataset. After this XGBoost, this article applies the bidirectional long short term model (Bi‐LSTM) for the detection and classification of the attacks. This Bi‐LSTM model is a novel approach to the IDS and very effective to increase the detection rate. Thus, this article focuses on feature reduction and classification of the attacks. The experimental results show that the proposed XGBoost and Bi‐LSTM combination outperforms in detecting attacks.</abstract><cop>Hoboken, USA</cop><pub>John Wiley &amp; Sons, Inc</pub><doi>10.1111/coin.12497</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0001-9970-366X</orcidid><orcidid>https://orcid.org/0000-0002-0164-4372</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0824-7935
ispartof Computational intelligence, 2022-08, Vol.38 (4), p.1216-1231
issn 0824-7935
1467-8640
language eng
recordid cdi_wiley_primary_10_1111_coin_12497_COIN12497
source Wiley-Blackwell Read & Publish Collection; BSC - Ebsco (Business Source Ultimate)
subjects bidirectional long short term model
intrusion detection system
NDL‐KDD
XGBoost
title An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T18%3A48%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wiley&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20empirical%20intrusion%20detection%20system%20based%20on%20XGBoost%20and%20bidirectional%20long%E2%80%90short%20term%20model%20for%205G%20and%20other%20telecommunication%20technologies&rft.jtitle=Computational%20intelligence&rft.au=Karthikraja,%20Chinnathangam&rft.date=2022-08&rft.volume=38&rft.issue=4&rft.spage=1216&rft.epage=1231&rft.pages=1216-1231&rft.issn=0824-7935&rft.eissn=1467-8640&rft_id=info:doi/10.1111/coin.12497&rft_dat=%3Cwiley%3ECOIN12497%3C/wiley%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-s1977-3d7f233f555e8855da43d5b716bdbbb2bd564c45bbe9f29488591d10ff3945813%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true