Loading…
An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies
Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection r...
Saved in:
Published in: | Computational intelligence 2022-08, Vol.38 (4), p.1216-1231 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 1231 |
container_issue | 4 |
container_start_page | 1216 |
container_title | Computational intelligence |
container_volume | 38 |
creator | Karthikraja, Chinnathangam Senthilkumar, Jayaprakasam Hariharan, Rajadurai Usha Devi, Gandhi Suresh, Yuvaraj Mohanraj, Vijayakumar |
description | Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection rate is low. An efficient attack detection system requires a huge volume of network transactions and relevant features for training. But the existing datasets have significant and nonsignificant features together. Hence, the significant feature selection plays a major role to detect the attacks. For this reason, this paper adopts the XGBoost approach to identify the relevant (significant) features of the attacks in the dataset. After this XGBoost, this article applies the bidirectional long short term model (Bi‐LSTM) for the detection and classification of the attacks. This Bi‐LSTM model is a novel approach to the IDS and very effective to increase the detection rate. Thus, this article focuses on feature reduction and classification of the attacks. The experimental results show that the proposed XGBoost and Bi‐LSTM combination outperforms in detecting attacks. |
doi_str_mv | 10.1111/coin.12497 |
format | article |
fullrecord | <record><control><sourceid>wiley</sourceid><recordid>TN_cdi_wiley_primary_10_1111_coin_12497_COIN12497</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>COIN12497</sourcerecordid><originalsourceid>FETCH-LOGICAL-s1977-3d7f233f555e8855da43d5b716bdbbb2bd564c45bbe9f29488591d10ff3945813</originalsourceid><addsrcrecordid>eNotUEtOwzAQtRBIlMKGE_gCKXZsx_GyVFAqVXQDErsojp3WyJ_KdoW64wiII3IS0sBs5o3mfaQHwC1GMzzMXReMn-GSCn4GJphWvKgris7BBNUlLbgg7BJcpfSOEMKE1hPwPfdQu72JpmstND7HQzLBQ6Wz7vIJpWPK2kHZJq3gcL8t70NIGbZeQWmUiX-8QW2D3_58fqVdiBlmHR10QWkL-xAhW46CkHc6Dj-ru-DcwQ-pY8gQtvPBhq3R6Rpc9K1N-uZ_T8Hr48PL4qlYb5arxXxdJCw4L4jifUlIzxjTdc2YailRTHJcSSWlLKViFe0ok1KLvhR04AisMOp7IiirMZkC_Of7Yaw-NvtoXBuPDUbNqcrmVGUzVtksNqvnEZFft7VuRA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies</title><source>Wiley-Blackwell Read & Publish Collection</source><source>BSC - Ebsco (Business Source Ultimate)</source><creator>Karthikraja, Chinnathangam ; Senthilkumar, Jayaprakasam ; Hariharan, Rajadurai ; Usha Devi, Gandhi ; Suresh, Yuvaraj ; Mohanraj, Vijayakumar</creator><creatorcontrib>Karthikraja, Chinnathangam ; Senthilkumar, Jayaprakasam ; Hariharan, Rajadurai ; Usha Devi, Gandhi ; Suresh, Yuvaraj ; Mohanraj, Vijayakumar</creatorcontrib><description>Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection rate is low. An efficient attack detection system requires a huge volume of network transactions and relevant features for training. But the existing datasets have significant and nonsignificant features together. Hence, the significant feature selection plays a major role to detect the attacks. For this reason, this paper adopts the XGBoost approach to identify the relevant (significant) features of the attacks in the dataset. After this XGBoost, this article applies the bidirectional long short term model (Bi‐LSTM) for the detection and classification of the attacks. This Bi‐LSTM model is a novel approach to the IDS and very effective to increase the detection rate. Thus, this article focuses on feature reduction and classification of the attacks. The experimental results show that the proposed XGBoost and Bi‐LSTM combination outperforms in detecting attacks.</description><identifier>ISSN: 0824-7935</identifier><identifier>EISSN: 1467-8640</identifier><identifier>DOI: 10.1111/coin.12497</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley & Sons, Inc</publisher><subject>bidirectional long short term model ; intrusion detection system ; NDL‐KDD ; XGBoost</subject><ispartof>Computational intelligence, 2022-08, Vol.38 (4), p.1216-1231</ispartof><rights>2022 Wiley Periodicals LLC.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0001-9970-366X ; 0000-0002-0164-4372</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Karthikraja, Chinnathangam</creatorcontrib><creatorcontrib>Senthilkumar, Jayaprakasam</creatorcontrib><creatorcontrib>Hariharan, Rajadurai</creatorcontrib><creatorcontrib>Usha Devi, Gandhi</creatorcontrib><creatorcontrib>Suresh, Yuvaraj</creatorcontrib><creatorcontrib>Mohanraj, Vijayakumar</creatorcontrib><title>An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies</title><title>Computational intelligence</title><description>Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection rate is low. An efficient attack detection system requires a huge volume of network transactions and relevant features for training. But the existing datasets have significant and nonsignificant features together. Hence, the significant feature selection plays a major role to detect the attacks. For this reason, this paper adopts the XGBoost approach to identify the relevant (significant) features of the attacks in the dataset. After this XGBoost, this article applies the bidirectional long short term model (Bi‐LSTM) for the detection and classification of the attacks. This Bi‐LSTM model is a novel approach to the IDS and very effective to increase the detection rate. Thus, this article focuses on feature reduction and classification of the attacks. The experimental results show that the proposed XGBoost and Bi‐LSTM combination outperforms in detecting attacks.</description><subject>bidirectional long short term model</subject><subject>intrusion detection system</subject><subject>NDL‐KDD</subject><subject>XGBoost</subject><issn>0824-7935</issn><issn>1467-8640</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid/><recordid>eNotUEtOwzAQtRBIlMKGE_gCKXZsx_GyVFAqVXQDErsojp3WyJ_KdoW64wiII3IS0sBs5o3mfaQHwC1GMzzMXReMn-GSCn4GJphWvKgris7BBNUlLbgg7BJcpfSOEMKE1hPwPfdQu72JpmstND7HQzLBQ6Wz7vIJpWPK2kHZJq3gcL8t70NIGbZeQWmUiX-8QW2D3_58fqVdiBlmHR10QWkL-xAhW46CkHc6Dj-ru-DcwQ-pY8gQtvPBhq3R6Rpc9K1N-uZ_T8Hr48PL4qlYb5arxXxdJCw4L4jifUlIzxjTdc2YailRTHJcSSWlLKViFe0ok1KLvhR04AisMOp7IiirMZkC_Of7Yaw-NvtoXBuPDUbNqcrmVGUzVtksNqvnEZFft7VuRA</recordid><startdate>202208</startdate><enddate>202208</enddate><creator>Karthikraja, Chinnathangam</creator><creator>Senthilkumar, Jayaprakasam</creator><creator>Hariharan, Rajadurai</creator><creator>Usha Devi, Gandhi</creator><creator>Suresh, Yuvaraj</creator><creator>Mohanraj, Vijayakumar</creator><general>John Wiley & Sons, Inc</general><scope/><orcidid>https://orcid.org/0000-0001-9970-366X</orcidid><orcidid>https://orcid.org/0000-0002-0164-4372</orcidid></search><sort><creationdate>202208</creationdate><title>An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies</title><author>Karthikraja, Chinnathangam ; Senthilkumar, Jayaprakasam ; Hariharan, Rajadurai ; Usha Devi, Gandhi ; Suresh, Yuvaraj ; Mohanraj, Vijayakumar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-s1977-3d7f233f555e8855da43d5b716bdbbb2bd564c45bbe9f29488591d10ff3945813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>bidirectional long short term model</topic><topic>intrusion detection system</topic><topic>NDL‐KDD</topic><topic>XGBoost</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Karthikraja, Chinnathangam</creatorcontrib><creatorcontrib>Senthilkumar, Jayaprakasam</creatorcontrib><creatorcontrib>Hariharan, Rajadurai</creatorcontrib><creatorcontrib>Usha Devi, Gandhi</creatorcontrib><creatorcontrib>Suresh, Yuvaraj</creatorcontrib><creatorcontrib>Mohanraj, Vijayakumar</creatorcontrib><jtitle>Computational intelligence</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Karthikraja, Chinnathangam</au><au>Senthilkumar, Jayaprakasam</au><au>Hariharan, Rajadurai</au><au>Usha Devi, Gandhi</au><au>Suresh, Yuvaraj</au><au>Mohanraj, Vijayakumar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies</atitle><jtitle>Computational intelligence</jtitle><date>2022-08</date><risdate>2022</risdate><volume>38</volume><issue>4</issue><spage>1216</spage><epage>1231</epage><pages>1216-1231</pages><issn>0824-7935</issn><eissn>1467-8640</eissn><abstract>Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and cause network data as an unrecoverable one. The attacks have different features in nature and their detection rate is low. An efficient attack detection system requires a huge volume of network transactions and relevant features for training. But the existing datasets have significant and nonsignificant features together. Hence, the significant feature selection plays a major role to detect the attacks. For this reason, this paper adopts the XGBoost approach to identify the relevant (significant) features of the attacks in the dataset. After this XGBoost, this article applies the bidirectional long short term model (Bi‐LSTM) for the detection and classification of the attacks. This Bi‐LSTM model is a novel approach to the IDS and very effective to increase the detection rate. Thus, this article focuses on feature reduction and classification of the attacks. The experimental results show that the proposed XGBoost and Bi‐LSTM combination outperforms in detecting attacks.</abstract><cop>Hoboken, USA</cop><pub>John Wiley & Sons, Inc</pub><doi>10.1111/coin.12497</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0001-9970-366X</orcidid><orcidid>https://orcid.org/0000-0002-0164-4372</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0824-7935 |
ispartof | Computational intelligence, 2022-08, Vol.38 (4), p.1216-1231 |
issn | 0824-7935 1467-8640 |
language | eng |
recordid | cdi_wiley_primary_10_1111_coin_12497_COIN12497 |
source | Wiley-Blackwell Read & Publish Collection; BSC - Ebsco (Business Source Ultimate) |
subjects | bidirectional long short term model intrusion detection system NDL‐KDD XGBoost |
title | An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T18%3A48%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wiley&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20empirical%20intrusion%20detection%20system%20based%20on%20XGBoost%20and%20bidirectional%20long%E2%80%90short%20term%20model%20for%205G%20and%20other%20telecommunication%20technologies&rft.jtitle=Computational%20intelligence&rft.au=Karthikraja,%20Chinnathangam&rft.date=2022-08&rft.volume=38&rft.issue=4&rft.spage=1216&rft.epage=1231&rft.pages=1216-1231&rft.issn=0824-7935&rft.eissn=1467-8640&rft_id=info:doi/10.1111/coin.12497&rft_dat=%3Cwiley%3ECOIN12497%3C/wiley%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-s1977-3d7f233f555e8855da43d5b716bdbbb2bd564c45bbe9f29488591d10ff3945813%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |