A Multi-Agent-Based System For Intrusion Detection
A Multi-Agent-Based System For Intrusion Detection
1007%2F978-981-16-2994-5_15
236
Downloads
Abstract
Nowadays, with the immense amount of data that is circulating every second,
the cybersecurity concerns are also growing. In recent years, cybersecurity-
intrusion detection has become a very difficult research area in communication
network and big data. Hence, traditional intrusion detection systems (IDSs)
could not respond to the new security challenges. Therefore, IDSs require an
effective and improved detection mechanism capable of detecting distributed
intrusive activities and serious threats to network security. In this paper, we
have proposed A Multi-Agent System (MAS), which is very suitable for IDSs as
it meets the features required by the networks and Big Data issues, through
cooperation, autonomy, and proactivity between agents to ensure the effective
detection of intrusions without the intervention of an expert. Moreover, some
experiments were conducted to evaluate the performance of our model in a
Microsoft Azure Cloud, as it provides both processing power and storage
1 di 9 24/11/2021, 09:21
A Multi-Agent-Based System for Intrusion Detection | SpringerLink https://link.springer.com/chapter/10.1007%2F978-981-16-2994-5_15
capabilities using Apache Spark, and its Machine Learning Library (MLlib) to
detect intrusions. A Random Forest algorithm is used to provide for the nature
of the incoming data. Also, the use of the recent CSE-CIC-IDS2018 dataset will
give better perspective about the system abilities against cyber-attacks. The
results show that the proposed solution is much accurate than traditional
intrusion detection systems.
Keywords
Intrusion detection Multi-agent system Machine learning Apache Spark
Microsoft Azure Random Forest
References
1. Sarker, I.H., Abushark, Y.B., Alsolami, F., Khan, A.I.: IntruDTree: A
Machine Learning Based Cyber Security Intrusion Detection Model, p.
754. Symmetry. Multidisciplinary Digital Publishing Institute (2020)
Google Scholar (https://scholar.google.com/scholar?q=Sarker
%2C%20I.H.%2C%20Abushark%2C%20Y.B.%2C%20Alsolami
%2C%20F.%2C%20Khan%2C%20A.I.%3A%20IntruDTree
%3A%20A%20Machine%20Learning%20Based%20Cyber%20Security
%20Intrusion%20Detection%20Model
%2C%20p.%20754.%20Symmetry.%20Multidisciplinary%20Digital%2
0Publishing%20Institute%20%282020%29)
2. Dounya, K., Okba, K., Hamza, S., Safa, S., Iman, H., Omar, B.: A new
approach based mobile agent system for ensuring secure big data
transmission and storage. In: 2017 International Conference on
Mathematics and Information Technology (ICMIT), pp. 196–200. IEEE
(2017)
Google Scholar (https://scholar.google.com/scholar?q=Dounya
%2C%20K.%2C%20Okba%2C%20K.%2C%20Hamza%2C%20S.
%2C%20Safa%2C%20S.%2C%20Iman%2C%20H.%2C%20Omar
%2C%20B.
%3A%20A%20new%20approach%20based%20mobile%20agent%20sy
stem%20for%20ensuring%20secure%20big%20data%20transmission
%20and%20storage.%20In
%3A%202017%20International%20Conference%20on%20Mathematic
s%20and%20Information%20Technology%20%28ICMIT%29%2C
%20pp.%20196%E2%80%93200.%20IEEE%20%282017%29)
2 di 9 24/11/2021, 09:21
A Multi-Agent-Based System for Intrusion Detection | SpringerLink https://link.springer.com/chapter/10.1007%2F978-981-16-2994-5_15
3 di 9 24/11/2021, 09:21
A Multi-Agent-Based System for Intrusion Detection | SpringerLink https://link.springer.com/chapter/10.1007%2F978-981-16-2994-5_15
g)
10. Belouch, M., El Hadaj, S., Idhammad, M.: Performance evaluation of
intrusion detection based on machine learning using Apache Spark.
Procedia Comput. Sci. 1–6 (2018)
Google Scholar (https://scholar.google.com/scholar?q=Belouch
%2C%20M.%2C%20El%20Hadaj%2C%20S.%2C%20Idhammad
%2C%20M.
%3A%20Performance%20evaluation%20of%20intrusion%20detection
%20based%20on%20machine%20learning%20using%20Apache%20S
park.%20Procedia%20Comput.%20Sci.%201%E2%80%936%20
%282018%29)
11. Zhang, H., Dai, S., Li, Y., Zhang, W.: Real-time distributed-random-
forest-based network intrusion detection system using Apache spark.
In: 2018 IEEE 37th International Performance Computing and
Communications Conference (IPCCC), pp. 1–7. IEEE (2018)
Google Scholar (https://scholar.google.com/scholar?q=Zhang
%2C%20H.%2C%20Dai%2C%20S.%2C%20Li%2C%20Y.
%2C%20Zhang%2C%20W.%3A%20Real-time%20distributed-random-
forest-
based%20network%20intrusion%20detection%20system%20using%20
Apache%20spark.%20In
%3A%202018%20IEEE%2037th%20International%20Performance%2
0Computing%20and%20Communications%20Conference
%20%28IPCCC%29%2C%20pp.%201%E2%80%937.%20IEEE
%20%282018%29)
12. Saravanan, S., et al.: Performance evaluation of classification
algorithms in the design of Apache Spark based intrusion detection
system. In: 2020 5th International Conference on Communication and
Electronics Systems (ICCES), pp. 443–447. IEEE (2020)
Google Scholar (https://scholar.google.com/scholar?q=Saravanan
%2C%20S.%2C%20et%20al.
%3A%20Performance%20evaluation%20of%20classification%20algori
thms%20in%20the%20design%20of%20Apache%20Spark%20based%
20intrusion%20detection%20system.%20In
%3A%202020%205th%20International%20Conference%20on%20Co
mmunication%20and%20Electronics%20Systems%20%28ICCES
%29%2C%20pp.%20443%E2%80%93447.%20%20IEEE
%20%282020%29)
13. Karatas, G., Demir, O., Sahingoz, O.K.: Increasing the Performance of
Machine Learning-Based IDSs on an Imbalanced and Up-to-Date
Dataset, pp. 32150–32162. IEEE Access (2020)
Google Scholar (https://scholar.google.com/scholar?q=Karatas
%2C%20G.%2C%20Demir%2C%20O.%2C%20Sahingoz%2C%20O.K.
%3A%20Increasing%20the%20Performance%20of%20Machine%20Le
arning-Based%20IDSs%20on%20an%20Imbalanced%20and%20Up-
to-Date%20Dataset%2C%20pp.%2032150%E2%80
%9332162.%20IEEE%20Access%20%282020%29)
4 di 9 24/11/2021, 09:21
A Multi-Agent-Based System for Intrusion Detection | SpringerLink https://link.springer.com/chapter/10.1007%2F978-981-16-2994-5_15
14. Ferrag, M.A., Maglaras, L., Janicke, H., Smith, R.: Deep learning
techniques for cyber security intrusion detection: a detailed analysis.
In: 6th International Symposium for ICS & SCADA Cyber Security
Research, pp. 126–136 (2019)
Google Scholar (https://scholar.google.com/scholar?q=Ferrag
%2C%20M.A.%2C%20Maglaras%2C%20L.%2C%20Janicke%2C%20H.
%2C%20Smith%2C%20R.
%3A%20Deep%20learning%20techniques%20for%20cyber%20securit
y%20intrusion%20detection%3A%20a%20detailed%20analysis.%20In
%3A%206th%20International%20Symposium%20for%20ICS%20%26
%20SCADA%20Cyber%20Security%20Research%2C%20pp.%20126
%E2%80%93136%20%282019%29)
15. Lypa, B., Iver, O., Kifer, V.: Application of machine learning methods
for network intrusion detection system (2019)
Google Scholar (https://scholar.google.com/scholar?q=Lypa
%2C%20B.%2C%20Iver%2C%20O.%2C%20Kifer%2C%20V.
%3A%20Application%20of%20machine%20learning%20methods%20f
or%20network%20intrusion%20detection%20system
%20%282019%29)
16. Kim, J., Shin, Y., Choi, E., et al.: An intrusion detection model based on
a convolutional neural network. J. Multimed. Inf. Syst. 165–172 (2019)
Google Scholar (https://scholar.google.com/scholar?q=Kim%2C%20J.
%2C%20Shin%2C%20Y.%2C%20Choi%2C%20E.%2C%20et%20al.
%3A%20An%20intrusion%20detection%20model%20based%20on%2
0a%20convolutional%20neural%20network.
%20%20J.%20Multimed.%20Inf.%20Syst.%20165%E2%80%93172
%20%282019%29)
17. IDS 2018 | Datasets. unb.ca/cic/datasets/ids-2018. [Online] (2018).
https://www.unb.ca/cic/datasets/ids-2018.html (https://www.unb.ca
/cic/datasets/ids-2018.html)
18. Foukia, N., Hulaas, J.G., Harms, J.: Intrusion Detection with Mobile
Agents (2001)
Google Scholar (https://scholar.google.com/scholar?q=Foukia
%2C%20N.%2C%20Hulaas%2C%20J.G.%2C%20Harms%2C%20J.
%3A%20Intrusion%20Detection%20with%20Mobile%20Agents
%20%282001%29)
19. Achbarou, O., El Kiram, M.A., Bourkoukou, O., Elbouanani, S.: A new
distributed intrusion detection system based on multi-agent system for
cloud environment. Int. J. Commun. Netw. Inf. Secur. (Kohat
University of Science and Technology (KUST)) 526 (2018)
Google Scholar (https://scholar.google.com/scholar?q=Achbarou
%2C%20O.%2C%20El%20Kiram%2C%20M.A.%2C%20Bourkoukou
%2C%20O.%2C%20Elbouanani%2C%20S.
%3A%20A%20new%20distributed%20intrusion%20detection%20syste
m%20based%20on%20multi-
agent%20system%20for%20cloud%20environment.%20Int.%20J.%20
5 di 9 24/11/2021, 09:21
A Multi-Agent-Based System for Intrusion Detection | SpringerLink https://link.springer.com/chapter/10.1007%2F978-981-16-2994-5_15
Commun.%20Netw.%20Inf.%20Secur.
%20%28Kohat%20University%20of%20Science%20and%20Technology
%20%28KUST%29%29%20526%20%282018%29)
20. Anusha, K., Usha Rani, K.: Performance evaluation of Spark SQL for
batch processing. In: Emerging Research in Data Engineering Systems
and Computer Communications, pp. 145–153. Springer (2020)
Google Scholar (https://scholar.google.com/scholar?q=Anusha
%2C%20K.%2C%20Usha%20Rani%2C%20K.
%3A%20Performance%20evaluation%20of%20Spark%20SQL%20for%
20batch%20processing.%20In
%3A%20Emerging%20Research%20in%20Data%20Engineering%20S
ystems%20and%20Computer%20Communications%2C%20pp.%20145
%E2%80%93153.%20Springer%20%282020%29)
21. Apache Spark™. [Online] (2020). https://databricks.com/spark/about
(https://databricks.com/spark/about)
22. Salloum, S., Dautov, R., Chen, X., Peng, P.X., Huang, J.Z.: Big data
analytics on Apache Spark. Int. J. Data Sci. Anal. (Springer) 145–164
(2016)
Google Scholar (https://scholar.google.com/scholar?q=Salloum
%2C%20S.%2C%20Dautov%2C%20R.%2C%20Chen%2C%20X.
%2C%20Peng%2C%20P.X.%2C%20Huang%2C%20J.Z.
%3A%20Big%20data%20analytics%20on%20Apache%20Spark.%20In
t.%20J.%20Data%20Sci.%20Anal.%20%28Springer%29%20145
%E2%80%93164%20%282016%29)
23. Morfino, V., Rampone, S.: Towards Near-Real-Time Intrusion
Detection for IoT Devices using Supervised Learning and Apache Spark,
p. 444. Electronics. Multidisciplinary Digital Publishing Institute
(2020)
Google Scholar (https://scholar.google.com/scholar?q=Morfino
%2C%20V.%2C%20Rampone%2C%20S.%3A%20Towards%20Near-
Real-
Time%20Intrusion%20Detection%20for%20IoT%20Devices%20using
%20Supervised%20Learning%20and%20Apache%20Spark
%2C%20p.%20444.%20Electronics.%20Multidisciplinary%20Digital%
20Publishing%20Institute%20%282020%29)
24. Satapathy, S.C., Bhateja, V., Das, S.: Smart intelligent computing and
applications. In: Proceedings of the Second International Conference
on SCI (2018)
Google Scholar (https://scholar.google.com/scholar?q=Satapathy
%2C%20S.C.%2C%20Bhateja%2C%20V.%2C%20Das%2C%20S.
%3A%20Smart%20intelligent%20computing%20and%20applications.
%20In
%3A%20Proceedings%20of%20the%20Second%20International%20C
onference%20on%20SCI%20%282018%29)
25. How to Overcome the Limitations of RDD in Apache Spark? [Online].
https://data-flair.training/blogs/apache-spark-rdd-limitations/
6 di 9 24/11/2021, 09:21
A Multi-Agent-Based System for Intrusion Detection | SpringerLink https://link.springer.com/chapter/10.1007%2F978-981-16-2994-5_15
(https://data-flair.training/blogs/apache-spark-rdd-limitations/)
26. What-microsoft-azure-is-and-why-it-matters. [Online] (2018).
https://ccbtechnology.com/what-microsoft-azure-is-and-why-it-
matters/ (https://ccbtechnology.com/what-microsoft-azure-is-and-
why-it-matters/)
27. Rachburee, N., Punlumjeak, W.: Big data analytics: feature selection
and machine learning for intrusion detection on microsoft azure
platform. J. Telecommun. Electron. Comput. Eng. (JTEC) 107–111
(2017)
Google Scholar (https://scholar.google.com/scholar?q=Rachburee
%2C%20N.%2C%20Punlumjeak%2C%20W.
%3A%20Big%20data%20analytics
%3A%20feature%20selection%20and%20machine%20learning%20for
%20intrusion%20detection%20on%20microsoft%20azure%20platform
.%20J.%20Telecommun.%20Electron.%20Comput.%20Eng.
%20%28JTEC%29%20107%E2%80%93111%20%282017%29)
28. Blob storage. [Online]. https://azure.microsoft.com/en-us/services
/storage/blobs/ (https://azure.microsoft.com/en-us/services/storage
/blobs/)
29. Quinto, B.: XGBoost, Covers and LightGBM, Spark NLP. In: Next-
Generation Machine Learning with Spark. Springer
Google Scholar (https://scholar.google.com/scholar?q=Quinto
%2C%20B.%3A%20XGBoost%2C%20Covers%20and%20LightGBM
%2C%20Spark%20NLP.%20In%3A%20Next-
Generation%20Machine%20Learning%20with%20Spark.%20Springer)
30. Quinto, B.: Introduction to Spark and Spark MLlib. In: Next-
Generation Machine Learning with Spark, pp. 29–96. Springer (2020)
Google Scholar (https://scholar.google.com/scholar?q=Quinto
%2C%20B.
%3A%20Introduction%20to%20Spark%20and%20Spark%20MLlib.%2
0In%3A%20Next-
Generation%20Machine%20Learning%20with%20Spark
%2C%20pp.%2029%E2%80%9396.%20Springer%20%282020%29)
31. Chourasiya, R., Patel, V., Shrivastava, A.: Classification of cyber attack
using machine learning technique at microsoft azure cloud. Int. Res. J.
Eng. Appl. Sci. (2018)
Google Scholar (https://scholar.google.com/scholar?q=Chourasiya
%2C%20R.%2C%20Patel%2C%20V.%2C%20Shrivastava%2C%20A.
%3A%20Classification%20of%20cyber%20attack%20using%20machin
e%20learning%20technique%20at%20microsoft%20azure%20cloud.
%20%20Int.%20Res.%20J.%20Eng.%20Appl.%20Sci.
%20%282018%29)
32. Dahiya, P., Srivastava, D.K.: Network intrusion detection in big dataset
using Spark. Procedia Comp. Sci. (Elsevier) 253–262 (2018)
Google Scholar (https://scholar.google.com/scholar?q=Dahiya
7 di 9 24/11/2021, 09:21
A Multi-Agent-Based System for Intrusion Detection | SpringerLink https://link.springer.com/chapter/10.1007%2F978-981-16-2994-5_15
%2C%20P.%2C%20Srivastava%2C%20D.K.
%3A%20Network%20intrusion%20detection%20in%20big%20dataset%20usi
ng%20Spark.%20Procedia%20Comp.%20Sci.%20%28Elsevier%29%20253
%E2%80%93262%20%282018%29)
33. Khan, M.A., Kim, J.: Toward Developing Efficient Conv-AE-Based
Intrusion Detection System Using Heterogeneous Dataset, p. 1771.
Electronics. Multidisciplinary Digital Publishing Institute (2020)
Google Scholar (https://scholar.google.com/scholar?q=Khan
%2C%20M.A.%2C%20Kim%2C%20J.
%3A%20Toward%20Developing%20Efficient%20Conv-AE-
Based%20Intrusion%20Detection%20System%20Using%20Heterogen
eous%20Dataset
%2C%20p.%201771.%20Electronics.%20Multidisciplinary%20Digital%
20Publishing%20Institute%20%282020%29)
34. Ranjana, P., et al.: Anomaly detection of DDOS attacks using Hadoop.
In: Emerging Research in Computing, Information, Communication
and Applications, pp. 543–552. Springer (2019)
Google Scholar (https://scholar.google.com/scholar?q=Ranjana
%2C%20P.%2C%20et%20al.
%3A%20Anomaly%20detection%20of%20DDOS%20attacks%20using
%20Hadoop.%20In
%3A%20Emerging%20Research%20in%20Computing
%2C%20Information%2C%20Communication%20and%20Applications
%2C%20pp.%20543%E2%80%93552.%20Springer%20%282019%29)
Copyright information
8 di 9 24/11/2021, 09:21
A Multi-Agent-Based System for Intrusion Detection | SpringerLink https://link.springer.com/chapter/10.1007%2F978-981-16-2994-5_15
/10.1007/978-981-16-2994-5_15
First Online
08 June 2021
DOI
https://doi.org/10.1007/978-981-16-2994-5_15
Publisher Name
Springer, Singapore
Print ISBN
978-981-16-2993-8
Online ISBN
978-981-16-2994-5
eBook Packages
Intelligent Technologies and Robotics
Intelligent Technologies and Robotics (R0)
9 di 9 24/11/2021, 09:21