Ensemble Voting System For Anomaly Based
Ensemble Voting System For Anomaly Based
Abstract— The growing dependence of modern One of the most active areas of research in
society on telecommunication and information supervised learning has been to study methods for
networks has become inevitable. Therefore, the constructing good ensemble of classifiers. It has
security aspects of such networks play a strategic been observed that when certain classifiers are
role in ensuring protection of data against misuse. ensembled, the performance is phenomenal
Intrusion Detection systems (IDS) are meant to
detect intruders who elude the “first line”
compared to the performance of the individual
protection. Data mining techniques are being used classifiers. Here, we propose a voting ensemble
for building effective IDS. In this paper we analyze classifier algorithm which is tested and results are
the performance of some data classifiers in a compared with other ensemble machine learning
heterogeneous environment using voting ensemble algorithms, including AdaBoost, MultiBoost, and
system with the purpose of detecting anomaly based Decorate with various base learner algorithms like
network intrusions. Experimental results using J48, SMO, Rule Learner. KDDCup 1999
KDDCup 1999 benchmark dataset demonstrate that benchmark dataset is used for the experimentation
the voting ensemble technique yield significantly and the results show that the proposed algorithm is
better results in detecting intrusions when compared
to other techniques.
promising and greatly outperforms existing
methods, achieving high detection rate with low
Index Terms— Intrusion Detection, Ensemble false alarm rate and more importantly take less
Learning, Voting Ensemble, ROC time to build the model.
The outline of the paper is as follows. A review of
I. INTRODUCTION the state-of-the-art on Intrusion Detection systems
(IDSs) is given in Section 2. Section 3 introduces
Computer networks are usually protected against technical analysis of the various machine learning
attacks by Intrusion Detection Systems (IDS). The approaches. The proposed method is presented in
traditional prevention techniques such as user Section 4. Various base learners used in this paper
authentication, data encryption, avoidance of are explained in Section 5. The evaluation on the
programming errors, and firewalls are only used proposed algorithm is carried out in Section 6 by
as the fist line of defense. But, if a password is comparing it with other ensembles. The paper is
weak and is compromised, user authentication concluded in Section 7.
cannot prevent unauthorized use. Similarly,
firewalls are vulnerable to errors in configuration II. RELATED WORK
and sometimes have ambiguous/undefined
security policies. They fail to protect against In [2], the authors have proposed various feature
malicious mobile code, insider attacks and reduction techniques like Principal component
unsecured modems. Therefore, intrusion detection analysis (PCA), Linear Discriminate Analysis
is required as an additional wall for protecting (LDA) and Independent Component Analysis
systems [1]. (ICA) in order to build an efficient network
Intrusion detection attempts to detect computer intrusion detection model in terms of detection
attacks by examining various process data on the accuracy and computation time. PCA and ICA
network. It is split into two categories, anomaly feature extraction approaches with Pareto-Optimal
detection systems and misuse detection systems. optimization is used in [3] to obtain a high
Anomaly detection is an attempt to search for performance intrusion detection system. The
malicious behaviour that deviates from established authors show that their proposed system
normal patterns. Misuse detection is used to outperforms standard SVM, PCA SVM and ICA
identify intrusions that match known attack SVM. In [4], the authors have proposed support
scenarios. In this paper, we propose a scalable vector machines (SVM) and neural networks (NN)
solution for detecting anomaly based network for intrusion detection. An evolutionary support
intrusion. vector machine for intrusion detection is proposed
KDDCup’99
Intrusion detection Dataset
P S F SB DB AC
VOTING SYSTEM
Figure 1. The framework for the Ensemble of Voting System with six features.
10
Boosting
Zero
R
Training dataset
Ensemble
Voting
11
12
1.2 Vote+SMO
Detection Rate(DR)
1
Vote+Decorate+J48
0.8
0.6 SVM+Rocchio Bundling
0.4 SVM+DGSOT
0.2
0 SOM IDS
-0.2 0 0.2 0.4 0.6 0.8 1 1.2 LAMSTAR IDS
False Alarm Rate(FPR)
Probe 98.5 66.2 71.0 34.0 97.0 60.5 95.6 78.1 65.6 66.0 63.0
7
DoS 99.9 100 99.0 11.0 23.0 95.9 98.6 100.0 100.0 100.0 100.0
2
U2R 48.0 54.3 67.0 27.0 43.0 20.6 31.6 67.0 67.0 67.0 67.0
R2L 37.8 38.1 30.0 88.0 91.0 10.9 37.7 59.0 59.0 47.0 59.0
13