Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/25117
Title: MLTs_ADCNs: Machine Learning Techniques for Anomaly Detection in Communication Networks
Authors: Oleiwi, HW
Mahawi, DN
Al-Raweshidy, H
Keywords: adaboosting algorithm;bagging algorithm;correlation feature selection;ensemble method;intrusion detection systems
Issue Date: 26-Aug-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Citation: Oleiwi, H., Mahawi, D. and Al-Raweshidy, H. (2022) 'MLTs_ADCNs: Machine Learning Techniques for Anomaly Detection in Communication Networks'. IEEE Access, 10, pp. 91006 - 91017 (12). doi: 10.1109/ACCESS.2022.3201869.
Abstract: © Copyright 2022 The Authors. From a security perspective, the research of the jeopardized 6G wireless communications and its expected ultra-densified ubiquitous wireless networks urge the development of a robust intrusion detection system (IDS) with powerful capabilities which could not be sufficiently provided by the existing conventional systems. IDSs are still insufficient against continuous renewable unknown attacks on the wireless communication networks, especially with the new highly vulnerable networks, leading to low accuracy and detection rate with high (false-negative and false-positive) rates. To this end, this paper proposed a novel anomaly detection in communication networks by using an ensemble learning (EL) algorithm-based anomaly detection in communication networks (ADCNs). EL-ADCNs consists of four main stages; the first stage is the preprocessing steps. The feature selection method is the second stage. It adopts the proposed hybrid method using correlation with the random forest algorithm of ensemble learning (CFS–RF). It reduces dimensionality and retrieves the best subset feature of all the three datasets (NSL_KDD, UNSW_NB2015, and CIC_IDS2017) separately. The third stage is using hybrid EL algorithms to detect intrusions. It involves modifying two classifiers (i.e., random forest (RF), and support vector machine (SVM)) to apply them as adaboosting and bagging EL Algorithms; using the voting average technique as an aggregation process. The final stage is testing the proposal using binary and multi-class classification forms. The experimental results of applying 30, 35, and 40 features of the proposed system to the three datasets achieved the best results of a 99.6% accuracy with a 0.004 false-alarm rate for NSL_KDD, a 99.1% accuracy with a 0.008 false-alarm rate for UNSW_NB2015, and a 99.4% accuracy with a 0.0012 false-alarm rate for CIC_IDS2017.
URI: https://bura.brunel.ac.uk/handle/2438/25117
DOI: https://doi.org/10.1109/ACCESS.2022.3201869
ISSN: 2169-3536
Appears in Collections:Dept of Electronic and Electrical Engineering Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdf© Copyright 2022 The Authors. Published by IEEE, This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.1.71 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons