Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/25117
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOleiwi, HW-
dc.contributor.authorMahawi, DN-
dc.contributor.authorAl-Raweshidy, H-
dc.date.accessioned2022-08-25T10:14:14Z-
dc.date.available2022-08-25T10:14:14Z-
dc.date.issued2022-08-26-
dc.identifier.citationOleiwi, H., Mahawi, D. and Al-Raweshidy, H. (2022) 'MLTs_ADCNs: Machine Learning Techniques for Anomaly Detection in Communication Networks'. IEEE Access, 10, pp. 91006 - 91017 (12). doi: 10.1109/ACCESS.2022.3201869.en_US
dc.identifier.issn2169-3536-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/25117-
dc.description.abstract© Copyright 2022 The Authors. From a security perspective, the research of the jeopardized 6G wireless communications and its expected ultra-densified ubiquitous wireless networks urge the development of a robust intrusion detection system (IDS) with powerful capabilities which could not be sufficiently provided by the existing conventional systems. IDSs are still insufficient against continuous renewable unknown attacks on the wireless communication networks, especially with the new highly vulnerable networks, leading to low accuracy and detection rate with high (false-negative and false-positive) rates. To this end, this paper proposed a novel anomaly detection in communication networks by using an ensemble learning (EL) algorithm-based anomaly detection in communication networks (ADCNs). EL-ADCNs consists of four main stages; the first stage is the preprocessing steps. The feature selection method is the second stage. It adopts the proposed hybrid method using correlation with the random forest algorithm of ensemble learning (CFS–RF). It reduces dimensionality and retrieves the best subset feature of all the three datasets (NSL_KDD, UNSW_NB2015, and CIC_IDS2017) separately. The third stage is using hybrid EL algorithms to detect intrusions. It involves modifying two classifiers (i.e., random forest (RF), and support vector machine (SVM)) to apply them as adaboosting and bagging EL Algorithms; using the voting average technique as an aggregation process. The final stage is testing the proposal using binary and multi-class classification forms. The experimental results of applying 30, 35, and 40 features of the proposed system to the three datasets achieved the best results of a 99.6% accuracy with a 0.004 false-alarm rate for NSL_KDD, a 99.1% accuracy with a 0.008 false-alarm rate for UNSW_NB2015, and a 99.4% accuracy with a 0.0012 false-alarm rate for CIC_IDS2017.-
dc.format.extent91006 - 91017 (12)-
dc.format.mediumElectronic-
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.rights© Copyright 2022 The Authors. Published by IEEE, This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.-
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/-
dc.subjectadaboosting algorithmen_US
dc.subjectbagging algorithmen_US
dc.subjectcorrelation feature selectionen_US
dc.subjectensemble methoden_US
dc.subjectintrusion detection systemsen_US
dc.titleMLTs_ADCNs: Machine Learning Techniques for Anomaly Detection in Communication Networksen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1109/ACCESS.2022.3201869-
dc.relation.isPartOfIEEE Access-
pubs.publication-statusPublished online-
pubs.volume10-
dc.rights.holderThe Authors-
Appears in Collections:Dept of Electronic and Electrical Engineering Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdf© Copyright 2022 The Authors. Published by IEEE, This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.1.71 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons