IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v14y2022i3p72-d758238.html
   My bibliography  Save this article

A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning

Author

Listed:
  • Diogo Teixeira

    (Instituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, Portugal)

  • Silvestre Malta

    (Instituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, Portugal)

  • Pedro Pinto

    (Instituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, Portugal
    Instituto Universitário da Maia, 4475-690 Maia, Portugal
    INESC TEC—Institute for Systems and Computer Engineering, Technology and Science, 4200-465 Porto, Portugal)

Abstract

An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and data. Anomaly-based IDSs may deploy machine learning algorithms to classify events either as normal or anomalous and trigger the adequate response. When using supervised learning, these algorithms require classified, rich, and recent datasets. Thus, to foster the performance of these machine learning models, datasets can be generated from different sources in a collaborative approach, and trained with multiple algorithms. This paper proposes a vote-based architecture to generate classified datasets and improve the performance of supervised learning-based IDSs. On a regular basis, multiple IDSs in different locations send their logs to a central system that combines and classifies them using different machine learning models and a majority vote system. Then, it generates a new and classified dataset, which is trained to obtain the best updated model to be integrated into the IDS of the companies involved. The proposed architecture trains multiple times with several algorithms. To shorten the overall runtimes, the proposed architecture was deployed in Fed4FIRE+ with Ray to distribute the tasks by the available resources. A set of machine learning algorithms and the proposed architecture were assessed. When compared with a baseline scenario, the proposed architecture enabled to increase the accuracy by 11.5% and the precision by 11.2%.

Suggested Citation

  • Diogo Teixeira & Silvestre Malta & Pedro Pinto, 2022. "A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning," Future Internet, MDPI, vol. 14(3), pages 1-17, February.
  • Handle: RePEc:gam:jftint:v:14:y:2022:i:3:p:72-:d:758238
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/14/3/72/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/14/3/72/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Ahmed Mahfouz & Abdullah Abuhussein & Deepak Venugopal & Sajjan Shiva, 2020. "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset," Future Internet, MDPI, vol. 12(11), pages 1-19, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Furkat Safarov & Mainak Basak & Rashid Nasimov & Akmalbek Abdusalomov & Young Im Cho, 2023. "Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection," Future Internet, MDPI, vol. 15(9), pages 1-19, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:14:y:2022:i:3:p:72-:d:758238. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.