This work is licensed under a Creative Commons Attribution 4.0 License.
For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in
a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2021.3104113,
IEEE Access
S.M. Kasongo
et al.
: An advanced Intrusion Detection System for IIoT Based on GA and Tree based Algorithms based Algorithms
[10] M. Mohammed, M.B. Khan and E.B.M. Bashier, “Machine learning:
algorithms and applications”,
CRC Press
, 2016.
[11] T. Janarthanan and S. Zargari, “Feature selection in UNSW-NB15 and KD-
DCUP99 datasets”, In IEEE 26th Int. Symp. Industrial Electron. (ISIE),
Jun. 2017, pp. 1881-1886.
[12] H. Gharaee and H. Hosseinvand, “A new feature selection IDS based on
genetic algorithm and SVM”,. In
8th Int. Symp. Telecommu. (IST) IEEE
,
Sept. 2016, pp. 139-144.
[13] R. Wald, T.M. Khoshgoftaar and A. Napolitano, “Stability of filter-and
wrapper-based feature subset selection”, In
25th Int. Conf. Tools with
Artificial Intell. IEEE
, Nov. 2013, pp. 374-380.
[14] M. Shafiq, Z. Tian, A.K. Bashir, X. Du and M. Guizani, “IoT malicious
traffic identification using wrapper-based feature selection mechanisms”,
Computers & Security
,vol. 94, p.101863, 2020.
[15] M.A. Siddiqi and W. Pak, “Optimizing Filter-Based Feature Selection
Method Flow for Intrusion Detection System”,
Electronics
, vol. 9, 12,
p.2114.
[16] S. Ding, X. Xu, H. Zhu, J. Wang and F. Jin , “Studies on optimization
algorithms for some artificial neural networks based on genetic algorithm
(GA)”,
JCP
, vol. 6, no. 5, pp.939-946, 2011
[17] P. Probst, M.N. Wright and A.L. Boulesteix, “Hyperparameters and tun-
ing strategies for random forest”,
Wiley Interdisciplinary Reviews: Data
Mining and Knowledge Discovery
, vol. 9, no. 3, p.e1301, 2019.
[18] V. Kumar, A.K. Das and D. Sinha, “Statistical analysis of the UNSW-
NB15 dataset for intrusion detection”, In
Comput. Intell. Pattern Recogn.
,
pp. 279-294, 2020.
[19] N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for
network intrusion detection systems (UNSW-NB15 network data set)”,in
Military commun. Inf. Sys. Conf.(MilCIS) IEEE
, Nov. 2015, pp. 1-6.
[20] N. Moustafa and J. Slay, “The evaluation of Network Anomaly Detection
Systems: Statistical analysis of the UNSW-NB15 data set and the compar-
ison with the KDD99 data set”,
Inf. Sec. Journ. A Global Perspective
, vol.
25, no. 1-3, pp.18-31, 2016.
[21] A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood and A. Anwar, “TON_IoT
telemetry dataset: a new generation dataset of IoT and IIoT for data-driven
Intrusion Detection Systems,”.
IEEE Access
, vol. 8, pp.165130-165150,
2020.
[22] J. Liu, D. Yang, M. Lian and M. Li, “Research on Intrusion Detection
Based on Particle Swarm Optimization in IoT”,
IEEE Access
, vol.9,
pp.38254-38268, 2021.
[23] X. Zhou, Y. Hu, W. Liang, J. Ma and Q. Jin, “Variational LSTM enhanced
anomaly detection for industrial big data”,
IEEE Trans. on Industrial Inf.
,
vol. 17, no.5, pp.3469-3477, 2020.
[24] J. Gao, S. Chai, B. Zhang and Y. Xia, “Research on network intrusion
detection based on incremental extreme learning machine and adaptive
principal component analysis,”
Energies
, vol. 12, no. 7, p.1223, 2019.
[25] R. Vinayakumar, M. Alazab, K.P. Soman, P. Poornachandran, A. Al-
Nemrat and S. Venkatraman, “Deep learning approach for intelligent
intrusion detection system”,
EEE Access
, vol. 7, pp.41525-41550, 2019.
[26] S. Hanif, T. Ilyas and M. Zeeshan, M., “Intrusion detection in iot using
artificial neural networks on unsw-15 dataset”, In
16th Int. Conf. on Smart
Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT)
IEEE
, Oct. 2019, pp. 152-156.
[27] N. Moustafa and J. Slay, “The evaluation of Network Anomaly Detection
Systems: Statistical analysis of the UNSW-NB15 data set and the compar-
ison with the KDD99 data set,”
Information Security Journal: A Global
Perspective
, vol. 25, no. 1-3, pp.18-31, 2016.
[28] E. Ketzaki, A. Drosou, S. Papadopoulos and D. Tzovaras, “A light-
weighted ANN architecture for the classification of cyber-threats in mod-
ern communication networks,”. In 1
0th Int. Conf. Netw. of the Future
(NoF) IEEE
, Oct. 2019, pp. 17-24.
[29] O. Almomani, “A feature selection model for network intrusion detection
system based on PSO, GWO, FFA and GA algorithms,”
Symmetry
, vol. 12,
no. 6, p.1046, 2020.
[30] A. Nazir and R.A. Khan, “A novel combinatorial optimization based
feature selection method for network intrusion detection”,
Computers &
Security
, vol. 102, p.102164, 2021
[31] W. Zong, Y.-W. Chow, andW. Susilo, “A two-stage classifier approach for
network intrusion detection,” in
Proc. Int. Conf. Inf. Secur. Pract. Exper.
Cham, Switzerland: Springer
, 2018, pp. 329-340.
[32] C. Khammassi and S. Krichen, “A GA-LR wrapper approach for feature
selection in network intrusion detection”,
computers & security
, vol. 70,
pp.255-277, 2017.
[33] S.M. Kasongo and Y. Sun, “Performance Analysis of Intrusion Detection
Systems Using a Feature Selection Method on the UNSW-NB15 Dataset,”.
Journ. Big Data
, vol. 7, no.1, pp.1-20, 2020.
[34] D. Jing and H.B. Chen, “SVM based network intrusion detection for the
UNSW-NB15 dataset”, In
IEEE 13th Int. Conf. on ASIC (ASICON)
, pp.
1-4, Oct. 2019.
[35] V. Kumar, D. Sinha, A.K. Das, S.C. Pandey and R.T. Goswami, “An
integrated rule based intrusion detection system: analysis on UNSW-NB15
data set and the real time online dataset,”
Cluster Comput.
, vol. 23, no. 2,
pp.1397-1418, 2020.
[36] A. Aleesa, M. Younis, A.A. Mohammed and N. Sahar, “Deep Intrusion
detection system with enhanced UNSW-NB15 dataset based on deep
learning techniques,”,
Journ. Eng. Sc. Techn
., vol. 16, no.1, pp.711-727,
2021.
[37] A.V. Elijah, A. Abdullah, N. Jhanjhi, M. Supramaniam and B. Abdullateef,
“Ensemble and deep-learning methods for two-class and multi-attack
anomaly intrusion detection: An empirical study,”
Int. J. Adv. Comput. Sci.
Appl.
, vol. 10, pp.520-528, 2019.
[38] P. Wu, H. Guo and N. Moustafa, “Pelican: A deep residual network for
network intrusion detection,” In
50th Annual IEEE/IFIP Int. Conf. on
Dependable Syst. Netw. Workshops (DSN-W)
, pp. 55-62, June 2020.
[39] A. Assiri, “Anomaly classification using genetic algorithm-based random
forest model for network attack detection,”.
CMC-COMPUTERS MATE-
RIALS & CONTINUA
, vol. 66, no. 1, pp.767-778, 2021.
[40] C. Khammassi and S. Krichen, “A NSGA2-LR wrapper approach for
feature selection in network intrusion detection,”.
Comput. Ntw.
, vol. 172,
p.107183, 2020.
[41] Z. Liu, “A method of SVM with normalization in intrusion detection”,
Procedia Env. Sc.
, vol. 11, pp.256-262, 2011.
[42] H. Sharma and S. Kumar, “A survey on decision tree algorithms of
classification in data mining”,
Int. Journ. Sc. Research (IJSR)
, vol. 5, no.
4, pp.2094-2097, 2016
[43] J. Liang, Z. Qin, S. Xiao, L. Ou and X. Lin, “Efficient and secure
decision tree classification for cloud-assisted online diagnosis services”,
IEEE Trans. Dependable Sec. Comput.
, 2019.
[44] L. Breiman, “Random forests”,
Machine Learning
, vol. 45, pp. 5–32, 2001
[45] A. Liaw and M. Wiener, “Classification and regression by randomForest”,
R news
, vol. 2, no. 3, pp.18-22, 2002
[46] G. Biau and E. Scornet, “A random forest guided tour”,
Test
, vol. 25, no.
2, pp.197-227, 2016
[47] P. Geurts, D. Ernst and L. Wehenkel, “Extremely randomized trees. Ma-
chine learning”, vol. 63, no. 1, pp.3-42, 2006.
[48] L. Davis, “Handbook of genetic algorithms”, 1991.
[49] X. Yu and M. Gen, “Introduction to evolutionary algorithms”,
Springer
Science & Business Media
, 2010.
[50] P. Tao, Z. Sun and Z. Sun, “An improved intrusion detection algorithm
based on GA and SVM”, IEEE Access, Vol. 6, pp.13624-13631, 2018.
[51] M. Almseidin, M. Alzubi, S. Kovacs and M. Alkasassbeh, “Evaluation of
machine learning algorithms for intrusion detection system”, In I
EEE 15th
Int. Symp. Intell. Sys. Inf. (SISY)
, Sept. 2017, pp. 000277-000282.
[52] S.
Narkhede,
“Understanding
auc-roc
curve,”
Towards
Data
Science
,
https://towardsdatascience.com/understanding-auc-roc-curve-
68b2303cc9c5 (accessed Apr. 04, 2021).
[53] Scikit-Learn, “Machine Learning in Python”. Accessed on: May. 3, 2020.
[Online]. Available: https://scikit-learn.org/stable/
[54] A. De Caigny, K. Coussement and K.W. De Bock, “A new hybrid
classification algorithm for customer churn prediction based on logistic
regression and decision trees”
European Journal of Operational Research
,
vol. 269,no. 2, pp.760-772, 2018.
[55] M.M. Saritas and A. Yasar, “Performance analysis of ANN and Naive
Bayes classification algorithm for data classification”,
Int. Journ. Intell.
Sys. Appl. Eng
, vol. 7, no. 2, pp.88-91, 2019.
14
VOLUME X, 2019