SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks
Abstract
:1. Introduction
- We construct a novel multiscale network intrusion behavior dataset based on real-world network environments to address the lack of multiscale attack data, including three scales of attacks: light, medium, and heavy. We validate the effectiveness of multiscale attacks through experiments.
- We design two multiscale attack patterns based on continuous-type probability distributions in order to simulate the multiscale attack behaviors that can easily bleed into benign traffic (i.e., normal distribution and exponential distribution). We validate the effectiveness of SEDAT under these attack patterns through experiments.
- We propose a stacked ensemble learning-based detection model for anomalous traffic named SEDAT to defend against highly concealed multiscale network attacks.
- We analyze the effectiveness bounds of SEDAT based on the experimental results and explore the similarities between concealed attack traffic and benign traffic in real-world network environments.
2. Related Work
2.1. Intrusion Detection Dataset
2.2. Detection Methods for Anomalous Traffic
3. The Construction of a Novel Multiscale Network Intrusion Behavior Dataset
3.1. Experimental Test Environment
- Initiate the web service, start TCP Dump to capture network packets, and activate the performance probing tool to monitor the network I/O and memory usage of the web service.
- The client node runs the network access testing tool and sends network requests to the server at a fixed rate of L = 300 reqs/s. The tool records the number of requests that the server can respond to (not captured as a dataset) under different scale attacks.
- The attack node generates malicious multiscale network attack traffic using tools such as Hulk, TCP Flood, and Slowloris.
- The normal node emulates 5000 clients and generates benign network traffic for the dataset.
- The performance probing tool collects web service network I/O and memory metrics. The network access tool collects the client node’s request rate. TCP Dump stores the collected benign and malicious traffic in pcap files. CICFlowMeter is responsible for traffic feature transformation.
3.2. Generation of Multiscale Attack Traffic
3.3. Generation of Multiscale Attack Traffic Consistent with Probability Distribution
3.4. Statistical Information on Dataset
4. Stacked Ensemble Learning-Based Detection Model for Anomalous Traffic
4.1. Data Preprocessing
4.2. Feature Selection
Algorithm 1 The feature selection algorithm based on RF. |
Require: =(,); ; Ensure: Feature subset after feature selection: ; 1: i←1; 2: for do 3: model=RandomForestClassifier(); 4: =model.feature_importances; 5: +1; 6: end for 7: ; 8: ; 9: ; 10: = feature_sort() 11: =[0:18] 12: return ; |
4.3. Anomaly Detection
4.3.1. Base Learning Autoencoders
4.3.2. Stacked Ensemble Learning
Algorithm 2 The algorithm of stacked ensemble learning-based detection model for anomalous traffic to defend against multiscale network attacks. |
Require: Dataset: =(,); base learning AE model:();m=; meta-model: ; Ensure: Classification results:; 1: i←1; 2: for do 3: ; 4: ; 5: end for 6: ]; 7: ; 8: return ; |
5. Simulation Experiment
- Q1: Does the proposed SEDAT model in this paper demonstrate excellent detection performance for subtle network attacks?
- Q2: Does SEDAT demonstrate excellent detection performance against attacks of varying scales?
- Q3: In what condition would SEDAT offer little or no help? Why does it work and when does it fail?
- Q4: How do the relative parameters of SEDAT impact the detection performance?
- Q5: Are there similarities between the network traffic of attacks at different scales and benign network traffic?
5.1. Experimental Setup
5.1.1. Experimental Datasets and Comparison Methods
- RAIDS [19]: This model generates multiple feature sets and trains a baseline ML classifier. It utilizes LightGBM as the classifier, which is trained using outputs from two AEs and a set of baseline ML classifiers.
- NDAES [20]: This model utilizes two stacked NDAEs. NDAE1 includes one input layer and three hidden layers, while NDAE2 has three hidden layers. The learned feature representations are utilized to train RF classifiers for network traffic categorization.
- MLP [21]: This model is based on an MLP with a network structure that includes one input layer, two hidden layers, and one output layer.
- DNN [22]: This model includes an input layer followed by three hidden layers with 128, 64, and 32 nodes, respectively, and an output layer.
- RF [24]: This model performs classification by constructing multiple decision trees and aggregating predictions from them.
- SVM [25]: This model classifies samples by finding an optimal hyperplane in the feature space.
5.1.2. Evaluation Indicators
5.2. Detection Results
5.2.1. Detection Results on Multiscale Network Intrusion Behavior Dataset
5.2.2. Detection Results on Multiscale Network Intrusion Behavior Dataset Based on Probability Distributions
5.2.3. Detection Results of UNSW-NB15 and CIC IDS-2017 Datasets
5.2.4. Computational Complexity of SEDAT and Baseline Methods
5.3. Parameter Sensitivity Analysis
5.4. Traffic Similarity Analysis
5.5. Discussion and Improvement
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
SEDAT | Stacked ensemble learning-based detection model for anomalous traffic |
DL | Deep learning |
RF | Random forest |
DNN | Deep neural network |
AE | Autoencoder |
LAN | Local area network |
ML | Machine learning |
AI | Artificial intelligence |
I/O | Input/output |
reqs/s | Requests per second |
Mbps | Mega-bits per second |
Probability density function | |
TP | True positive |
FN | False negative |
FP | False positive |
TN | True negative |
PCA | Principal component analysis |
References
- Thanh, C.T.; Zelinka, I. A survey on artificial intelligence in malware as next-generation threats. Mendel 2019, 25, 27–34. [Google Scholar] [CrossRef]
- BBG Cyber Report: DDOS Attack Disrupts Cambridge University, Exposing UK Education Sector Vulnerabilities. Available online: https://www.bbg-mn.com/1484/16/14/ (accessed on 22 July 2024).
- Critical Incident over London Hospitals’ Cyber-Attack. Available online: https://www.bbc.com/news/articles/c288n8rkpvno (accessed on 22 July 2024).
- Wu, X.; Tang, D.; Liu, T.; Man, J.; Zhan, S.; Liu, Q. A low-rate dos attack detection method based on hilbert spectrum and correlation. In Proceedings of the 2018 IEEE Smart World, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (Smart-World/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Guangzhou, China, 8–12 October 2018; pp. 1358–1363. [Google Scholar] [CrossRef]
- Ghasemi, H.; Shahram, B. A new intrusion detection system based on SVM–GWO algorithms for Internet of Things. Wirel. Netw. 2024, 30, 2173–2185. [Google Scholar] [CrossRef]
- Turukmane, A.V.; Ramkumar, D. M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. Comput. Secur. 2024, 137, 103587. [Google Scholar] [CrossRef]
- Alzahrani, A.O.; Alenazi, M.J.F. ML-IDSDN: Machine learning based intrusion detection system for software-defined network. Concurr. Comput. Pract. Exp. 2023, 35, e7438. [Google Scholar] [CrossRef]
- Zhang, W.; Ramezani, R.; Naeim, A. WOTBoost: Weighted oversampling technique in boosting for imbalanced learning. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Milan, Italy, 9–12 December 2019; pp. 2523–2531. [Google Scholar] [CrossRef]
- Vincent, S.S.M.; Duraipandian, N. Detection and prevention of sinkhole attacks in MANETS based routing protocol using hybrid AdaBoost-Random forest algorithm. Expert Syst. Appl. 2024, 249, 123765. [Google Scholar] [CrossRef]
- Devan, P.; Khare, N. An efficient XGBoost–DNN-based classification model for network intrusion detection system. Neural Comput. Appl. 2020, 32, 12499–12514. [Google Scholar] [CrossRef]
- Alzughaibi, S.; Khediri, S. A cloud intrusion detection systems based on dnn using backpropagation and pso on the cse-cic-ids2018 dataset. Appl. Sci. 2023, 13, 2276. [Google Scholar] [CrossRef]
- Anbalagan, S.; Raja, G.; Gurumoorthy, S.; Suresh, R.D.; Dev, K. IIDS: Intelligent intrusion detection system for sustainable development in autonomous vehicles. IEEE Trans. Intell. Transp. Syst. 2023, 24, 15866–15875. [Google Scholar] [CrossRef]
- El-Ghamry, A.; Darwish, A.; Hassanien, A.E. An optimized CNN-based intrusion detection system for reducing risks in smart farming. Internet Things 2023, 22, 100709. [Google Scholar] [CrossRef]
- Kumar, G.S.C.; Kumar, R.K.; Kumar, K.P.V.; Sai, N.R.; Brahmaiah, M. Deep residual convolutional neural network: An efficient technique for intrusion detection system. Expert Syst. Appl. 2024, 238, 121912. [Google Scholar] [CrossRef]
- Jablaoui, R.; Noureddine, L. An effective deep CNN-LSTM based intrusion detection system for network security. In Proceedings of the 2024 International Conference on Control, Automation and Diagnosis (ICCAD), Paris, France, 15–17 May 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Paya, A.; Arroni, S.; García-Díaz, V.; Gómez, A. Apollon: A robust defense system against adversarial machine learning attacks in intrusion detection systems. Comput. Secur. 2024, 136, 103546. [Google Scholar] [CrossRef]
- Li, S.; Cao, Y.; Liu, S.; Lai, Y.; Zhu, Y.; Ahmad, N. Hda-ids: A hybrid dos attacks intrusion detection system for iot by using semi-supervised cl-gan. Expert Syst. Appl. 2024, 238, 122198. [Google Scholar] [CrossRef]
- Charoenkwan, P.; Chiangjong, W.; Nantasenamat, C.; Hasan, M.M.; Manavalan, B.; Shoombuatong, W. StackIL6: A stacking ensemble model for improving the prediction of IL-6 inducing peptides. Brief. Bioinform. 2021, 22, 172. [Google Scholar] [CrossRef] [PubMed]
- Sarıkaya, A.; Kılıç, B.G.; Demirci, M. RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks. Comput. Secur. 2023, 135, 103483. [Google Scholar] [CrossRef]
- Shone, N.; Ngoc, T.N.; Phai, V.D.; Shi, Q. A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2018, 2, 41–50. [Google Scholar] [CrossRef]
- Rosay, A.; Carlier, F.; Leroux, P. MLP4NIDS: An efficient MLP-Based network intrusion detection for CICIDS2017 dataset. In Proceedings of the Machine Learning for Networking: Second IFIP TC 6 International Conference, Paris, France, 3–5 December 2019; pp. 240–254. [Google Scholar] [CrossRef]
- Faker, O.; Dogdu, E. Intrusion detection using big data and deep learning techniques. In Proceedings of the 2019 ACM Southeast Conference, Kennesaw, GA, USA, 18–20 April 2019; pp. 86–93. [Google Scholar] [CrossRef]
- Paul, S.; Mukherjee, D.; Das, P.; Gangopadhyay, A.; Chintha, A.R.; Kundu, S. Improved random forest for classification. IEEE Trans. Image Process. 2018, 27, 4012–4024. [Google Scholar] [CrossRef] [PubMed]
- Cervantes, J.; Garcia-Lamont, F.; Rodríguez-Mazahua, L.; Lopez, A. A comprehensive survey on support vector machine classification: Applications, challenges and trends. Neurocomputing 2020, 408, 189–215. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 2018, 1, 108–116. [Google Scholar] [CrossRef]
- Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 10–12 November 2015; pp. 1–6. [Google Scholar] [CrossRef]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Mexico City, Mexico, 8–10 July 2009; pp. 1–6. [Google Scholar] [CrossRef]
- Dhanabal, L.; Shantharajah, S.P. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 2015, 4, 446–452. [Google Scholar] [CrossRef]
- Gopalan, S.S.; Ravikumar, D.; Linekar, D.; Raza, A.; Hasib, M. Balancing approaches towards ML for IDS: A survey for the CSE-CIC IDS dataset. In Proceedings of the 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Sharjah, United Arab Emirates, 16–18 March 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Damasevicius, R.; Venckauskas, A.; Grigaliunas, S.; Toldinas, J.; Morkevicius, N.; Aleliunas, T.; Smuikys, P. LITNET-2020: An annotated real-world network flow dataset for network intrusion detection. Electronics 2020, 9, 800. [Google Scholar] [CrossRef]
- Catillo, M.; Del Vecchio, A.; Ocone, L.; Pecchia, A.; Villano, U. USB-IDS-1: A public multilayer dataset of labeled network flows for IDS evaluation. In Proceedings of the 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Taipei, Taiwan, 21–24 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Patel, N.D.; Mehtre, B.M.; Wankar, R. Od-ids2022: Generating a new offensive defensive intrusion detection dataset for machine learning-based attack classification. Int. J. Inf. Technol. 2023, 15, 4349–4363. [Google Scholar] [CrossRef]
- Herzalla, D.; Lunardi, W.T.; Andreoni, M. TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection. IEEE Access 2023, 11, 118577–118594. [Google Scholar] [CrossRef]
- Kim, Y.; Hakak, S.; Ghorbani, A. Ddos attack dataset (cicev2023) against ev authentication in charging infrastructure. In Proceedings of the 2023 20th Annual International Conference on Privacy, Security and Trust (PST), Copenhagen, Denmark, 21–23 August 2023; pp. 1–9. [Google Scholar] [CrossRef]
- Buzzio-García, J.; Vergara, J.; Ríos-Guiral, S.; Garzón, C.; Gutiérrez, S.; Botero, J.F.; Quiroz-Arroyo, J.L.; Pérez-Díaz, J.A. Exploring Traffic Patterns Through Network Programmability: Introducing SDNFLow, a Comprehensive OpenFlow-Based Statistics Dataset for Attack Detection. IEEE Access 2024, 12, 42163–42180. [Google Scholar] [CrossRef]
- Cordero, C.G.; Vasilomanolakis, E.; Wainakh, A.; Mühlhäuser, M.; Nadjm-Tehrani, S. On generating network traffic datasets with synthetic attacks for intrusion detection. ACM Trans. Priv. Secur. 2021, 24, 1–39. [Google Scholar] [CrossRef]
- Ferriyan, A.; Thamrin, A.H.; Takeda, K.; Murai, J. Generating network intrusion detection dataset based on real and encrypted synthetic attack traffic. Appl. Sci. 2021, 11, 7868. [Google Scholar] [CrossRef]
- Kumar, V.; Sinha, D. Synthetic attack data generation model applying generative adversarial network for intrusion detection. Comput. Secur. 2023, 125, 103054. [Google Scholar] [CrossRef]
- Ashfaq, R.A.R.; Wang, X.Z.; Huang, J.Z.; Abbas, H.; He, Y.L. Fuzziness based semi-supervised learning approach for intrusion detection system. Inf. Sci. 2017, 378, 484–497. [Google Scholar] [CrossRef]
- Jabez, J.; Muthukumar, B. Intrusion Detection System (IDS): Anomaly detection using outlier detection approach. Procedia Comput. Sci. 2015, 48, 338–346. [Google Scholar] [CrossRef]
- Ianni, M.; Masciari, E. Scout: Security by computing outliers on activity logs. Comput. Secur. 2023, 132, 103355. [Google Scholar] [CrossRef]
- Dong, S. Multi class SVM algorithm with active learning for network traffic classification. Expert Syst. Appl. 2021, 176, 114885. [Google Scholar] [CrossRef]
- Hu, F.; Zhang, S.; Lin, X.; Wu, L.; Liao, N.; Song, Y. Network traffic classification model based on attention mechanism and spatiotemporal features. URASIP J. Inf. Secur. 2023, 2023, 6. [Google Scholar] [CrossRef]
- Xiao, X.; Xiao, W.; Li, R.; Luo, X.; Zheng, H.; Xia, S. EBSNN: Extended byte segment neural network for network traffic classification. IEEE Trans. Dependable Secur. Comput. 2021, 19, 3521–3538. [Google Scholar] [CrossRef]
- Diallo, A.F.; Patras, P. Adaptive clustering-based malicious traffic classification at the network edge. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications, New York City, NY, USA, 10–13 May 2021; pp. 1–10. [Google Scholar] [CrossRef]
- Kaja, N.; Shaout, A.; Ma, D. An intelligent intrusion detection system. Appl. Intell. 2019, 49, 3235–3247. [Google Scholar] [CrossRef]
- Hsu, Y.F.; He, Z.Y.; Tarutani, Y.; Matsuoka, M. Toward an online network intrusion detection system based on ensemble learning. In Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA, 2–8 July 2023; pp. 174–178. [Google Scholar] [CrossRef]
- Vaca, F.D.; Niyaz, Q. An ensemble learning based wi-fi network intrusion detection system (wnids). In Proceedings of the 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA, 1–3 November 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Xu, C.; Shen, J.; Du, X.; Zhang, F. An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 2018, 6, 48697–48707. [Google Scholar] [CrossRef]
- Tang, D.; Wang, S.; Liu, B.; Jin, W.; Zhang, J. GASF-IPP: Detection and mitigation of LDoS attack in SDN. IEEE Trans. Serv. Comput. 2023, 16, 3373–3384. [Google Scholar] [CrossRef]
- Tang, D.; Zhang, S.; Yan, Y.; Chen, J.; Qin, Z. Real-time detection and mitigation of LDoS attacks in the SDN using the HGB-FP algorithm. IEEE Trans. Serv. Comput. 2021, 15, 3471–3484. [Google Scholar] [CrossRef]
- Hulk DoS Tool. Available online: https://github.com/grafov/hulk (accessed on 22 July 2024).
- TCP-UDP-Flood. Available online: https://github.com/Leeon123/TCP-UDP-Flood/tree/master (accessed on 22 July 2024).
- slowloris.py—Simple Slowloris in Python. Available online: https://github.com/gkbrk/slowloris (accessed on 22 July 2024).
- Gin Web Framework. Available online: https://gin-gonic.com/ (accessed on 22 July 2024).
- TCPDUMP 4.x.y by The Tcpdump Group. Available online: https://github.com/the-tcpdump-group/tcpdump (accessed on 22 July 2024).
- CICFlowmeter-V4.0. Available online: https://github.com/ahlashkari/CICFlowMeter (accessed on 22 July 2024).
- curl-loader. Available online: https://curl-loader.sourceforge.net/ (accessed on 22 July 2024).
- Shi, G.; Song, J.; Li, J. Research on the Impact of Different Feature Stream Data on Flink Performance. Comput. Sci. Appl. 2022, 12, 2599. [Google Scholar] [CrossRef]
- Ding, C.; Chen, Y.; Liu, Z.; Alshehri, A.M.; Liu, T. Fractal characteristics of network traffic and its correlation with network security. Fractals 2022, 30, 2240067. [Google Scholar] [CrossRef]
- Alasmar, M.; Clegg, R.; Zakhleniuk, N.; Parisis, G. Internet traffic volumes are not Gaussian—They are log-normal: An 18-year longitudinal study with implications for modelling and prediction. IEEE/ACM Trans. Netw. 2021, 29, 1266–1279. [Google Scholar] [CrossRef]
- Sah, D.K.; Cengiz, K.; Donta, P.K.; Inukollu, V.N.; Amgoth, T. EDGF: Empirical dataset generation framework for wireless sensor networks. Comput. Commun. 2021, 180, 48–56. [Google Scholar] [CrossRef]
- Nuha, H.H.; Prabowo, S. Tcp congestion window analysis of twitter with exponential model. In Proceedings of the 2018 6th International Conference on Information and Communication Technology (ICoICT), Bandung, Indonesia, 3–5 May 2018; pp. 61–65. [Google Scholar] [CrossRef]
Name of the CSV File | Total | Attack | Benign |
---|---|---|---|
Hulk_light | 400,130 | 324,595 | 75,535 |
Hulk_medium | 416,092 | 338,360 | 77,732 |
Hulk_heavy | 440,635 | 369,387 | 71,248 |
TCP_Flood_light | 2761 | 2620 | 141 |
TCP_Flood_medium | 2791 | 2669 | 122 |
TCP_Flood_heavy | 2659 | 2608 | 51 |
Slowloris_light | 399,375 | 395,248 | 4127 |
Slowloris_medium | 476,743 | 429,339 | 47,404 |
Slowloris_heavy | 420,697 | 419,671 | 1026 |
Hulk_normal_distribution | 765,860 | 693,861 | 71,999 |
TCP_Flood_normal_distribution | 7114 | 6984 | 130 |
Slowloris_normal_distribution | 74,425 | 71,938 | 2487 |
Hulk_exponential_distribution | 436,628 | 395,292 | 41,336 |
TCP_Flood_exponential_distribution | 4909 | 4767 | 142 |
Slowloris_exponential_distribution | 57,830 | 55,576 | 2254 |
Normal_traffic | 297,905 | 0 | 297,905 |
Attack Scale | SEDAT | RAIDS | NDAES | MLP | DNN | RF | SVM |
---|---|---|---|---|---|---|---|
Light scale | 97.9% | 98.7% | 97.3% | 96.4% | 95.7% | 96.2% | |
Medium scale | 95.4% | 96.1% | 95.7% | 95.5% | 95.3% | 95.5% | |
Heavy scale | 96.8% | 97.2% | 96.7% | 96.4% | 92.4% | 94.1% | |
Mixed scale | 94.9% | 97.5% | 96.5% | 95.9% | 96.1% | 92.6% |
Attack Scale | SEDAT | RAIDS | NDAES | MLP | DNN | RF | SVM |
---|---|---|---|---|---|---|---|
Normal distribution | 92.5% | 64.1% | 80.0% | 60.3% | 71.8% | 67.0% | |
Exponential distribution | 91.0% | 68.8% | 58.4% | 55.6% | 67.7% | 59.9% |
Dataset | SEDAT | RAIDS | NDAES | MLP | DNN | RF | SVM |
---|---|---|---|---|---|---|---|
UNSW-NB15 | 84.8% | 94.9% | 99.3% | 97.7% | 92.7% | 88.1% | |
CIC IDS-2017 | 99.0% | 94.7% | 96.3% | 99.1% | 98.8% | 94.9% |
SEDAT | RAIDS | NDAES | MLP | DNN | RF | SVM |
---|---|---|---|---|---|---|
222 s | 191 s | 116 s | 133 s | 113 s | 7 s | 7 s |
Hidden Layer | Accuracy | Precision | Recall |
---|---|---|---|
2 | 98.55% | 98.32% | 98.73% |
3 | 98.50% | 98.40% | 98.55% |
4 | 98.60% | 98.50% | 98.60% |
5 | 98.57% | 98.75% | 98.33% |
6 | 98.90% | 99.08% | 98.68% |
7 | 98.80% | 98.83% | 98.72% |
8 | 98.77% | 98.74% | 98.75% |
9 | 98.47% | 98.53% | 98.36% |
10 | 98.86% | 98.92% | 98.76% |
11 | 98.85% | 98.99% | 98.67% |
12 | 98.60% | 98.74% | 98.41% |
13 | 98.72% | 98.67% | 98.73% |
14 | 98.56% | 98.71% | 98.36% |
15 | 98.68% | 98.62% | 98.70% |
% | % | ||
17 | 98.77% | 98.72% | 98.77% |
18 | 98.78% | 98.63% | 98.75% |
Batch Size | Time(s) | Accuracy | Precision | Recall |
---|---|---|---|---|
8 | 653 | 98.7% | 98.6% | 98.8% |
16 | 331 | 98.8% | 98.8% | 98.7% |
32 | 174 | 98.8% | 98.8% | 98.7% |
64 | 93 | 98.7% | 98.6% | 98.7% |
128 | 52 | 98.5% | 98.4% | 98.5% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Feng, Y.; Yang, Z.; Sun, Q.; Liu, Y. SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks. Electronics 2024, 13, 2953. https://doi.org/10.3390/electronics13152953
Feng Y, Yang Z, Sun Q, Liu Y. SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks. Electronics. 2024; 13(15):2953. https://doi.org/10.3390/electronics13152953
Chicago/Turabian StyleFeng, Yan, Zhihai Yang, Qindong Sun, and Yanxiao Liu. 2024. "SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks" Electronics 13, no. 15: 2953. https://doi.org/10.3390/electronics13152953
APA StyleFeng, Y., Yang, Z., Sun, Q., & Liu, Y. (2024). SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks. Electronics, 13(15), 2953. https://doi.org/10.3390/electronics13152953