Skip to main content

Intrusion Detection Based on GA-XGB Algorithm

  • Conference paper
  • First Online:
Data Mining and Big Data (DMBD 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1453))

Included in the following conference series:

  • 708 Accesses

Abstract

With the development of network technology, the importance of intrusion detection has gradually increased. At the same time, due to the continuous increase in the number of network connections, the efficiency of traditional intrusion detection technologies is low. In order to solve this problem, this article uses GA-XGB algorithm for intrusion detection. The model uses genetic algorithm for feature selection, remove redundant and low-relevant features and XGBoost algorithm for final classification. Experiments conducted with the KDD data set prove that the accuracy, recall, F1 score and ROC score of the GA-XGB algorithm are improved compared to other traditional machine learning algorithms.

X. Wen−Project Fund: Research Project of Fundamental Scientific Research Business Expenses of Provincial Colleges and Universities in Hebei Province 2021QNJS04.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Frohlich, H., Chapelle, O., Scholkopf, B.: Feature selection for support vector machines by means of genetic algorithm. In: Proceedings of 15th IEEE International Conference on Tools with Artificial Intelligence, IEEE (2003). https://doi.org/10.1109/tai.2003.1250182

  2. Yongguo, L., et al.: A genetic clustering method for intrusion detection. Pattern Recogn. 37(5), 927–942 (2004)

    Google Scholar 

  3. Il-Seok, O., Jin-Seon, L., Byung-Ro, M.: Hybrid genetic algorithms for feature selection. IEEE Trans. Pattern Anal. Mach. Intell. 26(11), 1424–1437 (2004)

    Google Scholar 

  4. Yongguo, L., et al.: A genetic clustering method for intrusion detection. Pattern Recogn. 37(5), 927–942 (2004)

    Google Scholar 

  5. Gong, M., et al.: Bio-inspired Computing–Theories and Applications (2016)

    Google Scholar 

  6. Dreiseitl, S., Ohno-Machado, L.: Logistic regression and artificial neural network classification models: a methodology review. J. Biomed. Inf. 35(5–6), 352–359 (2002)

    Google Scholar 

  7. Schuldt, C., Ivan, L., Barbara, C.: Recognizing human actions: a local SVM approach. In: Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004, vol. 3, IEEE (2004)

    Google Scholar 

  8. Moraes, R., Valiati, J.F., Neto, W.P.G.: Document-level sentiment classification: an empirical comparison between SVM and ANN. Expert Syst. Appl. 40(2), 621–633 (2013)

    Google Scholar 

  9. Chen, T., Carlos, G.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining (2016)

    Google Scholar 

  10. Chen, T., et al.: Xgboost: extreme gradient boosting. R package version 0.4–2 1.4 (2015)

    Google Scholar 

  11. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani., A.: Detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6. IEEE (July 2009)

    Google Scholar 

  12. Liu, M., et al.: Learning based adaptive network immune mechanism to defense eavesdropping attacks. IEEE Access 7, 182814–182826 (2019)

    Google Scholar 

  13. Xu, J., et al.: Stochastic multi-objective optimization of photovoltaics integrated three-phase distribution network based on dynamic scenarios. Appl. Energy 231, 985–996 (2018)

    Google Scholar 

  14. Ding, S., Genying, W.: Research on intrusion detection technology based on deep learning. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), IEEE (2017)

    Google Scholar 

  15. Hajian-Tilaki, K.: Receiver operating characteristic (ROC) curve analysis for medical diagnostic test evaluation. Caspian J. Internal Med. 4, 627 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, R., Mu, Y., Wen, X. (2021). Intrusion Detection Based on GA-XGB Algorithm. In: Tan, Y., Shi, Y., Zomaya, A., Yan, H., Cai, J. (eds) Data Mining and Big Data. DMBD 2021. Communications in Computer and Information Science, vol 1453. Springer, Singapore. https://doi.org/10.1007/978-981-16-7476-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-7476-1_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-7475-4

  • Online ISBN: 978-981-16-7476-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics