6 CONCLUSIONS
This paper proposes a multi-classification method
that applies the improved synthetic minority over-
sampling technique (I-SMOTE) to balance the da-
taset, employs correlation analysis and random forest
to reduce features and uses the random forest algo-
rithm to train the classifier for multi-attack type de-
tection. The experimental results based on the NSL-
KDD dataset show that it achieves a better and more
robust performance in terms of accuracy, detection
rate, false alarms and training speed.
ACKNOWLEDGEMENTS
The authors would like to thank the editorial board
and reviewers. This work was supported by the Re-
search on Key Technologies of High Security and
Trustworthy Mobile Terminal Operating System Se-
curity Protection (2017YFB0801902).
REFERENCES
Amin Hatef M., Shaker V., Reza Jabbarpour M. et al.
HIDCC: A hybrid intrusion detection approach in cloud
computing. Concurrency Computat: Pract Exper., 2018;
30: e4171.
Luo B., Xia J., A novel intrusion detection system based on
feature generation with visualization strategy. Expert
Syst. Appl. 41 (9) (2014) 4139-4147.
Tan L. L., Li C. and Xia J. M., Application of self-organizing
feature map neural network based on K-means clustering
in network intrusion detection. CMC-Computers Materi-
als & Continua, 61 (1) (2019) 275-288.
Bamakan S. M. H., Wang H., Tian Y., Shi Y., An effective
intrusion detection framework based on mclp/svm opti-
mized by time-varying chaos particle swarm optimiza-
tion, Neurocomputing 199 (2016) 90-102.
Kuang F., Xu W., Zhang S., A novel hybrid kpca and svm
with ga model for intrusion detection. Appl. Soft. Com-
put. 18 (4) (2014) 178-184.
Horng S. J., Su M. Y., Chen Y. H., Kao T. W. ,, A novel
intrusion detection system based on hierarchical cluster-
ing and support vector machines, Expert Syst. Appl. 38
(1) (2011) 306-313.
Li X. K., Chen W., and Zhang Q. R., 2020. Building Auto-
Encoder Intrusion Detection System based on random
forest feature selection. 95.10.1016/j.cose.2020.10 1851.
Chauhan,V. Kumar, S. Pundir, and E. S. Pilli. 2013. A com-
parative study of classification techniques for intrusion
detection. In 2013 International Symposium on Compu-
tational and Business Intelligence.40–43.
Amira Sayed A. Aziz, Sanaa EL-Ola Hanafi, and Aboul Ella
Hassanien. 2017. Comparison of classification techi
niques applied for network intrusion detection and clas-
sification. Journal of Applied Logic 24 (2017), 109–118.
Manjula C. Belavagi and Balachandra Muniyal. 2016. Per-
formance evaluation of supervised machine learning al-
gorithms for intrusion detection. Procedia Computer Sci-
ence 89(Jan.2016),117–123
Golrang A., Golrang A. M., and Yayilgan S. Y.. 2020. A
Novel Hybrid IDS Based on Modified NSGAII-ANN
and Random Forest. 9 (4) 2020.
Tesfahun A. and Bhaskari D. L., 2013. Intrusion detection
using random forests classifier with SMOTE and feature
reduction In 2013 International Conference on Cloud
Ubiquitous Computing Emerging Technologies.127–
132.
Malik A. J., Shahzad W., and Khan F. A., 2011. Binary PSO
and random forests algorithm for PROBE attacks detec-
tion in a network. In 2011 IEEE Congress of Evolution-
ary Computation (CEC’11).662–668.
Malik A. J. and Khan F. A., 2013. A hybrid technique using
multi-objective particle swarm optimization and random
forests for PROBE attacks detection in a network. In
2013 IEEE International Conference on Systems, Man,
and Cybernetics. 2473–2478.
Arif Jamal Malik, Waseem Shahzad, and Farrukh Aslam
Khan. 2015. Network intrusion detection using hybrid bi-
nary PSO and random forests algorithm.8, 16 (Nov.
2015), 2646–2660.
Zhong SH, Huang HJ, Chen AB. 2011. An effective intrusion
detection model based on random forest and neural net-
works. Advanced Materials Research, vol. 267 (308), pp.
308–313.
Md. Al Mehedi Hasan, Mohammed Nasser, Biprodip and
Shamim Ahmad. 2014. Support Vector Machine and
Random Forest Modeling for IDS, JILSA, pp. 45–52.
Tan X. P., Su S. J., Huang Z. P. , Guo X. J., Wireless Sensor
Networks Intrusion Detection Based on SMOTE and the
Random Forest Algorithm, Sensors 2019. 19, 203.
Wang L., Chen H. M., Unbalanced dataset classification
method based on NKSMOTE algorithm. Computer Sci-
ence, 2018, 9 (45), 260-265.
Tavalaee M., Bagheri E., Lu W., Ghorbani A. A., 2009. A
detailed analysis of the kdd cup 99 data set, in: Proceed-
ings of the Second IEEE Symposium on Computational
Intelligence for Security and Defense Applications,
2009.
Bhattacharya S., Selvakumar S., 2015. LAWRA: a layered
wrapper feature selection approach for network attack
detection, Security Commun Netw 8 (18), 3459–3468.
De La Hoz E., Ortiz A., Ortega J., Prieto B., 2015. PCA filter-
ing and probabilistic som for network intrusion detection,
Neurocomputing 164, 71–81.
Kim G., Lee S., Kim S., 2014. A novel hybrid intrusion de-
tection method integrating anomaly detection with mis-
use detection, Expert Syst. Appl. 41 (4), 1690–1700.
Wei-Chao L., Shih-Wen Ke, Chih-Fong T., CANN: An in-
trusion detection system based on combining cluster cen-
ters and nearest neighbors. Knowledge-Based Systems.
78 (2015) 13-21.
Chen Tongbao, Wen Liangming, Li Jianhui. A Data Predic-
tion Method Based on Feature Selection and Transfer
Learning[J].Frontiers of Data & Computing,2020,2(2):
145-154.