6 CONCLUSION
In the realm of Intrusion Detection Systems (IDS), a
critical bastion safeguarding vulnerable network
environments from various covert attacks, the
challenge arises from these threats' ability to mimic
legitimate network actions. This proves to be a
significant hurdle for machine learning algorithms,
which struggle due to the scarcity of malicious
instances for effective training. In response, this study
introduces pioneering solutions: the MCMCRO and
GANMCMCRO algorithms. MCMCRO creatively
tackles imbalanced datasets by generating synthetic
data, achieving equilibrium in the CSE-CIC-IDS2018
Dataset. Expanding on this, the GANMCMCRO
framework blends MCMCRO with GANs,
augmenting data generation and balance.
The impact of these innovations resonates in
experimental outcomes. Integrating MCMCRO with
linear discriminant analysis redefines Infiltration
activity detection, yielding substantial precision,
recall, F1 score, and accuracy enhancements. These
advancements are statistically significant (p<0.054),
reflecting the potency of the approach. Beyond
compatibility with diverse machine learning
algorithms, the optimized integration within
GANMCMCRO showcases adaptability and
effectiveness, as seen in the results applying
MCMCRO and GANMCMCRO to the CSE-CIC-
IDS2018 Dataset alongside Easy Ensemble.
In the landscape of IDS and imbalanced data
handling, these contributions mark a pioneering
milestone, forging innovative pathways for network
security. With an anticipation of future extensions to
complex datasets, this approach empowers machine
learning algorithms for precise network defence.
REFERENCES
C. Vij and H. Saini, “Intrusion Detection Systems:
Conceptual Study and Review,” 2021 6
th
International
Conference on Signal Processing, Computing and
Control (ISPCC), 2021, pp. 694-700.
S. Seeber and G.D. Rodosek, “Towards an adaptive and
effective IDS using OpenFlow”, IFIP International
Conference on Autonomous Infrastructure
Management and Security, pp. 134-139, 2015, June.
N. Abedzadeh, M. Jacobs, “A Survey in Techniques for
Imbalanced IDS datasets,” ICICCS 2022: 16.
International Conference on Intelligent Computing and
Control Systems, August 08-09, 2022, in Montreal,
Canada.
N. Abedzadeh, M. Jacobs, “Using Markov Chain Monte
Carlo Algorithm for Sampling Imbalance Binary IDS
datasets,” 12
th
International Workshop on Security,
Privacy, Trust for Internet of Things (IoTSPT) at the
ICCCN 2022, IEEE, July 2022 in Hawaii.
N. Abedzadeh, M. Jacobs, “A Reinforcement Learning
Framework with Oversampling and Undersampling
Algorithms for Intrusion Detection System,” AIADFSB
journal of Applied Sciences, 2023.
Subiksha Srinivasa Gopalan1, Dharshini Ravikumar1, Dino
Linekar, Ali Raza1, Maheen Hasib, “Balancing
Approaches towards ML for IDS: A Survey for the
CSE-CIC IDS dataset,” 2020 International Conference
on Communications, Signal Processing, and their
Applications (ICCSPA), IEEE, 2021.
Lan Liu 1, Pengcheng Wang, Jun Lin, and Langzhou Liu,
“Intrusion Detection of Imbalanced Network Traffic
Based on Machine Learning and Deep Learning,” IEEE
access, 2020.
Akila, R., Elayaraja, E., & Sudha, A. (2019). Handling
Imbalanced Intrusion Detection System Data using
Hybrid Sampling and Machine Learning Techniques.
International Journal of Computer Applications,
975(8887), 13-17.
P. Shi, X. Chen, X. Kong and X. Cao, "SE-IDS: A Sample
Equalization Method for Intrusion Detection in
Industrial Control System," 2021 36th Youth Academic
Annual Conference of Chinese Association of
Automation (YAC), Nanchang, China, 2021, pp. 189-
195, doi: 10.1109/YAC53711.2021.9486601.
SOLARMAINFRAME, "IDS 2018 Intrusion CSVs (CSE-
CIC-IDS2018)," https://www.kaggle.com/datasets/
solarmainframe/ids-intrusion-csv, 2018.
Galit Shmueli, Peter C. Bruce, Peter Gedeck, Nitin R. Patel,
“Data Mining for Business Analytics: Concepts,
Techniques and Applications in Python”, Mathematics,
Nov 5, 2019.
Jason Brownlee, "A Gentle Introduction to Markov Chain
Monte Carlo for Probability,”, https://machinelearning
mastery.com/markov-chain-monte-carlo-for-probabili
ty/, 2019
M. N. Rosenbluth, “in The Monte Carlo Method in the
Physical Sciences”, edited by J. E. Gubernatis
(American Institute of Physics), New York, 200
N. Metropolis and S. Ulam, “The Monte Carlo method,” J.
Am. Stat. Assoc., vol. 44, no. 247, pp. 335–341, 1949.
Joseph Moukarzel, “From Scratch: Bayesian Inference,
Markov Chain Monte Carlo and Metropolis Hastings,
in python,” https://towardsdatascience.com/from-
scratch-bayesian-inference-markov-chain-monte-
carlo-and-metropolis-hastings-in-python-
ef21a29e25a, Nov 2018.
Goodfellow et al, Generative Adversarial Networks (2014)
Jason Brownlee, “How to Develop a Conditional GAN
(cGAN) From Scratch”, https://machinelearningmaste
ry.com/how-to-develop-a-conditional-generative-adve
rsarial-network-from-scratch/, July 2019
H. Zhang, C. Luo, X. Yu, and P. Ren, “Mcmc based
generative adversarial networks for handwritten
numeral augmentation,” in Proc. Int. Conf. Commun.
Signal Process. Syst., 2017, pp. 2702–2710.