Cited 4 time in
Hi-MLIC: Hierarchical Multilayer Lightweight Intrusion Classification for Various Intrusion Scenarios
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, Yunji | - |
| dc.contributor.author | Kim, Jihyeon | - |
| dc.contributor.author | Kim, Dongho | - |
| dc.date.accessioned | 2024-09-26T21:32:33Z | - |
| dc.date.available | 2024-09-26T21:32:33Z | - |
| dc.date.issued | 2024-08 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/26340 | - |
| dc.description.abstract | There is a growing need for systems that can be used to effectively detect and classify intrusions in extensive network data exchanges. To this end, we propose <italic>Hi-MLIC</italic>, a hierarchical multilayer lightweight intrusion classification model that has been designed to address various intrusion types. This study highlights the challenges involved in classifying intrusions due to data imbalance across different types of intrusion data along with the complex nature of consolidating multiple benchmark datasets into cohesive datasets for real-time detection. To address these issues, we consolidated packet capture data from two widely used benchmark datasets, CIC-IDS2017 and UNSW-NB15, into two newer and more comprehensive datasets, CM-CIC-IDS2017 and CM-UNSW-NB15, respectively. This consolidation enables the identification and classification of a broader range of intrusion types. Our hierarchical approach achieves improved classification accuracy by effectively addressing the class imbalance that is inherent in non-hierarchical models. Layer-1 separates network traffic into benign and malicious categories. Layer-2 further classifies malicious traffic into four groups, while Layer-3 identifies 23 specific intrusion types. We reduced the model complexity and processing time by performing misclassification analysis and eliminating unnecessary features. Our model ultimately achieved a recall metric of up to 98.8%, thus demonstrating its effectiveness and efficiency in intrusion detection and classification. Altogether, the proposed <italic>Hi-MLIC</italic> represents a significant advancement in addressing the challenges of real-time network intrusion detection. Authors | - |
| dc.format.extent | 18 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | IEEE | - |
| dc.title | Hi-MLIC: Hierarchical Multilayer Lightweight Intrusion Classification for Various Intrusion Scenarios | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ACCESS.2024.3450671 | - |
| dc.identifier.scopusid | 2-s2.0-85202784825 | - |
| dc.identifier.wosid | 001308174400001 | - |
| dc.identifier.bibliographicCitation | IEEE Access, v.12, pp 120098 - 120115 | - |
| dc.citation.title | IEEE Access | - |
| dc.citation.volume | 12 | - |
| dc.citation.startPage | 120098 | - |
| dc.citation.endPage | 120115 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordAuthor | Accuracy | - |
| dc.subject.keywordAuthor | Benchmark testing | - |
| dc.subject.keywordAuthor | Classification algorithms | - |
| dc.subject.keywordAuthor | Data Consolidation | - |
| dc.subject.keywordAuthor | Data Format Conversion | - |
| dc.subject.keywordAuthor | Feature extraction | - |
| dc.subject.keywordAuthor | Feature Selection | - |
| dc.subject.keywordAuthor | Hierarchical Classification | - |
| dc.subject.keywordAuthor | Intrusion detection | - |
| dc.subject.keywordAuthor | Lightweight Model | - |
| dc.subject.keywordAuthor | Machine learning | - |
| dc.subject.keywordAuthor | Machine Learning | - |
| dc.subject.keywordAuthor | Network intrusion | - |
| dc.subject.keywordAuthor | Network Intrusion Detection | - |
| dc.subject.keywordAuthor | Nonhomogeneous media | - |
| dc.subject.keywordAuthor | Real-time systems | - |
| dc.subject.keywordAuthor | Telecommunication traffic | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
