Detailed Information

Cited 0 time in webofscience Cited 4 time in scopus
Metadata Downloads

Hi-MLIC: Hierarchical Multilayer Lightweight Intrusion Classification for Various Intrusion Scenarios

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Yunji-
dc.contributor.authorKim, Jihyeon-
dc.contributor.authorKim, Dongho-
dc.date.accessioned2024-09-26T21:32:33Z-
dc.date.available2024-09-26T21:32:33Z-
dc.date.issued2024-08-
dc.identifier.issn2169-3536-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/26340-
dc.description.abstractThere is a growing need for systems that can be used to effectively detect and classify intrusions in extensive network data exchanges. To this end, we propose <italic>Hi-MLIC</italic>, a hierarchical multilayer lightweight intrusion classification model that has been designed to address various intrusion types. This study highlights the challenges involved in classifying intrusions due to data imbalance across different types of intrusion data along with the complex nature of consolidating multiple benchmark datasets into cohesive datasets for real-time detection. To address these issues, we consolidated packet capture data from two widely used benchmark datasets, CIC-IDS2017 and UNSW-NB15, into two newer and more comprehensive datasets, CM-CIC-IDS2017 and CM-UNSW-NB15, respectively. This consolidation enables the identification and classification of a broader range of intrusion types. Our hierarchical approach achieves improved classification accuracy by effectively addressing the class imbalance that is inherent in non-hierarchical models. Layer-1 separates network traffic into benign and malicious categories. Layer-2 further classifies malicious traffic into four groups, while Layer-3 identifies 23 specific intrusion types. We reduced the model complexity and processing time by performing misclassification analysis and eliminating unnecessary features. Our model ultimately achieved a recall metric of up to 98.8%, thus demonstrating its effectiveness and efficiency in intrusion detection and classification. Altogether, the proposed <italic>Hi-MLIC</italic> represents a significant advancement in addressing the challenges of real-time network intrusion detection. Authors-
dc.format.extent18-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE-
dc.titleHi-MLIC: Hierarchical Multilayer Lightweight Intrusion Classification for Various Intrusion Scenarios-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2024.3450671-
dc.identifier.scopusid2-s2.0-85202784825-
dc.identifier.wosid001308174400001-
dc.identifier.bibliographicCitationIEEE Access, v.12, pp 120098 - 120115-
dc.citation.titleIEEE Access-
dc.citation.volume12-
dc.citation.startPage120098-
dc.citation.endPage120115-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorAccuracy-
dc.subject.keywordAuthorBenchmark testing-
dc.subject.keywordAuthorClassification algorithms-
dc.subject.keywordAuthorData Consolidation-
dc.subject.keywordAuthorData Format Conversion-
dc.subject.keywordAuthorFeature extraction-
dc.subject.keywordAuthorFeature Selection-
dc.subject.keywordAuthorHierarchical Classification-
dc.subject.keywordAuthorIntrusion detection-
dc.subject.keywordAuthorLightweight Model-
dc.subject.keywordAuthorMachine learning-
dc.subject.keywordAuthorMachine Learning-
dc.subject.keywordAuthorNetwork intrusion-
dc.subject.keywordAuthorNetwork Intrusion Detection-
dc.subject.keywordAuthorNonhomogeneous media-
dc.subject.keywordAuthorReal-time systems-
dc.subject.keywordAuthorTelecommunication traffic-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Dong Ho photo

Kim, Dong Ho
Software Education Institute
Read more

Altmetrics

Total Views & Downloads

BROWSE