..............................
..............................
..............................

Stacknet Based Decision Fusion Classifier for Network Intrusion Detection
Network intrusion is a subject of great concern to a variety of stakeholders. Decision fusion (ensemble) models that
combine several base learners have been widely used to enhance detection rate of unauthorised network intrusion. However,
the design of such an optimal decision fusion classifier is a challenging and open problem. The Matthews Correlation Coefficient
(MCC) is an effective measure for detecting associations between variables in many fields; however, very few studies have
applied it in selecting weak learners to the best of the authors’ knowledge. In this paper, we propose a decision fusion model
with correlation-based MCC weak learner selection technique to augment the classification performance of the decision fusion
model under a StackNet strategy. Specifically, the proposed model sought to improve the association between the prediction
accuracy and diversity of base classifiers. We compare our proposed model with five other ensemble models, a deep neural
model and two stand-alone state-of-the-art classifiers commonly used in network intrusion detection based on accuracy, the
Area Under Curve (AUC), recall, precision, F1-score and Kappa evaluation metrics. The experimental results using benchmark
dataset KDDcup99 from Kaggle shows that the proposed model has a identified unauthorised network traffic at 99.8% accuracy,
Extreme Gradient Boosting (Xgboost) (97.61%), Catboost (97.49%), Light Gradient Boosting Machine (LightGBM) (98.3%),
Multilayer Perceptron (MLP) (97.7%), Random Forest (RF) (97.97%), Extra Trees Classifier (ET) (95.82%), Different decision
(DT) (96.95%) and, K-Nearest Neighbor (KNN) (95.56), indicating that it is a more efficient and better intrusion detection
system.
[1] Ajdani M. and Ghaffary H., “Design Network Intrusion Detection System Using Support Vector Machine,” International Journal of Communication Systems, vol. 34, no. 3, pp. e4689, 2021.
[2] Autee P., Bagwe S., Shah V., and Srivastava K., “StackNet-DenVIS: a Multilayer Perceptron Stacked Ensembling Approach for COVID-19 Detection Using X-ray Images,” Physical and Engineering Sciences in Medicine, vol. 43, no. 4, pp. 1399-1414, 2020.
[3] Bhavani T., Rao M., and Reddy A., “Network Intrusion Detection System Using Random Forest 488 The International Arab Journal of Information Technology, Vol. 19, No. 3A, Special Issue 2022 and Decision Tree Machine Learning Techniques,” in Proceeding of the Advances in Intelligent Systems and Computing, pp. 637-643, 2020.
[4] Buil-Gil D., Miró-Llinares F., Moneva A., Kemp S., and Díaz-Castaño N., “Cybercrime And Shifts in Opportunities During COVID-19: A Preliminary Analysis in The UK,” European Societies, vol. 23, pp. S47-S59, 2021.
[5] Devarajan R. and Rao P., “An Efficient Intrusion Detection System by Using Behaviour Profiling and Statistical Approach Model,” The International Arab Journal of Information Technology, vol. 18, no. 1, pp. 114-124, 2021.
[6] Elmasry W., Akbulut A., and Zaim A., “Evolving Deep Learning Architectures for Network Intrusion Detection Using A Double PSO Metaheuristic,” Computer Networks, vol. 168, pp. 107042, 2020.
[7] Ferrag M., Maglaras L., Ahmim A., Derdour M., and Janicke H., “RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks,” Future Internet, vol. 12, no. 3, pp. 44, 2020.
[8] Fitni Q. Ramli K., “Implementation of Ensemble Learning and Feature Selection for Performance Improvements in Anomaly-Based Intrusion Detection Systems,” in Proceeding of the IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, Bali, pp. 118-124, 2020.
[9] Gamage S. and Samarabandu J., “Deep learning Methods in Network Intrusion Detection: A Survey and an Objective Comparison,” Journal of Network and Computer Applications, vol. 169, pp. 102767, 2020.
[10] Hawdon J., Parti K., and Dearden T., “Cybercrime in America amid COVID-19: the Initial Results from a Natural Experiment American,” Journal of Criminal Justice, vol. 45, no. 4, pp. 546-562, 2020.
[11] Hnaif A., Jaber K., Alia M., and Daghbosheh M., “Parallel Scalable Approximate Matching Algorithm for Network Intrusion Detection Systems the International Arab,” Journal of Information Technology, vol. 18, no. 1, pp. 77-84, 2021.
[12] Injadat M., Moubayed A., Nassif A., and Shami A., “Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1803-1816, 2021.
[13] Jiang K., Wang W., Wang A., and Wu H., “Network Intrusion Detection Combined Hybrid Sampling with Deep Hierarchical Network,” IEEE Access, vol. 8, pp. 32464-32476, 2020.
[14] Khan S., Loo K., and Din Z., “Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks,” The International Arab Journal of Information Technology, vol. 7, no. 4, pp. 435- 440, 2010.
[15] Kilincer I., Ertam F., and Sengur A., “Machine Learning Methods for Cyber Security Intrusion Detection: Datasets and Comparative Study,” Computer Networks, vol. 188, pp. 107840, 2021.
[16] Krishnaveni S., Vigneshwar P., Kishore S., Jothi B., and Sivamohan S., “Anomaly-Based Intrusion Detection System Using Support Vector Machine,” Artificial Intelligence and Evolutionary Computations in Engineering System, pp. 723-731, 2020.
[17] Mahfouz A., Abuhussein A., Venugopal D., and Shiva S., “Network Intrusion Detection Model Using One-Class Support Vector Machine,” Advances in Machine Learning and Computational Intelligence, pp. 79-86, 2021.
[18] Malik A. and Khan F., “A Hybrid Technique Using Binary Particle Swarm Optimisation and Decision Tree Pruning for Network Intrusion Detection,” Cluster Computer, vol. 21, no. 1, pp. 667-680, 2018.
[19] Michailidis M., “StackNet, Meta Modelling Framework,” https://github.com/ kaz- Anova/StackNet, Last Visited, 2022.
[20] Aljanabi M. and Ismail M., “Improved Intrusion Detection Algorithm Based on TLBO and GA Algorithms,” The International Arab Journal of Information Technology, vol. 18, no. 2, pp. 170- 179, 2021.
[21] Nti I., Adekoya A., and Weyori B., “A Comprehensive Evaluation of Ensemble Learning for Stock-Market Prediction,” Journal of Big Data, vol. 7, no. 1, pp. 1-40, 2020.
[22] Nti I., Nyarko-Boateng O., Adekoya A., and Arjun R., “Network Intrusion Detection with StackNet: A Phi Coefficient Based Weak Learner Selection Approach,” in Proceeding of the 22nd International Arab Conference on Information Technology, Abu Dhabi, pp. 10-11, 2021.
[23] Pawlicki M., Choraś M., and Kozik R., “Defending Network Intrusion Detection Systems against Adversarial Evasion Attacks,” Future Generation Computer Systems, vol. 110, pp. 148- 154, 2020.
[24] Rajagopal S., Kundapur P., and Hareesha K., “A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets,” Security and Communication Networks, vol. 2020, pp. 1-9, 2020.
[25] Relan N. and Patil D., “Implementation of Network Intrusion Detection System Using Variant Of Decision Tree Algorithm,” in Proceeding of the International Conference on Stacknet Based Decision Fusion Classifier for Network Intrusion Detection 489 Nascent Technologies in the Engineering Field, Navi Mumbai, pp. 1-5, 2015.
[26] Sahu S. and Mehtre B., “Network Intrusion Detection System Using J48 Decision Tree,” in Proceeding of the International Conference on Advances in Computing, Communications and Informatics, Kochi, pp. 2023-2026, 2015.
[27] Salo F., Injadat M., Nassif A., and Essex A., “Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review,” arXiv preprint arXiv: 2005.12267, 2020.
[28] Salo F., Injadat M., Nassif A., Shami A., and Essex A., “Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review,” IEEE Access, vol. 6, pp. 56046-56058, 2018.
[29] Senthilnayaki B., Venkatalakshmi K., and Kannan A., “Intrusion Detection System Using Fuzzy Rough Set Feature Selection and Modified KNN Classifier,” The International Arab Journal of Information Technology, vol. 16, no. 4, pp. 746- 753, 2019.
[30] Shah S., Muhuri P., Yuan X., and Roy K., Chatterjee P., “Implementing a Network Intrusion Detection System Using Semi-Supervised Support Vector Machine and Random Forest,” in Proceedings of the 2021 ACM Southeast Conference, pp. 180-184, New York, 2021.
[31] Singh J., Kaur L., and Gupta S., “A Cross-Layer Based Intrusion Detection Technique for Wireless Networks,” The International Arab Journal of Information Technology, vol. 9, no. 3, pp. 201- 207, 2012.
[32] Sornsuwit P. and Jaiyen S., “A New Hybrid Machine Learning for Cybersecurity Threat Detection Based on Adaptive Boosting,” Applied Artificial Intelligence, vol. 33, no. 5, pp. 462-482, 2019.
[33] Sornsuwit P. and Jaiyen S., “Intrusion Detection Model Based On Ensemble Learning for U2R and R2L Attacks,” in Proceeding of the 7th International Conference on Information Technology and Electrical Engineering, Chiang Mai, pp. 354-359, 2015.
[34] Su T., Sun H., Zhu J., Wang S., and Li Y., “BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset,” IEEE Access, vol. 8, pp. 29575-29585, 2020.
[35] Tabash M., Allah M., and Tawfik B., “Intrusion Detection Model Using Naive Bayes And Deep Learning Technique,” The International Arab Journal of Information Technology, vol. 17, no. 2, pp. 215-224, 2020.
[36] Tama B. and Lim S., “Ensemble learning for Intrusion Detection Systems: A Systematic Mapping Study and Cross-Benchmark Evaluation,” Computer Science Review, vol. 39, pp. 100357, 2021.
[37] Tian J. and Gao M., “Network Intrusion Detection Method Based on High Speed and Precise Genetic Algorithm Neural Network,” in Proceeding of the International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, pp. 619-622, 2009.
[38] Vinayakumar R., Soman K., and Poornachandran P., “Applying Convolutional Neural Network For Network Intrusion Detection,” in Proceeding of the International Conference on Advances in Computing, Communications and Informatics, Manipal, pp. 1222-1228, 2017.
[39] Wang Y., Shen Y., and Zhang G., “Research on Intrusion Detection Model Using Ensemble learning Methods,” in Proceeding of the 7th IEEE International Conference on Software Engineering and service science, pp. 422-425, 2016.
[40] Wazirali R., “An Improved Intrusion Detection System Based on KNN Hyperparameter Tuning and Cross-Validation,” Arabian Journal for Science and Engineering, vol. 45, no. 12, pp. 10859-10873, 2020.
[41] Wolpert D., “Stacked Generalisation,” Neural Networks, vol. 5, no. 2, pp. 241-259, 1992. 490 The International Arab Journal of Information Technology, Vol. 19, No. 3A, Special Issue 2022 Isaac Kofi Nti (Member IEEE) holds Ph.D. in Computer Science and Engineering and is a Lecturer at the Department of Computer Science and Informatics, University of Energy and Natural Resources (UENR), Sunyani Ghana. His research interests include artificial intelligence, energy system modelling, intelligent information systems, social and sustainable computing, business analytics and data privacy and security. He has widely published & reviews for refereed journals. ORCID: https://orcid.org/0000-0001- 9257-4295. Owusu Nyarko-Boateng holds HND Electrical and Electronic Engineering (2000), BSc Computer Science (2012), Postgraduate Diploma in Education - PGDE (2017), MSc Information Technology (2016) and PhD in Computer Science. He has also obtained some professional certifications. He has over ten years of working experience as a Transmissions & Operations Engineer with MTN-Gh and Huawei Technology (SA), Ghana. He is a lecturer at the University of Energy and Natural Resources, Sunyani- Ghana. His research interest is in Optical Technology, Submarine and Underground fiber optics cable transmission, 5G, data communication, intelligent transmission systems, and deploying machine learning in tracing faults, and IT Policy formulation and deployment. https://orcid.org/0000-0003-0300-2469. Adebayo Felix Adekoya holds B. Sc. (1994), M. Sc. (2002), and Ph. D. (2010) in Computer Science, an MBA in Accounting & Finance (1998), and a Postgraduate Diploma in Teacher Education (2004). In addition, he has put in about twenty-five (25) years of experience as a lecturer, researcher and administrator at the higher educational institution levels in Nigeria and Ghana. A. F. Adekoya is an Associate Professor of Computer Science. Currently, he serves as the Dean, School of Sciences, and the Acting Pro-VC University of Energy and Natural Resources, Sunyani, Ghana. His research interests include artificial intelligence, business & knowledge engineering, intelligent information systems, and social and sustainable computing. ORCID: https://orcid.org/0000-0002-5029- 2393. Arjun Remadevi Somanathan is an Assistant Professor (Senior Grade) in School of Computer Science and Engineering at VIT Vellore. He has Ph.D. specialized in Information Systems from NITK, India. He holds a Masters in Software Engineering from CUSAT. His research interests are artificial intelligence, information systems, fintech, sustainable computing etc. Dr. Arjun is an Associate Editor for IJEBR, IGI Global and reviews for IJIM, Elsevier, IJIMAI, MDPI Electronics, European Alliance for Innovation and many more. His student feedback on teaching was 4.32/5.00 in 2021. He is rated as an excellent reviewer on Publons, Clarivate and was committee member/ reviewer for ICCSA 2019, AoM Annual meeting 2020-2021, FICTA 2020, ICIS 2021, ECIS 2022, IEEE WCCI 2022.ORCID: https://orcid.org/0000-0002-2770-6164.