6  CONCLUSIONS 
This  paper  proposes  a  multi-classification  method 
that  applies  the  improved  synthetic  minority  over-
sampling  technique  (I-SMOTE)  to  balance  the  da-
taset, employs correlation analysis and random forest 
to reduce features  and  uses  the random forest algo-
rithm to train the classifier for multi-attack type de-
tection. The experimental results based on the NSL-
KDD dataset show that it achieves a better and more 
robust  performance  in  terms  of  accuracy,  detection 
rate, false alarms and training speed. 
ACKNOWLEDGEMENTS 
The authors would like  to thank the editorial board 
and reviewers. This work was supported by the Re-
search  on  Key  Technologies  of  High  Security  and 
Trustworthy Mobile Terminal Operating System Se-
curity Protection (2017YFB0801902). 
REFERENCES 
Amin  Hatef  M.,  Shaker  V.,  Reza  Jabbarpour  M.  et  al. 
HIDCC: A hybrid intrusion detection approach in cloud 
computing. Concurrency Computat: Pract Exper., 2018; 
30: e4171. 
Luo B., Xia J., A novel intrusion detection system based on 
feature  generation  with  visualization  strategy.  Expert 
Syst. Appl. 41 (9) (2014) 4139-4147. 
Tan L. L., Li C. and Xia J. M., Application of self-organizing 
feature map neural network based on K-means clustering 
in network intrusion detection. CMC-Computers Materi-
als & Continua, 61 (1) (2019) 275-288. 
Bamakan S. M. H., Wang H., Tian Y., Shi Y., An effective  
  intrusion detection framework based on mclp/svm opti-
mized  by  time-varying  chaos  particle  swarm  optimiza-
tion, Neurocomputing 199 (2016) 90-102. 
Kuang F., Xu W., Zhang S., A novel hybrid kpca  and svm 
with ga model for intrusion detection. Appl. Soft. Com-
put. 18 (4) (2014) 178-184. 
Horng S. J.,  Su M. Y.,   Chen Y. H., Kao T. W. ,, A novel 
intrusion detection system based on hierarchical cluster-
ing and support vector machines, Expert Syst. Appl. 38 
(1) (2011) 306-313. 
Li X. K., Chen W., and Zhang Q. R., 2020. Building Auto-
Encoder  Intrusion  Detection  System  based  on  random 
forest feature selection. 95.10.1016/j.cose.2020.10 1851. 
Chauhan,V. Kumar, S. Pundir, and E. S. Pilli. 2013. A com-
parative  study of  classification  techniques  for  intrusion 
detection. In 2013 International Symposium on Compu-
tational and Business Intelligence.40–43. 
Amira Sayed A. Aziz, Sanaa EL-Ola Hanafi, and Aboul Ella 
Hassanien.   2017.   Comparison   of   classification   techi
 
niques applied for network intrusion detection and clas-
sification. Journal of Applied Logic 24 (2017), 109–118. 
Manjula C. Belavagi and Balachandra Muniyal. 2016. Per-
formance evaluation of supervised machine learning al-
gorithms for intrusion detection. Procedia Computer Sci-
ence 89(Jan.2016),117–123 
Golrang  A.,  Golrang  A.  M.,  and  Yayilgan  S.  Y..  2020.  A 
Novel  Hybrid  IDS  Based  on  Modified  NSGAII-ANN 
and Random Forest. 9 (4) 2020. 
Tesfahun  A.  and Bhaskari  D.  L.,  2013.  Intrusion  detection 
using random forests classifier with SMOTE and feature 
reduction  In  2013  International  Conference  on  Cloud 
Ubiquitous  Computing  Emerging  Technologies.127–
132. 
Malik A. J., Shahzad W., and Khan F. A., 2011. Binary PSO 
and random forests algorithm for PROBE attacks detec-
tion in a network. In 2011 IEEE Congress of Evolution-
ary Computation (CEC’11).662–668. 
Malik A. J. and Khan F. A., 2013. A hybrid technique using 
multi-objective particle swarm optimization and random 
forests  for  PROBE  attacks  detection  in  a  network.  In 
2013 IEEE International Conference on Systems, Man, 
and Cybernetics. 2473–2478. 
Arif  Jamal  Malik,  Waseem  Shahzad,  and  Farrukh  Aslam 
Khan. 2015. Network intrusion detection using hybrid bi-
nary  PSO  and  random  forests  algorithm.8,  16  (Nov. 
2015), 2646–2660. 
Zhong SH, Huang HJ, Chen AB. 2011. An effective intrusion 
detection model based on random forest and neural net-
works. Advanced Materials Research, vol. 267 (308), pp. 
308–313. 
Md.  Al  Mehedi  Hasan,  Mohammed  Nasser,  Biprodip  and 
Shamim  Ahmad.  2014.  Support  Vector  Machine  and 
Random Forest Modeling for IDS, JILSA, pp. 45–52. 
Tan X. P., Su S. J., Huang Z. P. , Guo X. J., Wireless Sensor 
Networks Intrusion Detection Based on SMOTE and the 
Random Forest Algorithm, Sensors 2019. 19, 203. 
Wang  L.,  Chen  H.  M.,  Unbalanced  dataset  classification 
method based on NKSMOTE algorithm. Computer Sci-
ence, 2018, 9 (45), 260-265. 
Tavalaee M., Bagheri  E., Lu W., Ghorbani A.  A.,  2009.  A 
detailed analysis of the kdd cup 99 data set, in: Proceed-
ings of the Second IEEE Symposium on Computational 
Intelligence  for  Security  and  Defense  Applications, 
2009. 
Bhattacharya  S.,  Selvakumar  S.,  2015. LAWRA: a layered 
wrapper  feature  selection  approach  for  network  attack 
detection, Security Commun Netw 8 (18), 3459–3468. 
De La Hoz E., Ortiz A., Ortega J., Prieto B., 2015. PCA filter-
ing and probabilistic som for network intrusion detection, 
Neurocomputing 164, 71–81. 
Kim G., Lee S., Kim S., 2014. A novel hybrid intrusion de-
tection method integrating anomaly detection with mis-
use detection, Expert Syst. Appl. 41 (4), 1690–1700. 
Wei-Chao L., Shih-Wen Ke, Chih-Fong T., CANN: An in-
trusion detection system based on combining cluster cen-
ters and nearest neighbors. Knowledge-Based Systems. 
78 (2015) 13-21. 
Chen Tongbao, Wen Liangming, Li Jianhui. A Data Predic-
tion  Method  Based  on  Feature  Selection  and  Transfer 
Learning[J].Frontiers  of  Data  &  Computing,2020,2(2): 
145-154.