Exploiting Machine Learning Technique for Attack Detection in Intrusion Detection System (IDS) Based on Protocol

被引:0
|
作者
Aladesote, Olomi Isaiah [1 ]
Fakoya, Johnson Tunde [1 ]
Agbelusi, Olutola [2 ]
机构
[1] Fed Polytech, Dept Comp Sci, Ile Oluji, Ondo, Nigeria
[2] Fed Univ Technol Akure, Dept Software Engn, Akure, Ondo, Nigeria
关键词
Correlation-based feature selection; Intrusion Detection System; NSL-KDD dataset;
D O I
10.1007/978-3-031-51664-1_11
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An intrusion detection system (IDS) can be either software or hardware that computerizes the process of keeping track of and evaluating network or computer system activity for indications of security issues. IDS is a crucial component of the security infrastructure of many organizations due to an increase in the frequency and intensity of attackers over the past decades. The study proposes machine learning techniques for the classification and detection of normal and attack traffics using protocol types records of the NSL-KDD dataset. Three sets of datasets were extracted from NSL-KDD datasets based on ICMP, UDP, and TCP. The experiment was conducted on WEKA 3.8.5 using KNN, KStar, LWL, BayesNet, Naive Bayes, and PART algorithms. The results indicated that the PART algorithm has the highest performance rating while NaiveBayes has the lowest performance rating utilizing the Correlation-based feature selection (CFS) using the Ranking Filter approach. It is concluded that the PART algorithm performs well across the dataset while NaiveBayes does not perform well across the dataset.
引用
收藏
页码:158 / 167
页数:10
相关论文
共 50 条
  • [21] Intrusion Detection System Based on Machine Learning Algorithms: A Review
    Amanoul, Sandy Victor
    Abdulazeez, Adnan Mohsin
    2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, : 79 - 84
  • [22] An intrusion detection system based on hybrid machine learning classifier
    Reji, M.
    Joseph, Christeena
    Nancy, P.
    Mary, A. Lourdes
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (03) : 4245 - 4255
  • [23] Intrusion Detection System for AI Box Based on Machine Learning
    Chen, Jiann-Liang
    Chen, Zheng-Zhun
    Chang, Youg-Sheng
    Li, Ching-Iang
    Kao, Tien-I
    Lin, Yu-Ting
    Xiao, Yu-Yi
    Qiu, Jian-Fu
    2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 111 - 116
  • [24] Exploiting Machine Learning for Malicious Attack Detection in Cyber Security
    Cho, Sung-Bae
    2017 FOURTH ASIAN CONFERENCE ON DEFENCE TECHNOLOGY - JAPAN (ACDT), 2017, : 3 - 3
  • [25] TDL-IDS: Towards A Transfer Deep Learning based Intrusion Detection System
    Sun, Xingguo
    Meng, Weizhi
    Chiu, Wei-Yang
    Lampe, Brooke
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2603 - 2608
  • [26] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953
  • [27] Machine learning based framework for network intrusion detection system using stacking ensemble technique
    Parashar, Anshu
    Saggu, Kuljot Singh
    Garg, Anupam
    INDIAN JOURNAL OF ENGINEERING AND MATERIALS SCIENCES, 2022, 29 (04) : 509 - 518
  • [28] Classification of Intrusion Detection System (IDS) Based on Computer Network
    Effendy, David Ahmad
    Kusrini, Kusrini
    Sudarmawan, Sudarmawan
    2017 2ND INTERNATIONAL CONFERENCES ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE): OPPORTUNITIES AND CHALLENGES ON BIG DATA FUTURE INNOVATION, 2017, : 90 - 94
  • [29] Immune System Based Intrusion Detection System (IS-IDS): A Proposed
    Dutt, Inadyuti
    Borah, Samarjeet
    Maitra, Indra Kanta
    IEEE ACCESS, 2020, 8 : 34929 - 34941
  • [30] IDS-ML: An open source code for Intrusion Detection System development using Machine Learning
    Yang, Li
    Shami, Abdallah
    SOFTWARE IMPACTS, 2022, 14