Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity

被引:50
作者
Dini, Pierpaolo [1 ]
Elhanashi, Abdussalam [1 ]
Begni, Andrea [1 ]
Saponara, Sergio [1 ]
Zheng, Qinghe [2 ]
Gasmi, Kaouther [3 ]
机构
[1] Univ Pisa, Dept Informat Engn, I-56126 Pisa, Italy
[2] Shandong Management Univ, Sch Intelligence Engn, Jinan 250100, Peoples R China
[3] Univ Tunis, Dept Comp Sci, Tunis 1007, Tunisia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 13期
关键词
intrusion detection systems; machine learning; feature selection; data management; KDD; 99; UNSW-NB15; CSE-CIC-IDS; 2018; ALGORITHM; MODEL;
D O I
10.3390/app13137507
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The Intrusion Detection System (IDS) is an effective tool utilized in cybersecurity systems to detect and identify intrusion attacks. With the increasing volume of data generation, the possibility of various forms of intrusion attacks also increases. Feature selection is crucial and often necessary to enhance performance. The structure of the dataset can impact the efficiency of the machine learning model. Furthermore, data imbalance can pose a problem, but sampling approaches can help mitigate it. This research aims to explore machine learning (ML) approaches for IDS, specifically focusing on datasets, machine algorithms, and metrics. Three datasets were utilized in this study: KDD 99, UNSW-NB15, and CSE-CIC-IDS 2018. Various machine learning algorithms were chosen and examined to assess IDS performance. The primary objective was to provide a taxonomy for interconnected intrusion detection systems and supervised machine learning algorithms. The selection of datasets is crucial to ensure the suitability of the model construction for IDS usage. The evaluation was conducted for both binary and multi-class classification to ensure the consistency of the selected ML algorithms for the given dataset. The experimental results demonstrated accuracy rates of 100% for binary classification and 99.4In conclusion, it can be stated that supervised machine learning algorithms exhibit high and promising classification performance based on the study of three popular datasets.
引用
收藏
页数:34
相关论文
共 82 条
[1]  
Adams M., 2005, Encyclopedia of Analytical, V2nd ed., P21, DOI 10.1016/B0-12-369397-7/00076-5
[2]  
Agnelli J., 2020, P 2020 IEEE INT C EN, P1
[3]  
Al-Janabi S. T. F., 2011, Proceedings of the 2011 4th International Conference on Developments in e-systems Engineering (DeSE 2011), P221, DOI 10.1109/DeSE.2011.19
[4]   Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions [J].
Aljabri, Malak ;
Altamimi, Hanan S. ;
Albelali, Shahd A. ;
Al-Harbi, Maimunah ;
Alhuraib, Haya T. ;
Alotaibi, Najd K. ;
Alahmadi, Amal A. ;
Alhaidari, Fahd ;
Mohammad, Rami Mustafa A. ;
Salah, Khaled .
IEEE ACCESS, 2022, 10 :121395-121417
[5]  
Amor N., 2004, P 2004 ACM S APPL CO, P420
[6]   Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset [J].
Bagui, Sikha ;
Kalaimannan, Ezhil ;
Bagui, Subhash ;
Nandi, Debarghya ;
Pinto, Anthony .
SECURITY AND PRIVACY, 2019, 2 (06)
[7]  
Begni Andrea, 2023, Applications in Electronics Pervading Industry, Environment and Society: APPLEPIES 2022. Lecture Notes in Electrical Engineering (1036), P373, DOI 10.1007/978-3-031-30333-3_51
[8]  
Benaddi H, 2018, 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), P234
[9]  
Benedetti D., 2020, 2020 20 IEEE INT C, P1, DOI [10.1109/eeeic/icpseurope49358.2020.9160655, DOI 10.1109/eeeic/icpseurope49358.2020.9160655]
[10]  
Bernardeschi Cinzia, 2023, Software Engineering and Formal Methods. SEFM 2022 Collocated Workshops: AI4EA, F-IDE, CoSim-CPS, CIFMA, Revised Selected Papers. Lecture Notes in Computer Science (13765), P210, DOI 10.1007/978-3-031-26236-4_19