Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection and Attack Classification

被引:5
|
作者
Leon, Miguel [1 ]
Markovic, Tijana [1 ]
Punnekkat, Sasikumar [1 ]
机构
[1] Malardalen Univ, Sch Innovat Design & Engn, Vasteras, Sweden
来源
2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2022年
基金
欧盟地平线“2020”;
关键词
Machine Learning; Supervised Learning; Unsupervised Learning; Intrusion Detection; Attack Classification; DETECTION SYSTEM;
D O I
10.1109/IJCNN55064.2022.9892293
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing use of the internet and reliance on computer-based systems for our daily lives, any vulnerability in those systems is one of the most important issues for the community. For this reason, the need for intelligent models that detect malicious intrusions is important to keep our personal information safe. In this paper, we investigate several supervised (Artificial Neural Network, Support Vector Machine, Random Forest, Linear Discriminant Analysis, and K-Nearest Neighbors) and unsupervised (K-means, Mean-shift, and DBSCAN) machine learning algorithms, in the context of anomaly-based Intrusion Detection Systems. We are using four different IDS benchmark datasets (KDD99, NSL-KDD, UNSW-NB15, and CIC-IDS-2017) to evaluate the performance of the selected machine learning algorithms for both intrusion detection and attack classification. The results have shown that Random Forest is the most suitable algorithm regarding model accuracy and execution time.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123
  • [2] Comparative Analysis of Machine Learning Algorithms along with Classifiers for Network Intrusion Detection
    Choudhury, Sumouli
    Bhowal, Anirban
    2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 89 - 95
  • [3] Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset
    Chua, Tuan-Hong
    Salam, Iftekhar
    SYMMETRY-BASEL, 2023, 15 (06):
  • [4] A Comparative Study of Using Boosting-Based Machine Learning Algorithms for IoT Network Intrusion Detection
    Mohamed Saied
    Shawkat Guirguis
    Magda Madbouly
    International Journal of Computational Intelligence Systems, 16
  • [5] A Comparative Study of Using Boosting-Based Machine Learning Algorithms for IoT Network Intrusion Detection
    Saied, Mohamed
    Guirguis, Shawkat
    Madbouly, Magda
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2023, 16 (01)
  • [6] Intrusion detection and prevention with machine learning algorithms
    Chang, Victor
    Boddu, Sreeja
    Xu, Qianwen Ariel
    Doan, Le Minh Thao
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (06) : 617 - 631
  • [7] Comparative Evaluation of Network-Based Intrusion Detection: Deep Learning vs Traditional Machine Learning Approach
    Udurume, Miracle
    Shakhov, Vladimir
    Koo, Insoo
    2024 FIFTEENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, ICUFN 2024, 2024, : 520 - 525
  • [8] Enhancing IoT Network Defense: A Comparative Study of Machine Learning Algorithms for Attack Classification
    McNair, Alkendria
    Precious-Esue, Divine
    Newson, Soundra
    Rahimi, Nick
    SOFTWARE AND DATA ENGINEERING, SEDE 2024, 2025, 2244 : 55 - 64
  • [9] Machine Learning Classification Model For Network Based Intrusion Detection System
    Kumar, Sanjay
    Viinikainen, Ari
    Hamalainen, Timo
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 242 - 249
  • [10] Ensemble of Machine Learning Algorithms for Intrusion Detection
    Chou, Te-Shun
    Fan, Jeffrey
    Fan, Sharon
    Makki, Kia
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 3976 - +