Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing

被引:25
作者
Kanimozhi, V [1 ]
Jacob, T. Prem [1 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept CSE, Chennai, Tamil Nadu, India
关键词
AWS; Botnet; Calibration curve; CSE-CIC-IDS2018; Various machine learning classifiers;
D O I
10.1016/j.icte.2020.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our paramount task is to examine and detect network attacks, is one of the daunting tasks because the variety of attacks are day by day existing in colossal number. The program proposed detects botnet attacks using the newest CSE-CIC-IDS2018 cyber dataset published by the Canadian Cybersecurity Establishment (CIC). The cyber dataset can be accessed on AWS (Amazon Web Services). The realistic network dataset consists of all the modern and existing attacks such as Brute-force attacks and password cracking, Heartbleed, Botnet, DoS (Denial of Service), DDoS also known as Distributed Denial of Service, Web attacks i.e. vulnerable web app attacks, and infiltration of the network from inside. The objective of the proposed research is to identify a classification of Botnet attacks. Botnet attack is a Trojan Horse malware attack that poses a serious security threat to the banking and financial sectors. Since a specific classifier could possibly work for such datasets it is crucial to finish a comparative examination of classifiers in order to achieve the most noteworthy execution in such basic detection of network attacks. The proposed framework is to incorporate different classifier methods such as KNearset Neighbor classifier, Naive Bayes, Adaboost with Decision Tree, Support Vector Machine classifier, Random Forest classifier, and Artificial Intelligence to distinguish a portrayal of botnet attacks on the recent and realistic cyber dataset CSE-CIC-IDS2018. The results of the classification are given as precise precision for the specific classifiers. And furthermore, the proposed framework uses the Calibration curve as a standard approach in analytical methods which generates reliability diagrams to check the predicted probabilities of various classifiers are well-calibrated or not. Finally, the displayed graph proves how well the artificial intelligence technique outperforms all other classifiers which generates reliability diagrams to check the predicted probabilities of various classifiers are well-calibrated or not. (C) 2020 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:366 / 370
页数:5
相关论文
共 8 条
[1]  
Bhuyan M.H., 2017, Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
[2]   Intrusion detection system: A comprehensive review [J].
Liao, Hung-Jen ;
Lin, Chun-Hung Richard ;
Lin, Ying-Chih ;
Tung, Kuang-Yuan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :16-24
[3]  
Pervez MS, 2014, I C SOFTWARE KNOWL I
[4]  
Przemyslaw Kazienko Dorosz, INTRUSION DETECTION
[5]   Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization [J].
Sharafaldin, Iman ;
Lashkari, Arash Habibi ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, :108-116
[6]   Intelligent intrusion detection systems using artificial neural networks [J].
Shenfield, Alex ;
Day, David ;
Ayesh, Aladdin .
ICT EXPRESS, 2018, 4 (02) :95-99
[7]   Internet attacks and intrusion detection system A review of the literature [J].
Singh, Raman ;
Kumar, Harish ;
Singla, Ravinder Kumar ;
Ketti, Ramachandran Ramkumar .
ONLINE INFORMATION REVIEW, 2017, 41 (02) :171-184
[8]  
Ting JChristina, 2018, IEEE T INF FORENSICS