Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection

被引:150
作者
Belavagi, Manjula C. [1 ]
Muniyal, Balachandra [1 ]
机构
[1] Manipal Univ, Manipal Inst Technol, Manipal 576104, Karnataka, India
来源
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 | 2016年 / 89卷
关键词
Classification Algorithms; Intrusion Detection; Machine Learning; Network Security; Supervised Learning; DETECTION SYSTEM;
D O I
10.1016/j.procs.2016.06.016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection system plays an important role in network security. Intrusion detection model is a predictive model used to predict the network data traffic as normal or intrusion. Machine Learning algorithms are used to build accurate models for clustering, classification and prediction. In this paper classification and predictive models for intrusion detection are built by using machine learning classification algorithms namely Logistic Regression, Gaussian Naive Bayes, Support Vector Machine and Random Forest. These algorithms are tested with NSL-KDD data set. Experimental results shows that Random Forest Classifier out performs the other methods in identifying whether the data traffic is normal or an attack. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:117 / 123
页数:7
相关论文
共 22 条
[1]   Bayesian based intrusion detection system [J].
Altwaijry, Hesham ;
Algarny, Saeed .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2012, 24 (01) :1-6
[2]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[3]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[4]  
El Mourabit Y, 2015, INT J ADV COMPUT SC, V6, P164
[5]   A novel intrusion detection framework for wireless sensor networks [J].
Farooqi, Ashfaq Hussain ;
Khan, Farrukh Aslam ;
Wang, Jin ;
Lee, Sungyoung .
PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) :907-919
[6]  
Huang Y, 2008, IEEE INT C NETW SENS, P1372
[7]  
Kemiche M., 2015, INTELLIGENT SYSTEMS, P351, DOI [10.1007/978-3-319-14654-6-22, DOI 10.1007/978-3-319-14654-6-22]
[8]  
Kim DS, 2003, LECT NOTES COMPUT SC, V2662, P747
[9]   A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier [J].
Koc, Levent ;
Mazzuchi, Thomas A. ;
Sarkani, Shahram .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (18) :13492-13500
[10]   An efficient intrusion detection system based on support vector machines and gradually feature removal method [J].
Li, Yinhui ;
Xia, Jingbo ;
Zhang, Silan ;
Yan, Jiakai ;
Ai, Xiaochuan ;
Dai, Kuobin .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) :424-430