Combating Network Intrusions using Machine Learning Techniques with Multilevel Feature Selection Method

被引:0
作者
Olayinka, Tosin Comfort [1 ]
Ugwu, Chukwuemeka Christian [2 ]
Okhuoya, Omoibu Joseph [3 ]
Adetunmbi, Adebayo Olusola [2 ]
Popoola, Olugbemiga Solomon [4 ]
机构
[1] Wellspring Univ, Dept Comp Sci, Benin, Edo Sate, Nigeria
[2] Fed Univ Technol Akure, Dept Comp Sci, Akure, Nigeria
[3] Univ Benin, ICT CRPU Int Training Ctr, Benin, Nigeria
[4] Osun State Coll Educ, Dept Comp Sci, Ila Orangun, Nigeria
来源
2022 IEEE NIGERIA 4TH INTERNATIONAL CONFERENCE ON DISRUPTIVE TECHNOLOGIES FOR SUSTAINABLE DEVELOPMENT (IEEE NIGERCON) | 2022年
关键词
Intrusion Detection; Classification; Machine Learning; Network Traffic; Feature Selection; Anomaly; DETECTION SYSTEM;
D O I
10.1109/NIGERCON54645.2022.9803098
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The heavy dependency on the internet, as well as other emerging technologies for access, storage, and sharing of information, has triggered a proportional increase in cyberattacks, thereby making network intrusion detection system (NIDS) a crucial component in security systems. NIDS is employed to monitor abnormal activities on a network However, issues of low accuracy and high false positive remain prevalent among NIDSs. In an attempt to improve the performance in the prediction of network intrusions, this paper applied in parallel, four (4) machine learning models: k-Nearest Neighbor (k-NN), Naive Bayes (NB), Logistic Regression (LR), and Artificial Neural Network (ANN) with multilevel feature selection method to determine which of the models has the best detection capability in terms of Accuracy, Positive Predicted Values (PPV), Recall, F1-score, and Receiver Operating Characteristics (ROC) Curve. The models were validated on NSL-KDD intrusion data and the result shows k-NN had the best performance with an accuracy of 79.1%, recall of 66.5% positive predicted values of 96.7%, and F1-measure of 78.1%.
引用
收藏
页码:589 / 593
页数:5
相关论文
共 18 条
[1]  
Adetunmbi A.O., 2008, International Journal of Computing and ICT Research, V2, P60
[2]  
Albahar MA, 2020, INT J ADV COMPUT SC, V11, P578
[3]   Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks [J].
Alzahrani, Abdulsalam O. ;
Alenazi, Mohammed J. E. .
FUTURE INTERNET, 2021, 13 (05)
[4]  
Chou D., 2020, ARXIV200907352, P234
[5]  
Divekar A, 2018, PROCEEDINGS ON 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), P1, DOI 10.1109/CCCS.2018.8586840
[6]  
Dixit S., 2021, TURKISH J COMPUTER M, V12, P2271
[7]  
Kantardzic M., 2011, Data Mining: Concepts, Models, Methods, and Algorithms
[8]   An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities [J].
Karami, Amin .
EXPERT SYSTEMS WITH APPLICATIONS, 2018, 108 :36-60
[9]   Gabor Feature Selection Based on Information Gain [J].
Lefkovits, Szidonia ;
Lefkovits, Laszlo .
10TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2016, 2017, 181 :892-898
[10]  
Li Y., 2020, CISAI 2020 J PHYS C, V1693