Performance Analysis of Network Intrusion Detection Systems using J48 and Naive Bayes Algorithms

被引:0
作者
Razdan, Sanjay [1 ]
Gupta, Himanshu [1 ]
Seth, Ashish [2 ]
机构
[1] Amity Univ, AIIT, Noida, India
[2] Inha Univ, Incheon, South Korea
来源
2021 6TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT) | 2021年
关键词
Confidentiality; Availability; Misuse; Anomaly; Zero Day Attacks; CIDDS; Decision Tree; Security; WEKA; ANOMALY DETECTION; DATASET;
D O I
10.1109/12CT51068.2021.9417971
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Any malicious activity on the network needs to be detected immediately to protect the user data. This helps to ensure Confidentiality, Availability, and Integrity. Machine learning algorithms are efficient tools that can be used in anomaly detection techniques to detect attacks against network. Decision Trees and Naive Bayes algorithms are the two important algorithms that can detect zero-day attacks with a great precision. While both are used for same purpose, these algorithms may produce different detection performance results on same set of data. This paper evaluates the Intrusion detection performance of these two algorithms on CIDDS-02 data set using various parameters of interest.
引用
收藏
页数:7
相关论文
共 16 条
[1]   Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection [J].
Aggarwal, Preeti ;
Sharma, Sudhir Kumar .
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 :842-851
[2]  
Aishwarya Ch., 2020, INT JINNOVTECHNOLEXP, V9, DOI [10.35940/ijitee.D2017.029420, DOI 10.35940/IJITEE.D2017.029420]
[3]  
Beigh B., 2012, Journal of Science and Technology, V2, P661
[4]  
Gómez J, 2009, LECT NOTES COMPUT SC, V5518, P515, DOI 10.1007/978-3-642-02481-8_75
[5]  
Hamed T., 2017, INTRUSION DETECTION
[6]   Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach [J].
Jabez, J. ;
Muthukumar, B. .
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 :338-346
[7]   A novel hybrid intrusion detection method integrating anomaly detection with misuse detection [J].
Kim, Gisung ;
Lee, Seungmin ;
Kim, Sehun .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) :1690-1700
[8]  
Lantz B., 2013, MACHINE LEARNING R B
[9]  
Mahmood Z., 2012, International Journal of Research in Computer Engineering and Electronics, V1, P1
[10]   Intrusion detection techniques in cloud environment: A survey [J].
Mishra, Preeti ;
Pilli, Emmanuel S. ;
Varadharajan, Vijay ;
Tupakula, Udaya .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 :18-47