Comparison of classification techniques applied for network intrusion detection and classification

被引:39
作者
Aziz, Amira Sayed A. [1 ,3 ]
EL-Ola Hanafi, Sanaa [2 ]
Hassanien, Aboul Ella [2 ,3 ]
机构
[1] FUE, Cairo, Egypt
[2] Cairo Univ, Fac Comp & Informat, Giza, Egypt
[3] SRGE, Cairo, Egypt
关键词
Intrusion Detection; Artificial Immune Systems; Intrusion Classification; Machine Learning;
D O I
10.1016/j.jal.2016.11.018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a previous research, a multi-agent artificial immune system for network intrusion detection and classification was proposed and tested, where a multi-layer detection and classification process was executed on each agent, for each host in the network. In this paper, we show the experiments that were held to chose the appropriate classifiers by testing different classifiers and comparing them to increase the detection accuracy and obtain more information on the detected anomalies. It will be shown that no single classifier should be used for all types of attacks, due to different classification rates obtained. This is due to attacks representations in the train set and dependency between features used to detect them. It will also be shown that a basic and simple classifier such as Naive Bayes has better classification results in the case of low-represented attacks, and the basic decision trees such as Naive-Bayes Tree and Best-First Tree give very good results compared to well-known J48 (Weka implementation of C4.5) and Random Forest decision trees. Based on these experiments and their results, Naive Bayes and Best-First tree classifiers were selected to classify the anomaly-detected traffic. It was shown that in the detection phase, 90% of anomalies were detected, and in the classification phase, 88% of false positives were successfully labeled as normal traffic connections, and 79% of DoS and Probe attacks were labeled correctly, mostly by NB, NBTree, and BFTree classifiers. (c) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:109 / 118
页数:10
相关论文
共 22 条
[1]  
Abdel-Aziz AS, 2013, COMM COM INF SC, V381, P219
[2]  
Aickelin U, 2004, LECT NOTES COMPUT SC, V3239, P316
[3]  
Anderson JohnRobert., 1986, Machine learning: An artificial intelligence approach, V2
[4]  
[Anonymous], 2007, KDD CUP99 INTRUSION
[5]  
[Anonymous], 2011 7 INT C INF TEC
[6]  
[Anonymous], 2009, NSL KDD INTRUSION DE
[7]  
[Anonymous], WSC17 2012 ONL C SOF
[8]  
[Anonymous], 2006, ACM INT C P SER, DOI [DOI 10.1145/1143844.1143865, 10.1145/1143844.1143865]
[9]  
Aziz ASA, 2013, 2013 13TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), P215, DOI 10.1109/HIS.2013.6920485
[10]  
Aziz ASA, 2013, FED CONF COMPUT SCI, P769