Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset

被引:210
作者
Maseer, Ziadoon Kamil [1 ]
Yusof, Robiah [1 ]
Bahaman, Nazrulazhar [1 ]
Mostafa, Salama A. [2 ]
Foozy, Cik Feresa Mohd [2 ]
机构
[1] Univ Tekn Malaysia Melaka, Fac Informat & Commun Technol, Malacca 76100, Malaysia
[2] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Batu Pahat 86400, Malaysia
关键词
Classification algorithms; Feature extraction; Training; Benchmark testing; Support vector machines; Self-organizing feature maps; Radio frequency; Cyberattacks; intrusion detection system; machine learning; supervised and unsupervised learning; BAT ALGORITHM;
D O I
10.1109/ACCESS.2021.3056614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An intrusion detection system (IDS) is an important protection instrument for detecting complex network attacks. Various machine learning (ML) or deep learning (DL) algorithms have been proposed for implementing anomaly-based IDS (AIDS). Our review of the AIDS literature identifies some issues in related work, including the randomness of the selected algorithms, parameters, and testing criteria, the application of old datasets, or shallow analyses and validation of the results. This paper comprehensively reviews previous studies on AIDS by using a set of criteria with different datasets and types of attacks to set benchmarking outcomes that can reveal the suitable AIDS algorithms, parameters, and testing criteria. Specifically, this paper applies 10 popular supervised and unsupervised ML algorithms for identifying effective and efficient ML-AIDS of networks and computers. These supervised ML algorithms include the artificial neural network (ANN), decision tree (DT), k-nearest neighbor (k-NN), naive Bayes (NB), random forest (RF), support vector machine (SVM), and convolutional neural network (CNN) algorithms, whereas the unsupervised ML algorithms include the expectation-maximization (EM), k-means, and self-organizing maps (SOM) algorithms. Several models of these algorithms are introduced, and the turning and training parameters of each algorithm are examined to achieve an optimal classifier evaluation. Unlike previous studies, this study evaluates the performance of AIDS by measuring the true positive and negative rates, accuracy, precision, recall, and F-Score of 31 ML-AIDS models. The training and testing time for ML-AIDS models are also considered in measuring their performance efficiency given that time complexity is an important factor in AIDSs. The ML-AIDS models are tested by using a recent and highly unbalanced multiclass CICIDS2017 dataset that involves real-world network attacks. In general, the k-NN-AIDS, DT-AIDS, and NB-AIDS models obtain the best results and show a greater capability in detecting web attacks compared with other models that demonstrate irregular and inferior results.
引用
收藏
页码:22351 / 22370
页数:20
相关论文
共 92 条
[1]  
Abdulraheem M.H., 2019, J THEOR APPL INF TEC, V97, P4519
[2]  
Aggarwal P, PROCEDIA COMPUT SCI, V57, P842
[3]   Evaluation of Machine Learning Techniques for Security in SDN [J].
Ahmad, Ahnaf ;
Harjula, Erkki ;
Ylianttila, Mika ;
Ahmad, Ijaz .
2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
[4]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[5]   Experimental Evaluation of a Multi-Layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System [J].
Al-Zewairi, Malek ;
Almajali, Sufyan ;
Awajan, Arafat .
2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, :167-172
[6]  
[Anonymous], 2012, J. Data Min. Knowl. Discov
[7]  
[Anonymous], 2015, Int J Database Theory Appl, DOI DOI 10.14257/IJDTA.2015.8.1.16
[8]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[9]  
Azad Chandrashekhar, 2013, International Journal of Information Technology and Computer Science, V5, P75, DOI 10.5815/ijitcs.2013.08.08
[10]  
Balasaraswathi VR., 2017, J COMMUN INF NETW, V2, P107, DOI [10.1007/s41650-017-0033-7, DOI 10.1007/S41650-017-0033-7]