Comparison of Machine Learning Algorithms Performance in Detecting Network Intrusion

被引:0
作者
Abd Jalil, Kamarularifin [1 ]
Kamarudin, Muhammad Hilmi [1 ]
Masrek, Mohamad Noorman [2 ]
机构
[1] Univ Teknol MARA, Fac Comp & Math Sci, Shah Alam, Malaysia
[2] Univ Teknol MARA, Fac Informat Management, Shah Alam, Malaysia
来源
2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010) | 2010年
关键词
Machine Learning; Neural Network; Support Vector Machines; Decision Tree; KDD; 99;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Organization has come to realize that network security technology has become very important in protecting its information. With tremendous growth of internet, attack cases are increasing each day along with the modern attack method. One of the solutions to this problem is by using Intrusion Detection System (IDS). Machine Learning is one of the methods used in the IDS. In recent years, Machine Learning Intrusion Detection system has been giving high accuracy and good detection on novel attacks. In this paper the performance of a Machine Learning algorithm called Decision Tree (J48) is evaluated and compared with two other Machine Learning algorithms namely Neural Network and Support Vector Machines which has been conducted by A. Osareh [1] for detecting intrusion. The algorithms were tested based on accuracy, detection rate, false alarm rate and accuracy of four categories of attacks. From the experiments conducted, it was found that the Decision tree (J48) algorithm outperformed the other two algorithms.
引用
收藏
页码:221 / 226
页数:6
相关论文
共 13 条
[1]  
Anderson J. P., 1980, TECHNICAL REPORT
[2]  
[Anonymous], 1983, Machine learning: an artificial intelligence approach
[3]  
[Anonymous], 1999, P 1999 IEEE S SEC PR
[4]  
Anuar N. B., 2008, MALAYSIAN J COMPUTER, V21
[5]  
Barbara D., 2001, P IEEE WORKSH INF AS
[6]   A tutorial on Support Vector Machines for pattern recognition [J].
Burges, CJC .
DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) :121-167
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]  
Makkithaya K., 2008, IMPROVED C FUZZY DEC, V32
[9]  
Osareh Alireza, 2008, IJCSNS INT J COMPUTE, V8
[10]  
Rumelhart D.E., 1987, Parallel Distributed Processing, P318