A Comparative Study of Classification Techniques for Intrusion Detection

被引:46
|
作者
Chauhan, Himadri [1 ]
Kumar, Vipin [1 ]
Pundir, Sumit [1 ]
Pilli, Emmanuel S. [1 ]
机构
[1] Graph Era Univ, Dept Comp Sci & Engn, Dehra Dun, Uttar Pradesh, India
来源
2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI) | 2013年
关键词
Intrusion Detection; Data mining; Classification; NSL-KDD; WEKA;
D O I
10.1109/ISCBI.2013.16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is one of the major research problems in network security. It is the process of monitoring and analyzing network traffic data to detect security violations. Mining approach can play very important role in developing an intrusion detection system. The network traffic can be classified into normal and anomalous in order to detect intrusions. In our paper, top-ten classification algorithms namely J48, BayesNet, Logistic, SGD, IBK, JRip, PART, Random Forest, Random Tree and REPTree were selected after experimenting with more than twenty most widely used classification algorithms. The comparison of these top-ten classification algorithms is presented in this paper based upon their performance metrics to find out the best suitable algorithm available. Performance of the classification models is measured using 10-fold cross validation. Experiments and assessments of these methods are performed in WEKA environment using NSL-KDD dataset.
引用
收藏
页码:40 / 43
页数:4
相关论文
共 50 条
  • [1] Intrusion detection using classification techniques: a comparative study
    Bouteraa, Imad
    Derdour, Makhlouf
    Ahmim, Ahmed
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2020, 12 (01) : 65 - 86
  • [2] A comparative study of techniques for intrusion detection
    Mukkamala, S
    Sung, AH
    15TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, : 570 - 577
  • [3] A Comparative Study of Feature Selection Techniques for Intrusion Detection
    Kaur, Rajveer
    Kumar, Gulshan
    Kumar, Krishan
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2120 - 2124
  • [4] Comparative Analysis of Classification Techniques in Network Based Intrusion Detection Systems
    Gautam, Sunil Kumar
    Om, Hari
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 591 - 601
  • [5] A comparative study of classification algorithms for network intrusion detection
    Khoshgoftaar, TM
    Gao, KH
    Wang, YL
    TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2004, : 168 - 172
  • [6] Intrusion Detection System: Classification and Techniques
    Soniya, S. Sobin
    Vigila, S. Maria Celestin
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [7] Intrusion techniques: Comparative study of network instrusion detection systems
    Garuba, Moses
    Liu, Chunmei
    Fraites, Duane
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 592 - 598
  • [8] Comparative study of supervised machine learning techniques for intrusion detection
    Gharibian, Farnaz
    Ghorbani, Ali A.
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 350 - +
  • [9] Indirect classification approaches: a comparative study in network intrusion detection
    Khoshgoftaar, Taghi M.
    Gao, Kehan
    Lin, Hua
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2006, 27 (04) : 232 - 245
  • [10] A comparative Study between Ensemble Learning Techniques in Intrusion Detection Context
    Jemili, Farah
    Meddeb, Rahma
    Kamel, Yasmine
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (01): : 1 - 12