Comparative Study of Machine Learning Algorithms for Intrusion Detection
Keywords:
Network Traffic Classification, Machine Learning, KNN, SVMAbstract
Researching Network Traffic Classification through Machine Learning is crucial given the expanding reach of the internet, enabling global information exchange. The implications of security breaches extend beyond individuals to impact entire organizations. Hence, discerning between malicious and non-malicious data on the network holds utmost significance. In this research, we perform an in-depth examination and contrast of seven distinct machine learning algorithms: Naïve Bayes, Logistic Regression, Support Vector Machine (SVM), Random Forest, C4.5, XGBoost, and k-Nearest Neighbors (KNN). These analyses are executed using Python's package module for seamless programmatic execution. The assessment encompasses metrics such as accuracy, precision, and recall, offering valuable insights into the performance of each algorithm.
Downloads
References
Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari, Lu Yao, N abin Kumar Karn, F oudilAbdessamia, “Network Traffic Classification Techniques and Comparative Analysis Using Machine Learning Algorithms”, 2016 2nd IEEE International Conference on Computer and Communications, vol. 8, pp. 2451-2455, 2016.
JaiswalRupeshChandrakant, LokhandeShashikant. D., “Machine Learning Based Internet Traffic Recognition with Statistical Approach”, 2013 Annual IEEE India Conference (INDICON), vol. 7, pp. 121-126, 2013.
RiyadAlshammari, A. NurZincir-Heywood, “Identification of KDD encrypted traffic using a machine learning approach”, Journal of King Saud University – Computer and Information Sciences, vol. 27, pp. 77–92, 2015.
Alberto Dainotti, Antonio Pescapé, Kimberly C. Claffy,” Issues and Future Directions in Traffic Classification”, IEEE Network January/February 2012.
T.NguyenandG.Armitage,“AsurveyoftechniquesforInternettraffic classification using machine learning”, IEEE Communications Surveys &Tutorials,Vol.10,No.4,fourthquarter2008,pp56-76.
FatihErtam, Ilhan FiratKilinçer, Orhan Yaman,”Intrusion Detection in Computer Networks via Machine Learning Algorithms”, International ArtificialIntelligenceandDataProcessingSymposium(IDAP),2017,pp 1-4
Jamal H. Assi, Ahmed T. Sadiq, ”NSL-KDD dataset Classification Using Five Classification Methods and Three Feature Selection Strategies”, Journal of Advanced Computer Science and Technology Research, Vol.7 No.1, March 2017, 15-28.
Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari, Lu Yao, N abin Kumar Karn, FoudilAbdessamia, “Network Traffic Classification Techniques and Comparative Analysis Using Machine Learning Algorithms”, 2nd IEEE International Conference on Computer and Communications,2016,pp2451-2455.
Dewa, LeandrosMaglaras (2016) “Data Mining and Intrusion Detection Systems”, International Journal of Advanced Computer Science and Applications, Vol 7 No 1,pp61-71.
L. Dhanabal, and S. P. Shantharajah (2015) “A Study on NSL-KDD Dataset for Intrusion DetectionSystemBasedonClassificationAlgorithms”,InternationalJournalofAdvanced Research in Computer and Communication Engineering, Vol 4, Issue 6,pp.
Himadri Chauhan, Vipin Kumar, SumitPundir and Emmanuel S. Pilli (2013) “A Comparative Study of Classification Techniques for Intrusion Detection” International Symposium on Computational and Business Intelligencepp40-43.
S. Revathi, Dr. A. Malathi (2013) “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection and Technology, IJERT Vol. 2 Issue 12 pp1848-1853.
NSL-KDD dataset (Online Available): http://www.unb.ca/cic/datasets/nsl.html.
Dhanabal, L., and S. P. Shantharajah. "A study on NSL-KDD dataset for intrusion detec- tion system based on classification algorithms." International Journal of Advanced Re- search in Computer and Communication Engineering 4.6 (2015):446-452.
Revathi, S., and A. Malathi. "A detailed analysis on NSL-KDD dataset using various ma- chine learning techniques for intrusion detection." International Journal of Engineering Re- search and Technology. ESRSA Publications(2013).
Narayan, Vipul, et al. "A Comprehensive Review of Various Approach for Medical Image Segmentation and Disease Prediction.
Mall, Pawan Kumar, et al. "A comprehensive review of deep neural networks for medical image processing: Recent developments and future opportunities." Healthcare Analytics (2023): 100216.
Narayan, Vipul, et al. "Severity of Lumpy Disease detection based on Deep Learning Technique." 2023 International Conference on Disruptive Technologies (ICDT). IEEE, 2023.
Saxena, Aditya, et al. "Comparative Analysis Of AI Regression And Classification Models For Predicting House Damages İn Nepal: Proposed Architectures And Techniques." Journal of Pharmaceutical Negative Results (2022): 6203-6215.
Kumar, Vaibhav, et al. "A Machine Learning Approach For Predicting Onset And Progression"“Towards Early Detection Of Chronic Diseases “." Journal of Pharmaceutical Negative Results (2022): 6195-6202.
Chaturvedi, Pooja, A. K. Daniel, and Vipul Narayan. "A Novel Heuristic for Maximizing Lifetime of Target Coverage in Wireless Sensor Networks." Advanced Wireless Communication and Sensor Networks. Chapman and Hall/CRC 227-242.
Kumar, Vimal, and Rakesh Kumar. "A cooperative black hole node detection and mitigation approach for MANETs." In Innovative Security Solutions for Information Technology and Communications: 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers 8, pp. 171-183. Springer International Publishing, 2015.
Kumar, V., Shankar, M., Tripathi, A.M., Yadav, V., Rai, A.K., Khan, U. and Rahul, M., 2022. Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme. Journal of Scientific & Industrial Research, 81(10), pp.1061-1072.
Kumar, V. and Kumar, R., 2015. An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science, 48, pp.472-479.
Kumar, V. and Kumar, R., 2015, April. Detection of phishing attack using visual cryptography in ad hoc network. In 2015 International Conference on Communications and Signal Processing (ICCSP) (pp. 1021-1025). IEEE.
Kumar, V. and Kumar, R., 2015. An optimal authentication protocol using certificateless ID-based signature in MANET. In Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings 3 (pp. 110-121). Springer International Publishing.
Kumar, V. and Kumar, R., 2017. Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET. In Security Solutions for Hyperconnectivity and the Internet of Things (pp. 130-150). IGI Global.
Gupta, P., Kumar, V. and Yadav, V., 2021. Student’s Perception towards Mobile learning using Interned Enabled Mobile devices during COVID-19. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 8(29), pp.e1-e1.
Deshwal, V., Kumar, V., Shukla, R. and Yadav, V., 2022. Estimating COVID-19 Cases Using Machine Learning Regression Algorithms. Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering), 15(5), pp.390-400.
Mr. Kaustubh Patil. (2013). Optimization of Classified Satellite Images using DWT and Fuzzy Logic. International Journal of New Practices in Management and Engineering, 2(02), 08 - 12. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/15
Pathak, D. G. ., Angurala, D. M. ., & Bala, D. M. . (2020). Nervous System Based Gliomas Detection Based on Deep Learning Architecture in Segmentation. Research Journal of Computer Systems and Engineering, 1(2), 01:06. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/3
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.