Multi-Class Network Anomaly Detection Using Machine Learning Techniques

被引:0
|
作者
Gunupusala, Satyanarayana [1 ]
Kaila, Shahu Chatrapathi [1 ]
机构
[1] Jawaharlal Nehru Technol Univ Hyderabad, Dept Comp Sci & Engn, Hyderabad 500085, Telangana, India
来源
CONTEMPORARY MATHEMATICS | 2024年 / 5卷 / 02期
关键词
machine learning algorithms; UNSW-NB15; MSE; Intrusion Detection System (IDS); network attacks; INTRUSION DETECTION; EXTRA-TREES; ALGORITHM; SYSTEMS;
D O I
10.37256/cm.5220243723
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Computer networks rely on Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) to ensure the security, reliability, and availability of an organization. In recent years, various approaches were developed and implemented to create effective IDSs and IPSs. This paper specifically focuses on IDSs that utilize Machine Learning (ML) techniques for improved accuracy. ML-based IDSs have verified to be successful in discovering network attacks. However, their performance tends to decline when dealing with high-dimensional data spaces. It is essential to develop a suitable feature extraction strategy that could identify and remove irrelevant features that do not significantly classification process to address this issue. Additionally, many ML-based IDSs exhibit high false positive rates and poor detection accuracy when trained on unbalanced datasets. In this study, we analyze the UNSW-NB15 IDS, which will serve as the training and testing data for our models. In order to reduce the feature space and improve the efficiency of our analysis, we leverage a filter-based feature reduction method utilizing the Pearson correlation coefficient algorithm. By identifying and selecting only the most relevant features, we are able to streamline our dataset and focus on the variables that have the highest impact on our analysis. This approach not only reduces computational complexity but also improves the interpretability of our results by eliminating unnecessary noise from the data. After applying the feature reduction technique, we proceed to implement a range of machine learning methods to perform our classification task. These include well-known algorithms such as Stacking, Extra Trees, Multi-Layer Perceptron, XGBoost, K-Nearest Neighbors, Logistic Regression, Na & iuml;ve Bayes, Support Vector Machine, Random Forest, and Decision Tree. By employing a diverse set of algorithms, we are able to explore different modeling approaches and evaluate their effectiveness in accurately classifying the various types of assaults. In order to assess the performance of our classification models, we utilize a range of specialized evaluation metrics such as Root Mean Square Error (RMSE), Mean Absolute Error (MAE), R2-Score, Mean Squared Error (MSE), Precision, F1-Score, Recall, and Accuracy. These metrics provide us with a comprehensive understanding of how well our models are performing across different dimensions, including the accuracy of predictions, the level of precision in classifying different assault types, and the overall goodness-of-fit of our models. By considering multiple evaluation metrics, we are able to gain a more nuanced understanding of the strengths and weaknesses of each algorithm and make informed decisions about their suitability for our classification task. These metrics deliver a complete evaluation of the classifiers' effectiveness in detecting community intrusions.
引用
收藏
页码:2335 / 2352
页数:18
相关论文
共 50 条
  • [31] Anomaly Detection Based on a Multi-class CUSUM Algorithm for WSN
    Xiao Zhenghong
    Chen Zhigang
    Deng Xiaoheng
    [J]. JOURNAL OF COMPUTERS, 2010, 5 (02) : 306 - 313
  • [32] Joint Learning for Multi-class Object Detection
    Fard, Hamidreza Odabai
    Chaouch, Mohamed
    Quoc-cuong Pham
    Vacavant, Antoine
    Chateau, Thierry
    [J]. PROCEEDINGS OF THE 2014 9TH INTERNATIONAL CONFERENCE ON COMPUTER VISION, THEORY AND APPLICATIONS (VISAPP 2014), VOL 2, 2014, : 104 - 112
  • [33] Multi-Ideology Multi-Class Extremism Classification Using Deep Learning Techniques
    Gaikwad, Mayur
    Ahirrao, Swati
    Kotecha, Ketan
    Abraham, Ajith
    [J]. IEEE ACCESS, 2022, 10 : 104829 - 104843
  • [34] Network anomaly detection using one class support vector machine
    Zhang, Rui
    Zhang, Shaoyan
    Lan, Yang
    Jiang, Jianmin
    [J]. IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 452 - 456
  • [35] UAV-deployed deep learning network for real-time multi-class damage detection using model quantization techniques
    Yang, Xiaofei
    Castillo, Enrique del Rey
    Zou, Yang
    Wotherspoon, Liam
    [J]. AUTOMATION IN CONSTRUCTION, 2024, 159
  • [36] Optimized code matrix generation for classification of multi-class pattern recognition problems using machine learning techniques
    Chandrakala, D.
    Sumathi, S.
    Karthi, S.
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2011, 15 (04) : 227 - 245
  • [37] McMatMHKS: A direct multi-class matrixized learning machine
    Wang, Zhe
    Meng, Yun
    Zhu, Yujin
    Fan, Qi
    Chen, Songcan
    Gao, Daqi
    [J]. KNOWLEDGE-BASED SYSTEMS, 2015, 88 : 184 - 194
  • [38] Automated Multi-class Brain Tumor Types Detection by Extracting RICA Based Features and Employing Machine Learning Techniques
    Anjum, Sadia
    Hussain, Lal
    Ali, Mushtaq
    Abbasi, Adeel Ahmed
    [J]. MACHINE LEARNING IN CLINICAL NEUROIMAGING AND RADIOGENOMICS IN NEURO-ONCOLOGY, MLCN 2020, RNO-AI 2020, 2020, 12449 : 249 - 258
  • [39] Automated multi-class brain tumor types detection by extracting RICA based features and employing machine learning techniques
    Anjum, Sadia
    Hussain, Lal
    Ali, Mushtaq
    Abbasi, Adeel Ahmed
    Duong, Tim Q.
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2021, 18 (03) : 2882 - 2908
  • [40] Network Intrusion Detection Using Machine Learning Techniques
    Almutairi, Yasmeen
    Alhazmi, Bader
    Munshi, Amr
    [J]. ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (03) : 193 - 206