Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis

被引:3
|
作者
More, Shweta [1 ]
Idrissi, Moad [1 ]
Mahmoud, Haitham [1 ]
Asyhari, A. Taufiq [2 ]
机构
[1] Birmingham City Univ, Fac Comp Engn & Built Environm, Birmingham B4 7RQ, England
[2] Monash Univ, Dept Data Sci, Indonesia Campus, Tangerang 15345, Indonesia
关键词
machine learning in cyber security; UNSW-NB15; dataset; logistic regression; support vector machine; decision tree; random forest;
D O I
10.3390/a17020064
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for companies to implement robust cybersecurity measures to safeguard sensitive data from intrusion, which can lead to significant financial losses. Existing intrusion detection systems (IDS) require further enhancements to reduce false positives as well as enhance overall accuracy. To minimize security risks, data analytics and machine learning can be utilized to create data-driven recommendations and decisions based on the input data. This study focuses on developing machine learning models that can identify cyber-attacks and enhance IDS system performance. This paper employed logistic regression, support vector machine, decision tree, and random forest algorithms on the UNSW-NB15 network traffic dataset, utilizing in-depth exploratory data analysis, and feature selection using correlation analysis and random sampling to compare model accuracy and effectiveness. The performance and confusion matrix results indicate that the Random Forest model is the best option for identifying cyber-attacks, with a remarkable F1 score of 97.80%, accuracy of 98.63%, and low false alarm rate of 1.36%, and thus should be considered to improve IDS system security.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Analysis of KDD-Cup'99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT
    Choudhary, Sarika
    Kesswani, Nishtha
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1561 - 1573
  • [32] Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset
    Bagui, Sikha
    Kalaimannan, Ezhil
    Bagui, Subhash
    Nandi, Debarghya
    Pinto, Anthony
    [J]. SECURITY AND PRIVACY, 2019, 2 (06)
  • [33] A Comparative study of machine learning models for Network Intrusion Detection System using UNSW-NB 15 dataset
    Disha, Raisa Abedin
    Waheed, Sajjad
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND INFORMATION TECHNOLOGY 2021 (ICECIT 2021), 2021,
  • [34] Intelligent parameter-based in-network IDS for IoT using UNSW-NB15 and BoT-IoT datasets
    Luqman, Muhammad
    Zeeshan, Muhammad
    Riaz, Qaiser
    Hussain, Mehdi
    Tahir, Hasan
    Mazhar, Noman
    Khan, Muhammad Safeer
    [J]. Journal of the Franklin Institute, 2025, 362 (01)
  • [35] Intrusion Detection In IoT Using Artificial Neural Networks On UNSW-15 Dataset
    Hanif, Sohaib
    Ilyas, Tuba
    Zeeshan, Muhammad
    [J]. 2019 IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEE HONET-ICT 2019), 2019, : 152 - 156
  • [36] Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling
    Chew, Yee Jian
    Lee, Nicholas
    Ooi, Shih Yin
    Wong, Kok-Seng
    Pang, Ying Han
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 544 - 565
  • [37] Model Comparison and Multiclass Implementation Analysis on the UNSW NB15 Dataset
    Rathod, Nishit A.
    Gupta, Tanuj
    Sharma, Neha, V
    Sharma, Saurabh
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 549 - 555
  • [38] Performance Analysis and Security Based on Intrusion Detection and Prevention Systems in Cloud Data Centers
    El Mir, Iman
    Haqiq, Abdelkrim
    Kim, Dong Seong
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS 2016), 2017, 552 : 456 - 465
  • [39] Performance Analysis of Intrusion Detection Systems in the Cloud Computing
    Abdelaziz, Ettaoufik
    Mohamed, Ouzzif
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 136 - 143
  • [40] Performance analysis of content matching intrusion detection systems
    Antonatos, S
    Anagnostakis, KG
    Markatos, EP
    Polychronakis, M
    [J]. 2004 INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2004, : 208 - 215