In-depth Comparative Evaluation of Supervised Machine Learning Approaches for Detection of Cybersecurity Threats

被引:8
|
作者
D'hooge, Laurens [1 ]
Wauters, Tim [1 ]
Volckaert, Bruno [1 ]
De Turck, Filip [1 ]
机构
[1] Univ Ghent, IMEC, IDLab, Dept Informat Technol, Technol Pk Zwijnaarde 126, Ghent, Belgium
关键词
Intrusion Detection; CICIDS2017; Supervised Machine Learning; Binary Classification;
D O I
10.5220/0007724801250136
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the process and results of analyzing CICIDS2017, a modern, labeled data set for testing intrusion detection systems. The data set is divided into several days, each pertaining to different attack classes (Dos, DDoS, infiltration, botnet, etc.). A pipeline has been created that includes nine supervised learning algorithms. The goal was binary classification of benign versus attack traffic. Cross-validated parameter optimization, using a voting mechanism that includes five classification metrics, was employed to select optimal parameters. These results were interpreted to discover whether certain parameter choices were dominant for most (or all) of the attack classes. Ultimately, every algorithm was retested with optimal parameters to obtain the final classification scores. During the review of these results, execution time, both on consumerand corporate-grade equipment, was taken into account as an additional requirement. The work detailed in this paper establishes a novel supervised machine learning performance baseline for CICIDS2017.
引用
收藏
页码:125 / 136
页数:12
相关论文
共 50 条
  • [1] A Review on Mobile Threats and Machine Learning Based Detection Approaches
    Arslan, Bilgehan
    Gunduz, Sedef
    Sagiroglu, Seref
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 7 - 13
  • [2] An in-depth review of machine learning based Android malware detection
    Muzaffar, Ali
    Hassen, Hani Ragab
    Lones, Michael A.
    Zantout, Hind
    COMPUTERS & SECURITY, 2022, 121
  • [3] Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches
    Mughaid, Ala
    Ibrahim, Ruba
    AlJamal, Mahmoud
    AL-Aiash, Issa
    2024 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING, NETWORKING AND APPLICATIONS, MCNA 2024, 2024, : 35 - 41
  • [4] Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
    Halbouni, Asmaa
    Gunawan, Teddy Surya
    Habaebi, Mohamed Hadi
    Halbouni, Murad
    Kartiwi, Mira
    Ahmad, Robiah
    IEEE ACCESS, 2022, 10 : 19572 - 19585
  • [5] Vehicle Detection through Self-supervised Learning: An In-depth Review and Critical Analysis
    Tuteja, Shikha
    Tonk, Ravinder
    Kaur, Taranjeet
    Sharma, Preeti
    Sadana, Priya
    Kumar, Rajeev
    Kumar, Sunil
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2025,
  • [6] Comparative study of supervised machine learning techniques for intrusion detection
    Gharibian, Farnaz
    Ghorbani, Ali A.
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 350 - +
  • [7] Comparative Analysis of Multiclass Classification Machine Learning Models for Cybersecurity Intrusion Detection
    Loughmari, Mohamed
    El Affar, Anass
    DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 2, 2024, 1099 : 97 - 108
  • [8] Towards a Supervised Machine Learning Algorithm for Cyberattacks Detection and Prevention in a Smart Grid Cybersecurity System
    Banda, Takudzwa Vincent
    Blaauw, Dewald
    Watson, Bruce W.
    PAN-AFRICAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PT II, PANAFRICON AI 2023, 2024, 2069 : 107 - 128
  • [9] A hybrid machine learning model for detecting cybersecurity threats in IoT applications
    Usoh M.
    Asuquo P.
    Ozuomba S.
    Stephen B.
    Inyang U.
    International Journal of Information Technology, 2023, 15 (6) : 3359 - 3370
  • [10] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123