A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research

被引:9
|
作者
Dwibedi, Smirti [1 ]
Pujari, Medha [1 ]
Sun, Weiqing [1 ]
机构
[1] Univ Toledo, Coll Engn, Toledo, OH 43606 USA
关键词
Intrusion Detection; Datasets; Machine Learning; Network security; Performance Analysis;
D O I
10.1109/isi49825.2020.9280519
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the modern world, Machine Learning (ML) touches our day-to-day routine in various ways. Researchers have been actively working on adding intelligence to Intrusion Detection Systems (IDSs) using ML techniques because a traditional IDS can detect known attacks but is incapable of detecting unknown attacks. Two major factors on which the efficiency of an intelligent IDS model depends are - the data and the mechanism used by the model to learn the data. This paper focuses on the contribution of data, by performing an analysis of recently published datasets, namely, UNSW-NB15, Bot-IoT, and CSE-CIC-IDS2018, employing ML algorithms including Random Forest (RF), Support Vector Machines (SVMs), Keras Deep Learning models, and XGBoost. The paper compares the performance of an ML-based IDS by training it with each of them, thereby, analyzing how the choice of a dataset impacts the performance.
引用
收藏
页码:123 / 128
页数:6
相关论文
共 50 条
  • [1] Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets
    Pacheco, Yulexis
    Sun, Weiqing
    [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 160 - 171
  • [2] A Comparative Study on the Impact of Adversarial Machine Learning Attacks on Contemporary Intrusion Detection Datasets
    Pujari M.
    Pacheco Y.
    Cherukuri B.
    Sun W.
    [J]. SN Computer Science, 3 (5)
  • [3] Machine learning methods for cyber security intrusion detection: Datasets and comparative study
    Kilincer, Ilhan Firat
    Ertam, Fatih
    Sengur, Abdulkadir
    [J]. COMPUTER NETWORKS, 2021, 188
  • [4] Comparative research on network intrusion detection methods based on machine learning
    Zhang, Chunying
    Jia, Donghao
    Wang, Liya
    Wang, Wenjie
    Liu, Fengchun
    Yang, Aimin
    [J]. COMPUTERS & SECURITY, 2022, 121
  • [5] Comparative Study of Machine Learning Algorithm for Intrusion Detection System
    Sravani, K.
    Srinivasu, P.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2013, 2014, 247 : 189 - 196
  • [6] Adversarial machine learning for network intrusion detection: A comparative study
    Jmila, Houda
    Ibn Khedher, Mohamed
    [J]. COMPUTER NETWORKS, 2022, 214
  • [7] Comparative study of supervised machine learning techniques for intrusion detection
    Gharibian, Farnaz
    Ghorbani, Ali A.
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 350 - +
  • [8] Machine Learning for Network Intrusion Detection-A Comparative Study
    Al Lail, Mustafa
    Garcia, Alejandro
    Olivo, Saul
    [J]. FUTURE INTERNET, 2023, 15 (07):
  • [9] Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Moschoyiannis, Sotiris
    Janicke, Helge
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [10] A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
    Singh, Geeta
    Khare, Neelu
    [J]. International Journal of Computers and Applications, 2022, 44 (07) : 659 - 669