Empirical Exploration of Machine Learning Techniques for Detection of Anomalies Based on NIDS

被引:2
|
作者
Vallejo-Huanga, Diego [1 ,2 ]
Ambuludi, Marco [3 ]
Morillo, Paulina [1 ]
机构
[1] Univ Politecn Salesiana, IDEIAGEOCA Res Grp, Quito, Ecuador
[2] Univ Amer, Dept Phys & Math, Quito, Ecuador
[3] Univ Politecn Salesiana, Quito, Ecuador
关键词
Machine learning; Support vector machines; Principal component analysis; Art; Kernel; IEEE transactions; TCPIP; Machine Learning; nids; KNOWLEDGE;
D O I
10.1109/TLA.2021.9448311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer crimes and attacks on data networks have increased significantly, so it has become necessary to implement techniques that detect these threats and safeguard the information of organizations. Network Intrusion Detection Systems (NIDS) allow detecting anomalies and attacks in real time, by analyzing the local and outgoing traffic of the network. At present, to improve its performance, it has been chosen to use Machine Learning (ML) techniques that automate these processes and improve the detection of an anomaly. This paper implements ML techniques through the use of datasets, in the context of a NIDS, for the detection and prediction of anomalies on networks. Tests were performed with non-supervised and supervised learning algorithms on NSL-KDD and UNSW-NB15 datasets. An exploratory analysis of data together with dimensionality reduction techniques allowed us to understand the nature of the data, prior to the modeling. The results show that the methodology can be extrapolated for real scenarios with different network configurations.
引用
收藏
页码:772 / 779
页数:8
相关论文
共 50 条
  • [1] Machine Learning Techniques for Anomalies Detection and Classification
    Abdel-Aziz, Amira Sayed
    Hassanien, Aboul Ella
    Azar, Ahmad Taher
    Hanafi, Sanaa El-Ola
    [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 219 - +
  • [2] Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT
    Baron, Alex
    Le Jeune, Laurens
    Hellemans, Wouter
    Rabbani, Md Masoom
    Mentens, Nele
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 246 - 264
  • [3] A comprehensive exploration of machine learning techniques for EEG-based anxiety detection
    Aldayel, Mashael
    Al-Nafjan, Abeer
    [J]. PEERJ COMPUTER SCIENCE, 2024, 10
  • [4] Ensemble Machine Learning Techniques for Attack Prediction in NIDS Environment
    Reddy, T. Sreenivasula
    Sathya, R.
    [J]. Iraqi Journal for Computer Science and Mathematics, 2022, 3 (02): : 78 - 82
  • [5] Anomaly-Based NIDS: A Review of Machine Learning Methods on Malware Detection
    Raffie, Mohd Z. A.
    Zuhairi, Megat F.
    Akimi, Shadil Z. A.
    Dao, Hassan
    [J]. 2016 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICTM), 2016, : 266 - 270
  • [6] Empirical Analysis of Supervised Machine Learning Techniques for Cyberbullying Detection
    Kumar, Akshi
    Nayak, Shashwat
    Chandra, Navya
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 223 - 230
  • [7] Machine Learning Based Cloud Computing Anomalies Detection
    Chkirbene, Zina
    Erbad, Aiman
    Hamila, Ridha
    Gouissem, Ala
    Mohamed, Amr
    Hamdi, Mounir
    [J]. IEEE NETWORK, 2020, 34 (06): : 178 - 183
  • [8] An Empirical Study on Detection of Android Adware Using Machine Learning Techniques
    Umar Farooq
    Surinder Singh Khurana
    Parvinder Singh
    Munish Kumar
    [J]. Multimedia Tools and Applications, 2024, 83 : 38753 - 38792
  • [9] An Empirical Study on Detection of Android Adware Using Machine Learning Techniques
    Farooq, Umar
    Khurana, Surinder Singh
    Singh, Parvinder
    Kumar, Munish
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (13) : 38753 - 38792
  • [10] A machine learning-based workflow for automatic detection of anomalies in machine tools
    Zuefle, Marwin
    Moog, Felix
    Lesch, Veronika
    Krupitzer, Christian
    Kounev, Samuel
    [J]. ISA TRANSACTIONS, 2022, 125 : 445 - 458