Comparative study of supervised machine learning techniques for intrusion detection

被引:0
|
作者
Gharibian, Farnaz [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Network Secur Lab, Fredericton, NB E3B 5A3, Canada
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intrusion detection is an effective approach for dealing with various problems in the area of network security. This paper presents a comparative study of using supervised probabilistic and predictive machine learning techniques for intrusion detection. Two probabilistic techniques Naive Bayes and Gaussian and two predictive techniques Decision Tree and Random Forests are employed. Different training datasets constructed from the KDD99 dataset are employed for training. The ability of each technique for detecting four attack categories (DoS,Probe,R2L and U2R) have been compared. The statistical results to show the sensitivity of each technique to the population of attacks in a dataset have also been reported. We compare the performance of the techniques and also investigate the robustness of each technique by calculating their standard deviations with respect to the detection rate of each attack category.
引用
收藏
页码:350 / +
页数:2
相关论文
共 50 条
  • [31] Intrusion Detection System: A Comparative Study of Machine Learning-Based IDS
    Singh, Amit
    Prakash, Jay
    Kumar, Gaurav
    Jain, Praphula Kumar
    Ambati, Loknath Sai
    [J]. JOURNAL OF DATABASE MANAGEMENT, 2024, 35 (01)
  • [32] Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
    Alaketu, Muyideen Ayodeji
    Oguntimilehin, Abiodun
    Olatunji, Kehinde Adebola
    Abiola, Oluwatoyin Bunmi
    Badeji-Ajisafe, Bukola
    Akinduyite, Christiana Olanike
    Obamiyi, Stephen Eyitayo
    Babalola, Gbemisola Olutosin
    Okebule, Toyin
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2024, 21 (02) : 326 - 337
  • [33] Comparative Study of Machine Learning Techniques for Pre-processing of Network Intrusion Data
    Rahat, Faiza
    Ahsan, Syed Nadeem
    [J]. 2015 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS & TECHNOLOGIES (ICOSST), 2015, : 46 - 51
  • [34] Comparative Analysis of Supervised Machine Learning Techniques for Sales Forecasting
    Raizada, Stuti
    Saini, Jatinderkumar R.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 102 - 110
  • [35] NETWORK INTRUSION DETECTION SYSTEMS USING SUPERVISED MACHINE LEARNING CLASSIFICATION AND DIMENSIONALITY REDUCTION TECHNIQUES: A SYSTEMATIC REVIEW
    Ashi, Zein
    Aburashed, Laila
    Al-Qudah, Mahmoud
    Qusef, Abdallah
    [J]. JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2021, 7 (04): : 373 - 390
  • [36] Intrusion detection based on behavior mining and machine learning techniques
    Mukkamala, Srinivas
    Xu, Dennis
    Sung, Andrew H.
    [J]. ADVANCES IN APPLIED ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4031 : 619 - 628
  • [37] Analysis of Machine Learning Techniques Based Intrusion Detection Systems
    Sharma, Rupam Kr.
    Kalita, Hemanta Kumar
    Borah, Parashjyoti
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 485 - 493
  • [38] Security intrusion detection using quantum machine learning techniques
    Maxim Kalinin
    Vasiliy Krundyshev
    [J]. Journal of Computer Virology and Hacking Techniques, 2023, 19 : 125 - 136
  • [39] Security intrusion detection using quantum machine learning techniques
    Kalinin, Maxim
    Krundyshev, Vasiliy
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 125 - 136
  • [40] Security for the Metaverse: Blockchain and Machine Learning Techniques for Intrusion Detection
    Truong, Vu Tuan
    Le, Long Bao
    [J]. IEEE Network, 2024, 38 (05): : 204 - 212