Comparative Analysis of ML Classifiers for Network Intrusion Detection

被引:30
|
作者
Mahfouz, Ahmed M. [1 ]
Venugopal, Deepak [1 ]
Shiva, Sajjan G. [1 ]
机构
[1] Univ Memphis, Memphis, TN 38152 USA
关键词
IDS; Machine learning; Classification algorithms; NSL-KDD dataset; Network intrusion detection; Data mining; Feature selection; WEKA; Hyperparameters; Hyperparameter optimization;
D O I
10.1007/978-981-32-9343-4_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid growth in network-based applications, new risks arise, and different security mechanisms need additional attention to improve speed and accuracy. Although many new security tools have been developed, the fast growth of malicious activities continues to be a severe issue, and the ever-evolving attacks create serious threats to network security. Network administrators rely heavily on intrusion detection systems to detect such network intrusive activities. Machine learning methods are one of the predominant approaches to intrusion detection, where we learn models from data to differentiate between abnormal and normal traffic. Though machine learning approaches are used frequently, a deep analysis of machine learning algorithms in the context of intrusion detection is somewhat lacking. In this work, we present a comprehensive analysis of some existing machine learning classifiers regarding identifying intrusions in network traffic. Specifically, we analyze classifiers along various dimensions, namely feature selection, sensitivity to hyperparameter selection, and class imbalance problems that are inherent to intrusion detection. We evaluate several classifiers using the NSL-KDD dataset and summarize their effectiveness using a detailed experimental evaluation.
引用
收藏
页码:193 / 207
页数:15
相关论文
共 50 条
  • [1] Comparative Analysis of Machine Learning Algorithms along with Classifiers for Network Intrusion Detection
    Choudhury, Sumouli
    Bhowal, Anirban
    [J]. 2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 89 - 95
  • [2] A Comparative Analysis of Stream Data Classifiers and Conventional Classifiers for Anomaly Intrusion Detection
    Kumari, S. Ranjitha
    Kumari, P. Krishna
    [J]. ADVANCED SCIENCE LETTERS, 2015, 21 (10) : 3300 - 3304
  • [3] Ensemble Classifiers for Network Intrusion Detection System
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Shamsuddin, Siti Mariyam
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (03): : 217 - 225
  • [4] Intelligent Bayesian classifiers in network intrusion detection
    Bosin, A
    Dessì, N
    Pes, B
    [J]. INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2005, 3533 : 445 - 447
  • [5] Support vector classifiers and network intrusion detection
    Mill, J
    Inoue, A
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, PROCEEDINGS, 2004, : 407 - 410
  • [6] Combining heterogeneous classifiers for network intrusion detection
    Borji, Ali
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 254 - 260
  • [7] Multiple classifiers combination based on protocol analysis for network - Intrusion detection
    Sungang
    Zhangli
    Guojun
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 1578 - 1581
  • [8] Comparative Study and Analysis of Network Intrusion Detection Tools
    Bhosale, Dhanashri Ashok
    Mane, Vanita Manikrao
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 312 - 315
  • [9] Comparative Analysis of Backpropagation Algorithm Variants for Network Intrusion Detection
    Neupane, Nabin
    Shakya, Subarna
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 726 - 729
  • [10] Network Intrusion Detection in Cloud Environments: A Comparative Analysis of Approaches
    Ahmadi, Sina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 1 - 8