Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

被引:12
|
作者
Hamid, Yasir [1 ]
Sugumaran, M. [1 ]
Journaux, Ludovic [2 ]
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
[2] Univ Burgundy, Lab Le2i, Dijon, France
关键词
False Positive; IDS; Machine Learning; Precision; ROC; True Positive;
D O I
10.1145/2980258.2980378
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework's security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The technique of looking at the system information for the conceivable intrusions is known intrusion detection. For the last two decades, automatic intrusion detection system has been an important exploration point. Till now researchers have developed Intrusion Detection Systems (IDS) with the capability of detecting attacks in several available environments; latest on the scene are Machine Learning approaches. Machine learning techniques are the set of evolving algorithms that learn with experience, have improved performance in the situations they have already encountered and also enjoy a broad range of applications in speech recognition, pattern detection, outlier analysis etc. There are a number of machine learning techniques developed for different applications and there is no universal technique that can work equally well on all datasets. In this work, we evaluate all the machine learning algorithms provided by Weka against the standard data set for intrusion detection i.e. KddCupp99. Different measurements contemplated are False Positive Rate, precision, ROC, True Positive Rate.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection
    Vitorino, Joao
    Andrade, Rui
    Praca, Isabel
    Sousa, Orlando
    Maia, Eva
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 191 - 207
  • [2] Comparative study of supervised machine learning techniques for intrusion detection
    Gharibian, Farnaz
    Ghorbani, Ali A.
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 350 - +
  • [3] Performance Analysis of Machine Learning Techniques in Intrusion Detection
    Tungjaturasopon, Praiya
    Piromsopa, Krerk
    [J]. PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 6 - 10
  • [4] Performance Analysis Of Machine Learning Techniques In Intrusion Detection
    Kaya, Cetin
    Yildiz, Oktay
    Ay, Sinan
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1473 - 1476
  • [5] Analysis of Machine Learning Techniques Based Intrusion Detection Systems
    Sharma, Rupam Kr.
    Kalita, Hemanta Kumar
    Borah, Parashjyoti
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 485 - 493
  • [6] Analysis on intrusion detection system using machine learning techniques
    Seraphim B.I.
    Poovammal E.
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 423 - 441
  • [7] PERFORMANCE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
    Jadhav, Abhijit D.
    Pellakuri, Vidyullatha
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [8] Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
    Alaketu, Muyideen Ayodeji
    Oguntimilehin, Abiodun
    Olatunji, Kehinde Adebola
    Abiola, Oluwatoyin Bunmi
    Badeji-Ajisafe, Bukola
    Akinduyite, Christiana Olanike
    Obamiyi, Stephen Eyitayo
    Babalola, Gbemisola Olutosin
    Okebule, Toyin
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2024, 21 (02) : 326 - 337
  • [9] A comparative study of unsupervised machine learning and data mining techniques for intrusion detection
    Sadoddin, Reza
    Ghorbani, Ali A.
    [J]. MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2007, 4571 : 404 - +
  • [10] A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection
    Mishra, Preeti
    Varadharajan, Vijay
    Tupakula, Uday
    Pilli, Emmanuel S.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 686 - 728