Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset

被引:5
|
作者
Chua, Tuan-Hong [1 ]
Salam, Iftekhar [1 ]
机构
[1] Xiamen Univ Malaysia, Sch Comp & Data Sci, Sepang 43900, Malaysia
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 06期
关键词
intrusion detection; machine learning; deep learning; cybersecurity; DETECTION SYSTEM;
D O I
10.3390/sym15061251
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cybersecurity has become one of the focuses of organisations. The number of cyberattacks keeps increasing as Internet usage continues to grow. As new types of cyberattacks continue to emerge, researchers focus on developing machine learning (ML)-based intrusion detection systems (IDS) to detect zero-day attacks. They usually remove some or all attack samples from the training dataset and only include them in the testing dataset when evaluating the performance. This method may detect unknown attacks; however, it does not reflect the long-term performance of the IDS as it only shows the changes in the type of attacks. In this work, we focused on evaluating the long-term performance of ML-based IDS. To achieve this goal, we proposed evaluating the ML-based IDS using a dataset created later than the training dataset. The proposed method can better assess the long-term performance as the testing dataset reflects the changes in the attack type and network infrastructure changes over time. We have implemented six of the most popular ML models, including decision tree (DT), random forest (RF), support vector machine (SVM), naive Bayes (NB), artificial neural network (ANN), and deep neural network (DNN). These models are trained and tested with a pair of datasets with symmetrical classes. Our experiments using the CIC-IDS2017 and the CSE-CIC-IDS2018 datasets show that SVM and ANN are most resistant to overfitting. Our experiments also indicate that DT and RF suffer the most from overfitting, although they perform well on the training dataset. On the other hand, our experiments using the LUFlow dataset have shown that all models can perform well when the difference between the training and testing datasets is small.
引用
收藏
页数:31
相关论文
共 50 条
  • [21] Evaluation of Machine Learning Techniques for Network Intrusion Detection
    Zaman, Marzia
    Lung, Chung-Horng
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [22] Evaluation of Machine Learning Algorithms for Intrusion Detection System in WSN
    Alsahli, Mohammed S.
    Almasri, Marwah M.
    Al-Akhras, Mousa
    Al-Issa, Abdulaziz I.
    Alawairdhi, Mohammed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 617 - 626
  • [23] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123
  • [24] On Evaluation of Network Intrusion Detection Systems: Statistical Analysis of CIDDS-001 Dataset Using Machine Learning Techniques
    Verma, Abhishek
    Ranga, Virender
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2018, 26 (03): : 1307 - 1331
  • [25] An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset
    Rao, Yamarthi Narasimha
    Babu, Kunda Suresh
    SENSORS, 2023, 23 (01)
  • [26] Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context
    Sabhnani, M
    Serpen, G
    MLMTA'03: INTERNATIONAL CONFERENCE ON MACHINE LEARNING; MODELS, TECHNOLOGIES AND APPLICATIONS, 2003, : 209 - 215
  • [27] A novel machine learning model for perimeter intrusion detection using intrusion image dataset
    Pitafi, Shahneela
    Anwar, Toni
    Widia, I. Dewa Made
    Sharif, Zubair
    Yimwadsana, Boonsit
    PLOS ONE, 2024, 19 (12):
  • [28] Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning Techniques
    Clottey, Richard Nunoo
    Yaokumah, Winfred
    Appati, Justice Kwame
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2021, 17 (04)
  • [29] Machine Learning in Network Intrusion Detection: A Cross-Dataset Generalization Study
    Cantone, Marco
    Marrocco, Claudio
    Bria, Alessandro
    IEEE ACCESS, 2024, 12 : 144489 - 144508
  • [30] MLIDS: A Machine Learning Approach for Intrusion Detection for Real Time Network Dataset
    Rokade, Monika D.
    Sharma, Yogesh Kumar
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 533 - 536