Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection and Attack Classification

被引:5
|
作者
Leon, Miguel [1 ]
Markovic, Tijana [1 ]
Punnekkat, Sasikumar [1 ]
机构
[1] Malardalen Univ, Sch Innovat Design & Engn, Vasteras, Sweden
基金
欧盟地平线“2020”;
关键词
Machine Learning; Supervised Learning; Unsupervised Learning; Intrusion Detection; Attack Classification; DETECTION SYSTEM;
D O I
10.1109/IJCNN55064.2022.9892293
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing use of the internet and reliance on computer-based systems for our daily lives, any vulnerability in those systems is one of the most important issues for the community. For this reason, the need for intelligent models that detect malicious intrusions is important to keep our personal information safe. In this paper, we investigate several supervised (Artificial Neural Network, Support Vector Machine, Random Forest, Linear Discriminant Analysis, and K-Nearest Neighbors) and unsupervised (K-means, Mean-shift, and DBSCAN) machine learning algorithms, in the context of anomaly-based Intrusion Detection Systems. We are using four different IDS benchmark datasets (KDD99, NSL-KDD, UNSW-NB15, and CIC-IDS-2017) to evaluate the performance of the selected machine learning algorithms for both intrusion detection and attack classification. The results have shown that Random Forest is the most suitable algorithm regarding model accuracy and execution time.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Comparative Analysis of Machine Learning Algorithms along with Classifiers for Network Intrusion Detection
    Choudhury, Sumouli
    Bhowal, Anirban
    2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 89 - 95
  • [2] A comparative study of classification algorithms for network intrusion detection
    Khoshgoftaar, TM
    Gao, KH
    Wang, YL
    TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2004, : 168 - 172
  • [3] Enhancing IoT Network Defense: A Comparative Study of Machine Learning Algorithms for Attack Classification
    McNair, Alkendria
    Precious-Esue, Divine
    Newson, Soundra
    Rahimi, Nick
    SOFTWARE AND DATA ENGINEERING, SEDE 2024, 2025, 2244 : 55 - 64
  • [4] Evaluation of Machine Learning Algorithms for Intrusion Detection System
    Almseidin, Mohammad
    Alzubi, Maen
    Kovacs, Szilveszter
    Alkasassbeh, Mouhammd
    2017 IEEE 15TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY), 2017, : 277 - 282
  • [5] Network Intrusion Detection Using Machine Learning Anomaly Detection Algorithms
    Hanifi, Khadija
    Bank, Hasan
    Karsligil, M. Elif
    Yavuz, A. Gokhan
    Guvensan, M. Amac
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [6] Network Intrusion Detection on Apache Spark with Machine Learning Algorithms
    Kurt, Elif Merve
    Becerikli, Yasar
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EANN 2018, 2018, 893 : 130 - 141
  • [7] On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
    Corsini, Andrea
    Yang, Shanchieh Jay
    Apruzzese, Giovanni
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [8] Evaluation of Machine Learning Techniques for Network Intrusion Detection
    Zaman, Marzia
    Lung, Chung-Horng
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [9] Evaluation of Machine Learning Algorithms for Intrusion Detection System in WSN
    Alsahli, Mohammed S.
    Almasri, Marwah M.
    Al-Akhras, Mousa
    Al-Issa, Abdulaziz I.
    Alawairdhi, Mohammed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 617 - 626
  • [10] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123