DOI QR코드

DOI QR Code

Comparative Analysis of Intrusion Detection Attack Based on Machine Learning Classifiers

  • Received : 2024.10.05
  • Published : 2024.10.30

Abstract

In current day information transmitted from one place to another by using network communication technology. Due to such transmission of information, networking system required a high security environment. The main strategy to secure this environment is to correctly identify the packet and detect if the packet contain a malicious and any illegal activity happened in network environments. To accomplish this we use intrusion detection system (IDS). Intrusion detection is a security technology that design detects and automatically alert or notify to a responsible person. However, creating an efficient Intrusion Detection System face a number of challenges. These challenges are false detection and the data contain high number of features. Currently many researchers use machine learning techniques to overcome the limitation of intrusion detection and increase the efficiency of intrusion detection for correctly identify the packet either the packet is normal or malicious. Many machine-learning techniques use in intrusion detection. However, the question is which machine learning classifiers has been potentially to address intrusion detection issue in network security environment. Choosing the appropriate machine learning techniques required to improve the accuracy of intrusion detection system. In this work, three machine learning classifier are analyzed. Support vector Machine, Naïve Bayes Classifier and K-Nearest Neighbor classifiers. These algorithms tested using NSL KDD dataset by using the combination of Chi square and Extra Tree feature selection method and Python used to implement, analyze and evaluate the classifiers. Experimental result show that K-Nearest Neighbor classifiers outperform the method in categorizing the packet either is normal or malicious.

Keywords

References

  1. Anderson, J. P. Computer security threat monitoring and surveillance, 1980. 
  2. J. J. Davis and A. J. Clark, "Data preprocessing for anomaly based network intrusion detection: A review," Computers & Security, vol. 30, pp. 353-375, 2011. 
  3. "Host- vs. Network-Based Intrusion Detection Systems," Global Information Assurance Certification Paper. 2005 
  4. Belavagi, Manjula C., and Balachandra Muniyal. "Performance evaluation of supervised machine learning algorithms for intrusion detection." Procedia Computer Science 89 (2016): 117-123. 
  5. Ahmad, Iftikhar, et al. "Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection." IEEE Access 6 (2018): 33789-33795. 
  6. Mehmood, Tahir, and Helmi B. Md Rais. "Machine learning algorithms in context of intrusion detection." 2016 3rd International Conference on Computer and Information Sciences (ICCOINS). IEEE, 2016. 
  7. Choudhury, Sumouli, and Anirban Bhowal. "Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection." 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM). IEEE, 2015. 
  8. Jha, Jayshree, and Leena Ragha. "Intrusion detection system using support vector machine." International Journal of Applied Information Systems (IJAIS) 3 (2013): 25-30. 
  9. Chitrakar, Roshan, and Chuanhe Huang. "Anomaly based intrusion detection using hybrid learning approach of combining k-medoids clustering and naive Bayes classification." 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2012. 
  10. http://nsl.cs.unb.ca/NSL-KDD/, November 2014.