A Machine Learning Approach for Improving the Performance of Network Intrusion Detection Systems
-
Published:2021-03-20
Issue:5
Volume:5
Page:201-208
-
ISSN:2516-029X
-
Container-title:Annals of Emerging Technologies in Computing
-
language:en
-
Short-container-title:AETiC
Author:
Azizan Adnan Helmi, Mostafa Salama A., Mustapha Aida, Foozy Cik Feresa Mohd, Wahab Mohd Helmy AbdORCID, Mohammed Mazin Abed, Khalaf Bashar Ahmad
Abstract
Intrusion detection systems (IDS) are used in analyzing huge data and diagnose anomaly traffic such as DDoS attack; thus, an efficient traffic classification method is necessary for the IDS. The IDS models attempt to decrease false alarm and increase true alarm rates in order to improve the performance accuracy of the system. To resolve this concern, three machine learning algorithms have been tested and evaluated in this research which are decision jungle (DJ), random forest (RF) and support vector machine (SVM). The main objective is to propose a ML-based network intrusion detection system (ML-based NIDS) model that compares the performance of the three algorithms based on their accuracy and precision of anomaly traffics. The knowledge discovery in databases (KDD) methodology and intrusion detection evaluation dataset (CIC-IDS2017) are used in the testing which both are considered as a benchmark in the evaluation of IDS. The average accuracy results of the SVM is 98.18%, RF is 96.76% and DJ is 96.50% in which the highest accuracy is achieved by the SVM. The average precision results of the SVM is 98.74, RF is 97.96 and DJ is 97.82 in which the SVM got a higher average precision compared with the other two algorithms. The average recall results of the SVM is 95.63, RF is 97.62 and DJ is 95.77 in which the RF achieves the highest average of recall than SVM and DJ. In overall, the SVM algorithm is found to be the best algorithm that can be used to detect an intrusion in the system.
Publisher
International Association for Educators and Researchers (IAER)
Subject
Electrical and Electronic Engineering,General Computer Science
Reference19 articles.
1. [1] Richariya, V., Singh, U. P., and Mishra, R. (2012). Distributed approach of intrusion detection system: Survey. International Journal of Advanced Computer Research, 2(4), 358. 2. [2] Khalaf, B. A., Mostafa, S. A., Mustapha, A., Mohammed, M. A., and Abduallah, W. M. (2019). Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access, 7, 51691-51713. 3. [3] Ahmad, I., Basheri, M., Iqbal, M. J., and Rahim, A. (2018). Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access, 6, 33789-33795. 4. [4] Primartha, R., and Tama, B. A. (2017, November). Anomaly detection using random forest: A performance revisited. In 2017 International conference on data and software engineering (ICoDSE) (pp. 1-6). IEEE. 5. [5] Mostafa, S. A., Mustapha, A., Shamala, P., Obaid, O. I., and Khalaf, B. A. (2020). Social networking mobile apps framework for organizing and facilitating charitable and voluntary activities in Malaysia. Bulletin of Electrical Engineering and Informatics, 9(2), 827-833.
Cited by
53 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|