Affiliation:
1. U and P U. Patel Department of Computer Engineering, CSPIT, Charotar University of Science and Technology (CHARUSAT), Changa, India
Abstract
Network attacks are continuously surging, and attackers keep on changing their ways in penetrating a system. A network intrusion detection system is created to monitor traffic in the network and to warn regarding the breach in security by invading foreign entities in the network. Specific experiments have been performed on the NSL-KDD dataset instead of the KDD dataset because it does not have redundant data so the output produced from classifiers will not be biased. The main types of attacks are divided into four categories: denial of service (DoS), probe attack, user to root attack (U2R), remote to local attack (R2L). Overall, this chapter proposes an intense study on linear and ensemble models such as logistic regression, stochastic gradient descent (SGD), naïve bayes, light GBM (LGBM), and XGBoost. Lastly, a stacked model is developed that is trained on the above-mentioned classifiers, and it is applied to detect intrusion in networks. From the plethora of approaches taken into consideration, the authors have found maximum accuracy (98.6%) from stacked model and XGBoost.
Reference22 articles.
1. Ahmad, Z., Khan, A. S., Shiang, C. W., Abdullah, J., & Ahmad, F. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. https://onlinelibrary.wiley.com/doi/full/10.1002/ett.4150
2. Ahmed, M., Mahmood, A., & Hu, J. (2016). A survey of network anomaly detection techniques. https://www.sciencedirect.com/science/article/abs/pii/S1084804515002891
3. Alharbi, A., Alhaidari, S., & Zohdy, M. (2018). Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models. https://www.ijcit.com/archives/volume7/issue5/IJCIT070501.pdf
4. Amato, F., Mazzocca, N., Moscato, F., & Vivenzio. (2017). Multilayer Perceptron: An Intelligent Model for Classification and Intrusion Detection.https://ieeexplore.ieee.org/document/7929765
5. Britel, M. (2018). Big Data Analytic for Intrusion Detection System. https://ieeexplore.ieee.org/document/8610578
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献