Applying Deep Learning Techniques for Network Traffic Classification: A Comparison Study on the NSL-KDD Dataset

Author:

Trrad Issam1

Affiliation:

1. Jadara University

Abstract

Abstract The escalating intricacy and refinement of network attacks require the implementation of advanced methodologies in network security and intrusion detection. This study centers on the utilization of machine learning techniques for the categorization of network traffic, specifically employing the NSL-KDD dataset. This study investigates the efficacy of various classifiers, namely Linear Support Vector Machine (SVM), Quadratic SVM, K-Nearest Neighbor (kNN), and Long Short-Term Memory (LSTM), for the precise detection of anomalous network activity. The data is preprocessed through various techniques, including one-hot encoding and normalization, in order to enhance the performance of the model. Feature selection is utilized as a means to improve the outcomes of classification. By conducting a thorough evaluation and analysis, we present an assessment of the classifiers' performance in terms of precision, recall, and F1-score. The findings demonstrate the potential application of machine learning techniques in the field of network security, underscoring the significance of carefully choosing suitable algorithms and preprocessing approaches to achieve efficient intrusion detection. The results of our study make a significant contribution to the advancement of intrusion detection systems based on machine learning. These findings offer valuable insights for both network security practitioners and researchers in the field.

Publisher

Research Square Platform LLC

Reference43 articles.

1. Alrawashdeh K, Purdy C (2016) Toward an online anomaly intrusion detection system based on deep learning, in 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 195–200

2. Alter S (1996) Information Systems: A Management Perspective, 2nd edn. The Benjamin/Cummings, Menlo Park, CA

3. Bhattacharjee PS, Fujail AKM, Begum SA (2017) Intrusion detection system for NSL-KDD data set using vectorised fitness function in genetic algorithm, Advanced Computer Sciences and Technologies, vol. 10, no. 2, pp. 235–246,

4. Boyce MW, Duma KM, Hettinger LJ, Malone TB, Wilson DP, Lockett-Reynolds J (2011) Human performance in cybersecurity: A research agenda, in Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 55, pp. 1115–1119

5. Brancheau JC, Wetherbe JC (1987) Key issues in information systems management MIS Quarterly, pp. 23–45,

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3