Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset

Author:

Songma Surasit1ORCID,Sathuphan Theera2,Pamutha Thanakorn3

Affiliation:

1. Department of Information Technology, Faculty of Science and Technology, Suan Dusit University, Bangkok 10300, Thailand

2. Faculty of Computer Science, Ubon Ratchathani Rajabhat University, Ubonratchathani 34000, Thailand

3. Faculty of Science Technology and Agriculture, Yala Rajabhat University, Yala 95000, Thailand

Abstract

This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018 dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory data analysis, and data normalization procedures (min-max and Z-score) are used to prepare data for use with various classifiers; second, in order to improve processing speed and reduce model complexity, a combination of principal component analysis (PCA) and random forest (RF) is used to reduce non-significant features by comparing them to the full dataset; finally, machine learning methods (XGBoost, CART, DT, KNN, MLP, RF, LR, and Bayes) are applied to specific features and preprocessing procedures, with the XGBoost, DT, and RF models outperforming the others in terms of both ROC values and CPU runtime. The evaluation concludes with the discovery of an optimal set, which includes PCA and RF feature selection.

Publisher

MDPI AG

Subject

Computer Networks and Communications,Human-Computer Interaction

Reference39 articles.

1. A Systematic and Comprehensive Survey of Recent Advances in Intrusion Detection Systems Using Machine Learning: Deep Learning, Datasets, and Attack Taxonomy;Momand;J. Sens.,2023

2. Intrusion detection systems, issues, challenges, and needs;Aljanabi;Int. J. Comput. Intell. Syst.,2021

3. Qusyairi, R., Saeful, F., and Kalamullah, R. (2020, January 7–8). Implementation of Ensemble Learning and Feature Selection for Performance Improvements in Anomaly-Based Intrusion Detection Systems. Proceedings of the International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), Bali, Indonesia.

4. Machine learning to improve the performance of anomaly-based network intrusion detection in big data;Chimphlee;Indones. J. Electr. Eng. Comput. Sci.,2023

5. An intelligent intrusion detection system;Kaja;Appl. Intell.,2019

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3