Applying Machine Learning to Anomaly-Based Intrusion Detection Systems
Title | Applying Machine Learning to Anomaly-Based Intrusion Detection Systems |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Yihunie, Fekadu, Abdelfattah, Eman, Regmi, Amish |
Conference Name | 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT) |
Date Published | may |
Keywords | anomaly-based Intrusion Detection Systems, composability, gradient methods, Internet, Internet-based traffic, Intrusion Detection Systems, Intrusion Detection systems (IDSs), intrusive traffics, logistic regression, machine learning, machine learning techniques, Malicious Traffic, NSL-KDD, NSL-KDD dataset, pubcrawl, random forest classifier, random forests, regression analysis, Resiliency, security of data, sequential model, stochastic gradient decent, support vector machine, Support vector machines, telecommunication traffic, unsupervised anomaly traffic detection techniques |
Abstract | The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vulnerabilities. Intrusive traffics are affecting the normal functionality of network's operation by consuming corporate resources and time. Efficient ways of identifying, protecting, and mitigating from intrusive incidents enhance productivity. As Intrusion Detection System (IDS) is hosted in the network and at the user machine level to oversee the malicious traffic in the network and at the individual computer, it is one of the critical components of a network and host security. Unsupervised anomaly traffic detection techniques are improving over time. This research aims to find an efficient classifier that detects anomaly traffic from NSL-KDD dataset with high accuracy level and minimal error rate by experimenting with five machine learning techniques. Five binary classifiers: Stochastic Gradient Decent, Random Forests, Logistic Regression, Support Vector Machine, and Sequential Model are tested and validated to produce the result. The outcome demonstrates that Random Forest Classifier outperforms the other four classifiers with and without applying the normalization process to the dataset. |
DOI | 10.1109/LISAT.2019.8817340 |
Citation Key | yihunie_applying_2019 |
- NSL-KDD dataset
- unsupervised anomaly traffic detection techniques
- telecommunication traffic
- Support vector machines
- support vector machine
- stochastic gradient decent
- sequential model
- security of data
- Resiliency
- regression analysis
- random forests
- random forest classifier
- pubcrawl
- anomaly-based Intrusion Detection Systems
- NSL-KDD
- Malicious Traffic
- machine learning techniques
- machine learning
- logistic regression
- intrusive traffics
- Intrusion Detection systems (IDSs)
- Intrusion Detection Systems
- Internet-based traffic
- internet
- gradient methods
- composability