• DocumentCode
    1884313
  • Title

    Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection

  • Author

    Choudhury, Sumouli ; Bhowal, Anirban

  • Author_Institution
    Dept. of Inf. Technol., Indian Inst. of Inf. Technol., Allahabad, India
  • fYear
    2015
  • fDate
    6-8 May 2015
  • Firstpage
    89
  • Lastpage
    95
  • Abstract
    Intrusion detection is one of the challenging problems encountered by the modern network security industry. A network has to be continuously monitored for detecting policy violation or suspicious traffic. So an intrusion detection system needs to be developed which can monitor network for any harmful activities and generate results to the management authority. Data mining can play a massive role in the development of a system which can detect network intrusion. Data mining is a technique through which important information can be extracted from huge data repositories. In order to spot intrusion, the traffic created in the network can be broadly categorized into following two categories- normal and anomalous. In our proposed paper, several classification techniques and machine learning algorithms have been considered to categorize the network traffic. Out of the classification techniques, we have found nine suitable classifiers like BayesNet, Logistic, IBK, J48, PART, JRip, Random Tree, Random Forest and REPTree. Out of the several machine learning algorithms, we have worked on Boosting, Bagging and Blending (Stacking) and compared their accuracies as well. The comparison of these algorithms has been performed using WEKA tool and listed below according to certain performance metrics. Simulation of these classification models has been performed using 10-fold cross validation. NSL-KDD based data set has been used for this simulation in WEKA.
  • Keywords
    data mining; learning (artificial intelligence); pattern classification; security of data; BayesNet classifiers; IBK classifiers; J48 classifiers; JRip classifiers; NSL-KDD based data set; PART classifiers; REPTree classifiers; WEKA tool; classification techniques; data mining; data repository; logistic classifiers; machine learning algorithms; management authority; network intrusion detection; network security industry; network traffic; policy violation detection; random forest classifiers; random tree classifiers; Accuracy; Classification algorithms; Intrusion detection; Logistics; Machine learning algorithms; Prediction algorithms; Training; classification; data mining; intrusion detection; machine learning; network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on
  • Conference_Location
    Chennai
  • Print_ISBN
    978-1-4799-9854-8
  • Type

    conf

  • DOI
    10.1109/ICSTM.2015.7225395
  • Filename
    7225395