skip to main content
10.1145/2980258.2980378acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciaConference Proceedingsconference-collections
research-article

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

Published: 25 August 2016 Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICIA 2016 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

Abstract

With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework's security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The technique of looking at the system information for the conceivable intrusions is known intrusion detection. For the last two decades, automatic intrusion detection system has been an important exploration point. Till now researchers have developed Intrusion Detection Systems (IDS) with the capability of detecting attacks in several available environments; latest on the scene are Machine Learning approaches. Machine learning techniques are the set of evolving algorithms that learn with experience, have improved performance in the situations they have already encountered and also enjoy a broad range of applications in speech recognition, pattern detection, outlier analysis etc. There are a number of machine learning techniques developed for different applications and there is no universal technique that can work equally well on all datasets. In this work, we evaluate all the machine learning algorithms provided by Weka against the standard data set for intrusion detection i.e. KddCupp99. Different measurements contemplated are False Positive Rate, precision, ROC, True Positive Rate.

References

[1]
J. M. Kizza, Computer Network Security. Springer Science & Business Media, 2005.
[2]
R. Heady, G. F. Luger, A. Maccabe, and M. Servilla, The architecture of a network level intrusion detection system. Department of Computer Science, College of Engineering, University of New Mexico, 1990.
[3]
J. Crume, Inside internet security: What hackers don't want you to know. Pearson Education, 2000.
[4]
A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer networks, vol. 51, no. 12, pp. 3448--3470, 2007.
[5]
S. B. Kotsiantis, I. Zaharakis, and P. Pintelas, Supervised machine learning: A review of classification techniques. 2007.
[6]
C. A. Catania and C. G. Garino, "Automatic network intrusion detection: Current techniques and open issues," Computers & Electrical Engineering, vol. 38, no. 5, pp. 1062--1072, 2012.
[7]
Y. Hamid, M. Sugumaran, and V. Balasaraswathi, "IDS Using Machine Learning - Current State of Art and Future Directions," British Journal of Applied Science & Technology, vol. 15, no. 3, pp. 1--22, Jan. 2016.
[8]
D. Barbara, J. Couto, S. Jajodia, L. Popyack, and N. Wu, "ADAM: Detecting intrusions by data mining," in In Proceedings of the IEEE Workshop on Information Assurance and Security, 2001.
[9]
D. Anderson, T. Frivold, and A. Valdes, Next-generation intrusion detection expert system (NIDES): A summary. SRI International, Computer Science Laboratory Menio Park, CA, 1995.
[10]
M. A. Hall, "Correlation-based feature selection for machine learning," The University of Waikato, 1999.
[11]
J. Zhang and M. Zulkernine, "A hybrid network intrusion detection technique using random forests," in First International Conference on Availability, Reliability and Security (ARES'06), 2006, p. 8--pp.
[12]
D. M. Farid and M. Z. Rahman, "Anomaly network intrusion detection based on improved self adaptive bayesian algorithm," Journal of computers, vol. 5, no. 1, pp. 23--31, 2010.
[13]
S. M. Bridges and R. B. Vaughn, "Fuzzy data mining and genetic algorithms applied to intrusion detection," in Proceedings of 12th Annual Canadian Information Technology Security Symposium, 2000, pp. 109--122.
[14]
B. Luo and J. Xia, "A novel intrusion detection system based on feature generation with visualization strategy," Expert Systems with Applications, vol. 41, no. 9, pp. 4139--4147, 2014.
[15]
"Machine learning - Wikipedia, the free encyclopedia." {Online}. Available: https://en.wikipedia.org/wiki/Machine_learning.
[16]
S. Khan, "Ethem Alpaydin. Introduction to Machine Learning (Adaptive Computation and Machine Learning Series). The MIT Press, 2004.," Natural Language Engineering, vol. 14, no. 01, pp. 133--137, 2008.
[17]
"Prediction: Machine Learning and Statistics," MIT OpenCourseWare. {Online}. Available: http://ocw.mit.edu/courses/sloan-school-of-management/15-097-prediction-machine-learning-and-statistics-spring-2012/.
[18]
A. O. Adetunmbi, S. O. Falaki, O. S. Adewale, and B. K. Alese, "Network intrusion detection based on rough set and k-nearest neighbour," International Journal of Computing and ICT Research, vol. 2, no. 1, pp. 60--66, 2008.
[19]
A. A. Olusola, A. S. Oladele, and D. O. Abosede, "Analysis of KDD'99 Intrusion detection dataset for selection of relevance features," in Proceedings of the World Congress on Engineering and Computer Science, 2010, vol. 1, pp. 20--22.
[20]
A. Avalappampatty Sivasamy and B. Sundan, "A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T 2 Statistics Approach for Network Environments," The Scientific World Journal, vol. 2015, 2015.
[21]
P. G. Jeya, M. Ravichandran, and C. S. Ravichandran, "Efficient classifier for R2L and U2R attacks," International Journal of Computer Applications, vol. 45, no. 21, p. 29, 2012.
[22]
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Survey on incremental approaches for network anomaly detection," arXiv preprint arXiv:1211.4493, 2012.
[23]
"KDD Cup 1999 Data." {Online}. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
[24]
W. Lee, S. J. Stolfo, and others, "Data mining approaches for intrusion detection," in Usenix security, 1998.
[25]
"JRip - Pentaho Data Mining - Pentaho Wiki." {Online}. Available: http://wiki.pentaho.com/display/DATAMINING/JRip.
[26]
K. P. Murphy, "Naive bayes classifiers," University of British Columbia, 2006.
[27]
M. Khan and S. M. K. Quadri, "Evaluating Various Learning Techniques for Efficiency," International Journal of Engineering and Advanced Technology (IJEAT), vol. 2, no. 2, pp. 326--331, 2012.
[28]
W. Iba and P. Langley, "Induction of one-level decision trees," in Proceedings of the ninth international conference on machine learning, 1992, pp. 233--240.

Cited By

View all
  • (2024)Performance Evaluation Framework for Insider Threat Detection Using Machine Learning2024 Intelligent Methods, Systems, and Applications (IMSA)10.1109/IMSA61967.2024.10652829(1-6)Online publication date: 13-Jul-2024
  • (2024)Overview of Machine Learning Techniques in Cybersecurity Data Science using Gradient Boosting and Random Forest Algorithm2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI)10.1109/ICoICI62503.2024.10696688(19-24)Online publication date: 28-Aug-2024
  • (2024)GRU-Enhanced Decoding by Lightweight Transformer for Image Captioning2024 14th International Conference on Cloud Computing, Data Science & Engineering (Confluence)10.1109/Confluence60223.2024.10463460(407-410)Online publication date: 18-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIA-16: Proceedings of the International Conference on Informatics and Analytics
August 2016
868 pages
ISBN:9781450347563
DOI:10.1145/2980258
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 August 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. False Positive
  2. IDS
  3. Machine Learning
  4. Precision
  5. ROC
  6. True Positive

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIA-16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)53
  • Downloads (Last 6 weeks)8
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Performance Evaluation Framework for Insider Threat Detection Using Machine Learning2024 Intelligent Methods, Systems, and Applications (IMSA)10.1109/IMSA61967.2024.10652829(1-6)Online publication date: 13-Jul-2024
  • (2024)Overview of Machine Learning Techniques in Cybersecurity Data Science using Gradient Boosting and Random Forest Algorithm2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI)10.1109/ICoICI62503.2024.10696688(19-24)Online publication date: 28-Aug-2024
  • (2024)GRU-Enhanced Decoding by Lightweight Transformer for Image Captioning2024 14th International Conference on Cloud Computing, Data Science & Engineering (Confluence)10.1109/Confluence60223.2024.10463460(407-410)Online publication date: 18-Jan-2024
  • (2024)Development of a Machine Learning Model for Enhancing the Security of the Internet of Things (IoT) SystemProceedings of the 5th International Conference on Data Science, Machine Learning and Applications; Volume 110.1007/978-981-97-8031-0_114(1086-1093)Online publication date: 6-Oct-2024
  • (2024)Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature ReviewArtificial Intelligence Research10.1007/978-3-031-78255-8_13(207-234)Online publication date: 26-Nov-2024
  • (2023)Evaluation of Machine Learning for Intrusion Detection in Microservice ApplicationsProceedings of the 12th Latin-American Symposium on Dependable and Secure Computing10.1145/3615366.3615375(126-135)Online publication date: 16-Oct-2023
  • (2023)Cyber Security System Using Fuzzy Logic2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)10.1109/ICECCME57830.2023.10252778(1-6)Online publication date: 19-Jul-2023
  • (2023)Internet of Things (IoT) security dataset evolution: Challenges and future directionsInternet of Things10.1016/j.iot.2023.10078022(100780)Online publication date: Jul-2023
  • (2023)Cyberthreat Detection Using Machine LearningEmerging Technology for Sustainable Development10.1007/978-981-99-4362-3_27(287-295)Online publication date: 1-Nov-2023
  • (2022)Network Intrusion Detection Using Linear and Ensemble ML ModelingImplementing Data Analytics and Architectures for Next Generation Wireless Communications10.4018/978-1-7998-6988-7.ch003(27-50)Online publication date: 2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media