Analyzing the Performance of Machine Learning Algorithms in Anomaly Network Intrusion Detection Systems

Pascal Maniriho, Tohari Ahmad

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Citations (Scopus)

Abstract

With the deployment of numerous networked devices over the internet, the protection of organizational and personal computer networks has become vital owing to new malicious attacks which are rapidly increasing. Network intrusion detection systems (NIDS) are among the most known and reputed network security tools. Maintaining security, data confidentiality, and data integrity are the primary goals of the NIDS. In this way, this paper investigates the application and performance of machine learning algorithms in NIDS. Four algorithms namely, Random Forest, Decision Stump, Naive Bayes, Stochastic Gradient Descent (SGD) combined with different feature selection techniques (Correlation Ranking Filter and Gain Ratio Feature Evaluator) are applied to implement the NIDS models using the NSL-KDD dataset which is the new version of KDD-Cup99. The comparative analysis conducted based on the performance of these algorithms reveals that the Random Forest performs better than the other algorithms regarding the predicted accuracy and detection error.

Original languageEnglish
Title of host publicationProceedings - 2018 4th International Conference on Science and Technology, ICST 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538658130
DOIs
Publication statusPublished - 8 Nov 2018
Event4th International Conference on Science and Technology, ICST 2018 - Yogyakarta, Indonesia
Duration: 7 Aug 20188 Aug 2018

Publication series

NameProceedings - 2018 4th International Conference on Science and Technology, ICST 2018

Conference

Conference4th International Conference on Science and Technology, ICST 2018
Country/TerritoryIndonesia
CityYogyakarta
Period7/08/188/08/18

Keywords

  • NSL-KDD dataset
  • Network security
  • intrusion detection system
  • machine learning
  • network attack

Fingerprint

Dive into the research topics of 'Analyzing the Performance of Machine Learning Algorithms in Anomaly Network Intrusion Detection Systems'. Together they form a unique fingerprint.

Cite this