Skip to main content

Anomaly-Based Intrusion Detection System in Two Benchmark Datasets Using Various Learning Algorithms

  • Conference paper
  • First Online:
Smart Computing Techniques and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 225))

  • 618 Accesses

Abstract

The research in network intrusion detection has escalated since past few years. There are various methods and systems being proposed related to intrusion detection. But the changing nature of attack leads to the need to deal with every possible aspect to increase the detection efficiency. The anomaly-based intrusion detection has always been in the limelight because of its detection capability of the unknown pattern. In the study, feature reduction is performed using gain ratio, correlation, information gain and symmetrical uncertainty, and the selected features are used to train the machine learning techniques such as Naive Bayes classifier, sequential minimal optimization (SMO), J48 classifier and random forest. The KDD cup 99 and NSL-KDD datasets were used as a benchmark reference in building the models. The experiment was carried out with an aim to compare the performance of various classifiers between the two datasets. Results show that the feature reduction improves the detection efficiency and can obtain accuracy as high as 99.91%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co. Box 42 Fort Washington, Pa. 19034 (1980)

    Google Scholar 

  2. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303–336. First Quarter (2014). https://doi.org/10.1109/SURV.2013.052213.00046

  3. Singh, K.J., De, T.: DDOS Attack detection and mitigation technique based on http count and verification using CAPTCHA. In: 2015 International Conference on Computational Intelligence and Networks, Bhubaneshwar, pp. 196–197 (2015). https://doi.org/10.1109/CINE.2015.47

  4. Veeramreddy, J., Prasad, V., Koneti, P.: A review of anomaly based intrusion detection systems. Int. J. Comput. Appl. 28, 26–35 (2011). https://doi.org/10.5120/3399-4730

  5. Jyothsna, V., Prasad, K.M.: Anomaly-based intrusion detection system. In: Computer and Network Security, Jaydip Sen, IntechOpen (2019). https://doi.org/10.5772/intechopen.82287

  6. Shirazi, H.M.: Anomaly intrusion detection system using information theory, K-NN and KMC algorithms. Austral. J. Basic Appl. Sci. 3(3), 2581–2597 (2009)

    Google Scholar 

  7. Jia, Y., Wang, M., Wang, Y.: Network intrusion detection algorithm based on deep neural network. IET Info. Secur. 13(1), 48–53 (2018). https://doi.org/10.1049/iet-ifs.2018.5258

  8. Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016). https://doi.org/10.1109/TC.2016.2519914

  9. Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210–42219 (2019). https://doi.org/10.1109/ACCESS.2019.2904620

  10. Al Janabi, K.B.S., Kadhim, R.: Data reduction techniques: a comparative study for attribute selection methods. Int. J. Adv. Comput. Sci. Technol. 8(1), 1–13 (2018)

    Google Scholar 

  11. Johnson Singh, K., De, T.: Efficient classification of DDoS attacks using an ensemble feature selection algorithm. J. Intell. Syst. 29(1), 71–83 (2020)

    Google Scholar 

  12. Saputra, M.F.A., Widiyaningtyas, T., Wibawa, A.: Illiteracy classification using K means-naive bayes algorithm. JOIV : Int. J. Inf. Visual. (2018). https://doi.org/10.30630/joiv.2.3.129

  13. Deepa, S.N., Devi, B.A.: Neural networks and SMO based classification for brain tumor. In: 2011 World Congress on Information and Communication Technologies, pp. 1032–1037, Mumbai (2011). https://doi.org/10.1109/WICT.2011.6141390

  14. Korting, T.S.: C4.5 Algorithm and multivariate decision trees. Image Processing Division, National Institute for Space Research–INPE (2006)

    Google Scholar 

  15. David, D.: Random forest classifier tutorial: how to use tree-based algorithms for machine learning. Free code camp. https://www.freecodecamp.org/news/how-to-use-the-tree-based-algorithm-for-machine-learning

Download references

Acknowledgements

The authors would like to thank the reviewers whose comments and feedbacks would help in the improvement of the paper.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Devi, T.J., Singh, K.J. (2021). Anomaly-Based Intrusion Detection System in Two Benchmark Datasets Using Various Learning Algorithms. In: Satapathy, S.C., Bhateja, V., Favorskaya, M.N., Adilakshmi, T. (eds) Smart Computing Techniques and Applications. Smart Innovation, Systems and Technologies, vol 225. Springer, Singapore. https://doi.org/10.1007/978-981-16-0878-0_19

Download citation

Publish with us

Policies and ethics