Abstract
The research in network intrusion detection has escalated since past few years. There are various methods and systems being proposed related to intrusion detection. But the changing nature of attack leads to the need to deal with every possible aspect to increase the detection efficiency. The anomaly-based intrusion detection has always been in the limelight because of its detection capability of the unknown pattern. In the study, feature reduction is performed using gain ratio, correlation, information gain and symmetrical uncertainty, and the selected features are used to train the machine learning techniques such as Naive Bayes classifier, sequential minimal optimization (SMO), J48 classifier and random forest. The KDD cup 99 and NSL-KDD datasets were used as a benchmark reference in building the models. The experiment was carried out with an aim to compare the performance of various classifiers between the two datasets. Results show that the feature reduction improves the detection efficiency and can obtain accuracy as high as 99.91%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co. Box 42 Fort Washington, Pa. 19034 (1980)
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303–336. First Quarter (2014). https://doi.org/10.1109/SURV.2013.052213.00046
Singh, K.J., De, T.: DDOS Attack detection and mitigation technique based on http count and verification using CAPTCHA. In: 2015 International Conference on Computational Intelligence and Networks, Bhubaneshwar, pp. 196–197 (2015). https://doi.org/10.1109/CINE.2015.47
Veeramreddy, J., Prasad, V., Koneti, P.: A review of anomaly based intrusion detection systems. Int. J. Comput. Appl. 28, 26–35 (2011). https://doi.org/10.5120/3399-4730
Jyothsna, V., Prasad, K.M.: Anomaly-based intrusion detection system. In: Computer and Network Security, Jaydip Sen, IntechOpen (2019). https://doi.org/10.5772/intechopen.82287
Shirazi, H.M.: Anomaly intrusion detection system using information theory, K-NN and KMC algorithms. Austral. J. Basic Appl. Sci. 3(3), 2581–2597 (2009)
Jia, Y., Wang, M., Wang, Y.: Network intrusion detection algorithm based on deep neural network. IET Info. Secur. 13(1), 48–53 (2018). https://doi.org/10.1049/iet-ifs.2018.5258
Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016). https://doi.org/10.1109/TC.2016.2519914
Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210–42219 (2019). https://doi.org/10.1109/ACCESS.2019.2904620
Al Janabi, K.B.S., Kadhim, R.: Data reduction techniques: a comparative study for attribute selection methods. Int. J. Adv. Comput. Sci. Technol. 8(1), 1–13 (2018)
Johnson Singh, K., De, T.: Efficient classification of DDoS attacks using an ensemble feature selection algorithm. J. Intell. Syst. 29(1), 71–83 (2020)
Saputra, M.F.A., Widiyaningtyas, T., Wibawa, A.: Illiteracy classification using K means-naive bayes algorithm. JOIV : Int. J. Inf. Visual. (2018). https://doi.org/10.30630/joiv.2.3.129
Deepa, S.N., Devi, B.A.: Neural networks and SMO based classification for brain tumor. In: 2011 World Congress on Information and Communication Technologies, pp. 1032–1037, Mumbai (2011). https://doi.org/10.1109/WICT.2011.6141390
Korting, T.S.: C4.5 Algorithm and multivariate decision trees. Image Processing Division, National Institute for Space Research–INPE (2006)
David, D.: Random forest classifier tutorial: how to use tree-based algorithms for machine learning. Free code camp. https://www.freecodecamp.org/news/how-to-use-the-tree-based-algorithm-for-machine-learning
Acknowledgements
The authors would like to thank the reviewers whose comments and feedbacks would help in the improvement of the paper.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Devi, T.J., Singh, K.J. (2021). Anomaly-Based Intrusion Detection System in Two Benchmark Datasets Using Various Learning Algorithms. In: Satapathy, S.C., Bhateja, V., Favorskaya, M.N., Adilakshmi, T. (eds) Smart Computing Techniques and Applications. Smart Innovation, Systems and Technologies, vol 225. Springer, Singapore. https://doi.org/10.1007/978-981-16-0878-0_19
Download citation
DOI: https://doi.org/10.1007/978-981-16-0878-0_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0877-3
Online ISBN: 978-981-16-0878-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)