Performance Analysis of Single- and Ensemble-Based Classifiers for Intrusion Detection

  • R. Hariharan
  • I. Sumaiya ThaseenEmail author
  • G. Usha Devi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1057)


The aim of this paper is to analyze the performance of an intrusion detection model using single- and ensemble-based classifiers. Several tree-based single classifiers were analyzed. The ensemble of tree-based classifiers was also analyzed to differentiate the superiority in their performance. Different proportions of the benchmark KDD dataset are utilized for observing the performance of the model. Classification based on the accuracy, model building time, and kappa statistic is evaluated as the performance measures in this paper. The base and ensemble classifiers resulted in better accuracy are observed in the experiments and only Naive Bayes and random tree resulted in minimum model building time. Most of the classifiers produced better results for kappa statistic. The highest statistic is computed for ADA classifier, and lowest error is computed for the random forest ensemble.


Accuracy Classification Computation time Ensemble Error rate Intrusion Performance Traffic 


  1. 1.
    Denning, D.E.: An intrusion-detection model. IEEE Trans. Software Eng. 222–232 (1987)CrossRefGoogle Scholar
  2. 2.
    Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16, 507–521 (2007)CrossRefGoogle Scholar
  3. 3.
    Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37, 6225–6232 (2010)CrossRefGoogle Scholar
  4. 4.
    Amor, N.B., Benferhat, S., Elouedi, Z.: Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420–424 (2004)Google Scholar
  5. 5.
    Sornsuwit, P., Jaiyen, S.: Intrusion detection model based on ensemble learning for u2r and r2l attacks. In: 7th International Conference on Information Technology and Electrical Engineering (ICITEE), IEEE, pp. 354–359 (2015)Google Scholar
  6. 6.
    Aburomman, A.A., Reaz, M.B.: A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput. Secur. 65, 135–152 (2017)CrossRefGoogle Scholar
  7. 7.
    Amudha, P., Karthik, S., Sivakumari, S.: Intrusion detection based on core vector machine and ensemble classification methods. In: International Conference on Soft-Computing and Networks Security (ICSNS). IEEE, pp. 1–5 (2015)Google Scholar
  8. 8.
    Roy, S.S., Krishna, P.V., Yenduri, S.: Analyzing intrusion detection system: an ensemble based stacking approach. In: IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 307–309 (2014)Google Scholar
  9. 9.
    Alotaibi, B., Elleithy, K.: A majority voting technique for wireless intrusion detection systems. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1–6 (2016)Google Scholar
  10. 10.
    Tama, B.A, Rhee, K.H.: Classifier ensemble design with rotation forest to enhance attack detection of IDS in wireless network. In: 11th Asia Joint Conference on Information Security (Asia JCIS). IEEE, pp. 87–91 (2016)Google Scholar
  11. 11.
    Wang, Y., Shen, Y., Zhang, G.: Research on intrusion detection model using ensemble learning methods. In: 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 422–425 (2016)Google Scholar
  12. 12.
    Malhotra S., Bali V., Paliwal, K.K.: Genetic programming and K-nearest neighbour classifier based intrusion detection model. In: 7th International Conference Cloud Computing, Data Science & Engineering-Confluence. IEEE, pp. 42–46 (2017)Google Scholar
  13. 13.
    Aravind, M.M, Kalaiselvi, V.K.: Design of an intrusion detection system based on distance feature using ensemble classifier. In: 4th International Conference on Signal Processing, Communication and Networking (ICSCN). IEEE, pp. 1–6 (2017)Google Scholar
  14. 14.
    Kamarudin, M.H., Maple, C., Watson, T., Safa, N.S.: A logitboost-based algorithm for detecting known and unknown web attacks. IEEE Access. 5, 26190–26200 (2017)CrossRefGoogle Scholar
  15. 15.
    Belavagi, M.C., Muniyal, B.: Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput. Sci. 117–123 (2016)CrossRefGoogle Scholar
  16. 16.
    Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comp. Sci. 213–217 (2016)CrossRefGoogle Scholar
  17. 17.
    Quinlan, J.R.: C4. 5: Programs for Machine Learning. Elsevier, Amsterdam (2014)Google Scholar
  18. 18.
    Domingos, P., Pazzani, M.: On the optimality of the simple Bayesian classifier under zero-one loss. Mach. Learn. 103–130 (1997) Google Scholar
  19. 19.
    Arora, T., Dhir, R.: Correlation-based feature selection and classification via regression of segmented chromosomes using geometric features. Med. Biol. Eng. Compu. 55, 733–745 (2017)CrossRefGoogle Scholar
  20. 20.
    Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55, 119–139 (1997)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). Ann. Stat. 2, 337–407 (2000)CrossRefGoogle Scholar
  22. 22.
    Breiman, L.: Random forests. Mach. Learn. 4, 5–32 (2001)CrossRefGoogle Scholar
  23. 23.
    Cutler, A., Zhao, G.: Pert-perfect random tree ensembles. Comput. Sci. Stat. 33, 490–497 (2001)Google Scholar
  24. 24.
    Ruan, Y.X., Lin, H.T., Tsai, M.F.: Improving ranking performance with cost-sensitive ordinal classification via regression. Inf. Retrieval 1–20 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • R. Hariharan
    • 1
  • I. Sumaiya Thaseen
    • 1
    Email author
  • G. Usha Devi
    • 1
  1. 1.School of Information Technology and EngineeringVIT UniversityVelloreIndia

Personalised recommendations