Advertisement

A Statistical Analysis of Lazy Classifiers Using Canadian Institute of Cybersecurity Datasets

  • Ranjit PanigrahiEmail author
  • Samarjeet Borah
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 37)

Abstract

Lazy classifiers are the local learner, where the model is built only when the test instances are present at hand. In this paper, five lazy learners are explored using ISCXIDS2012 and CICNTTor2016 datasets provided by the Canadian Institute of Cybersecurity. In order to explore these classifiers, 11 performance measures are considered for each dataset separately. The result shows that KStar classifier suitable for ISCXIDS2012 and both IB1 and IBkLG classifiers works well in the CICNTTor2017 dataset. Therefore, these classifiers can be used as an adaptive intrusion detection engine to detect possible intrusions by preserving inherent late learning property of lazy classifiers.

Keywords

Lazy classifiers ISCXIDS2012 CICNTTor2016 IDS Intrusion detection Classifier comparison 

References

  1. 1.
    E.K. Garcia, S. Feldman, M.R. Gupta, S. Srivastava, Completely lazy learning. IEEE Trans. Knowl. Data Eng. 22(9), 1274–1285 (2010)CrossRefGoogle Scholar
  2. 2.
    P. Tiwari, H. Dao, Nguyen GN: performance evaluation of lazy, decision tree classifier and multilayer perceptron on traffic accident analysis. Informatica 41(1), 13 (2017)Google Scholar
  3. 3.
    D. Aha, D. Kibler, Instance-based learning algorithms. Mach. Learn. 6, 37–66 (1991)zbMATHGoogle Scholar
  4. 4.
    E. Frank, Fully supervised training of Gaussian radial basis function networks in WEKA. Department of Computer Science, University of Waikato (2014)Google Scholar
  5. 5.
    J.G. Cleary, L.E. Trigg, K*, an instance-based learner using an entropic distance measure, in 12th International Conference on Machine Learning, pp. 108–114 (1995)Google Scholar
  6. 6.
    E. Frank, M. Hall, B. Pfahringer, Locally weighted Naive Bayes, in 19th Conference in Uncertainty in Artificial Intelligence, pp. 249–256 (2003)Google Scholar
  7. 7.
    C. Atkeson, A. Moore, S. Schaal, Locally weighted learning. AI Review (1996)Google Scholar
  8. 8.
    A. Shiravi, H. Shiravi, M. Tavallaee, A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 357–374 (2012).  https://doi.org/10.1016/j.cose.2011.12.012CrossRefGoogle Scholar
  9. 9.
    A.H. Lashkari, G. Draper-Gil, M.S. Mamun, A. Ghorbani, Characterization of Tor traffic using time based features, in Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP, vol. 1, pp. 253–262 (2017). ISBN 978-989-758-209-7.  https://doi.org/10.5220/0006105602530262
  10. 10.
    S. Vijayarani, M. Muthulakshmi, Comparative analysis of bayes and lazy classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 2(8), 3118–3124 (2013)Google Scholar
  11. 11.
    V. Kumar, R. Zinovyev, A. Verma, P. Tiwari, Performance evaluation of lazy and decision tree classifier: a data mining approach for global celebrity’s death analysis, in 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE) 22 Aug 2018, pp. 1–6. IEEEGoogle Scholar
  12. 12.
    H. Mukherjee, S.M. Obaidullah, K.C. Santosh et al., Int. J. Mach. Learn. Cyber. (2019).  https://doi.org/10.1007/s13042-019-00928-3CrossRefGoogle Scholar
  13. 13.
    M.E. Rimer, T.R. Martinez, D.R. Wilson, Improving speech recognition learning through lazy training. in Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN’02 (Cat. No. 02CH37290), vol. 3 (IEEE, 2002), pp. 2568–2573Google Scholar
  14. 14.
    L. Pengfei, T. Wulei, Apply ensemble of lazy learners to biomedical data mining. in Intelligent Computing and Information Science, ICICIS 2011 ed. by R. Chen. Communications in Computer and Information Science, vol. 134 (Springer, Berlin, 2011)Google Scholar
  15. 15.
    J. Singh, H. Kaur, Plant disease detection based on region-based segmentation and KNN classifier, in Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), ISMAC 2018, ed. by D. Pandian, X. Fernando, Z. Baig, F. Shi. Lecture Notes in Computational Vision and Biomechanics, vol. 30 (Springer, Cham, 2019)CrossRefGoogle Scholar
  16. 16.
    P. Mulak, D.P. Gaikwad, N.R. Talhar, K-Nearest Neighbor and boundary cutting algorithm for intrusion detection system. In: Information Systems Design and Intelligent Applications, ed. by S. Satapathy, J. Mandal, S. Udgata, V. Bhateja. Advances in Intelligent Systems and Computing, vol. 434 (Springer, New Delhi, 2016)Google Scholar
  17. 17.
    D. Dave, S. Vashishtha, Efficient intrusion detection with KNN classification and DS theory, in Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012) ed. by V. Kumar, M. Bhatele. Lecture Notes in Bioengineering (Springer, New Delhi, 2013)Google Scholar
  18. 18.
    A. Chellam, L. Ramanathan, S. Ramani, Intrusion detection in computer networks using lazy learning algorithm. Proc. Comput. Sci. 31(132), 928–936 (2018)CrossRefGoogle Scholar
  19. 19.
    J. Wills, Algorithms every data scientist should know: reservoir sampling, 23 April 2013. Source: https://blog.cloudera.com/blog/2013/04/hadoop-stratified-randosampling-algorithm
  20. 20.
    R. Panigrahi, S. Borah, Classification and Analysis of Facebook Metrics Dataset Using Supervised Classifiers, Social Network Analytics (Academic Press, Elsevier, 2019). ISBN: 978-0-12-815458-8, pp. 1–19Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer ApplicationsSikkim Manipal Institute of Technology, Sikkim Manipal UniversityRangpoIndia

Personalised recommendations