Comparative Study of Machine Learning Algorithm for Intrusion Detection System

  • K. Sravani
  • P. Srinivasu
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 247)


Now a day’s, Intrusion detection is a very important research area in network security. Machine learning techniques have been applied to the field of intrusion detection. In this paper, we use KDD Cup 99’ data set for taking samples. For these samples we use classification algorithms to classify the network traffic data. In this paper, we are going to compare our results with features selected using Naive Bayes, Neural Networks. We are trying to use standard measurements like detection rate, false positive, false negative, accuracy and Confusion Matrix.


IDS Machine learning algorithms KDDCUP99 DATASET Confusion Matrix 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Farid, D., Harbi, N., Rahman, M.Z.: Combining Naïve Bayes And Decision Tree For Adaptive Intrusion Detection. International Journal of Network Security & Its Applications (IJNSA) 2(2) (April 2010)Google Scholar
  2. 2.
    Akbar, S., Nageswara Rao, K., Chandulal, J.A.: Intrusion Detection SystemMethodologies Based on Data Analysis. International Journal of Computer Applications 5(2), 0975–8887 (2010)Google Scholar
  3. 3.
    Chandolikar, N.S., Nandavadekar, V.D.: Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99. MIT International Journal of Computer Science & Information Technology 2(2), 85–90 (2012) ISSN No. 2230-7621 Google Scholar
  4. 4.
    Srinivasu, P., Avadhani, P.S.: Approaches and Data Processing Techniques for Intrusion Detection System. International Journal of Computer Science and Network Security 9(12) (December 2009)Google Scholar
  5. 5.
    Olusola, A.A., Oladele, A.S., Abosede, D.O.: Analysis of KDD ’99 Intrusion Detection Dataset for Selection of Relevance Features. In: Proceedings of the World Congress on Engineering and Computer Science, WCECS 2010, San Francisco, USA, October 20-22, vol. I (2010)Google Scholar
  6. 6.
  7. 7.
    Singh, S., Silakari, S.: An ensemble approach for feature selection of Cyber Attack Dataset. International Journal of Computer Science and Information Security 6(2) (2009)Google Scholar
  8. 8.
    Jain, A., Sharma, S., Sisodia, M.S.: Network Intrusion Detection by using Supervised and Unsupervised Machine Learning Technique- A Survey. IJCTEE 1(3) (Deceember 2011)Google Scholar
  9. 9.
    Vinchurkar, D.P., Reshamwala, A.: A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique. IJESIT 1(2) (November 2012)Google Scholar
  10. 10.
    Tang, H., Cad, Z.: Machine Learning-based Intrusion Detection Algorithms. Journal of Computational Information Systems 5(6), 1825–1831 (2009)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAnil Neerukonda Institute of Technology and SciencesVisakhapatnamIndia

Personalised recommendations