Skip to main content

Statistical Analysis of the UNSW-NB15 Dataset for Intrusion Detection

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 999))

Abstract

Intrusion Detection System (IDS) has been developed to protect the resources in the network from different types of threats. Existing IDS methods can be classified as either anomaly based or misuse (signature) based or sometimes combination of both. This paper proposes a novel misuse-based intrusion detection system to defend our network from five categories such as Exploit, DOS, Probe, Generic, and Normal. Most of the related works on IDS are based on KDD99 or NSL-KDD 99 dataset. These datasets are considered obsolete to detect recent types of attacks and have no significance. In this paper, UNSW-NB15 (Moustafa and Slay, Military Communications and Information Systems Conference (2015) [1]) dataset is considered as the offline dataset to design intrusion detection model for detecting malicious activities in the network. The performance evaluation of proposed work with the UNSW-NB15 (benchmark dataset) shows higher accuracy and IDR compared to other existing approaches. Performance analysis proves that clustering technique is really useful in order to analyze similarity in behavior of different categories and hence helpful to improve the performance of IDS.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Military Communications and Information Systems Conference, pp. 1–6 (2015)

    Google Scholar 

  2. Malek, Z., Trivedi, B.: A Study of Anomaly Intrusion Detection Using Machine Learning Techniques, vol. 2, (1) (2013)

    Google Scholar 

  3. Haroon, A., Shah, M.A., Asim, Y., Naeem, W., Kamran, M., Javaid, Q.: Constraints in the IoT: the world in 2020 and beyond. Constraints J. 7(11), (2016)

    Google Scholar 

  4. KDD 99 data set. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  5. Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446–452 (2015)

    Google Scholar 

  6. Moustafa, N., Slay., J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J.: A Glob. Perspect. 25(1–3), 18–31(2016)

    Google Scholar 

  7. Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83, 12–27 (2017)

    Article  Google Scholar 

  8. Raza, S., Wallgren, L., Voigt, T.: SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)

    Article  Google Scholar 

  9. Mehare, T., M., Bhosale, S.: Design and development of intrusion detection system for internet of things. Int. J. Innov. Res. Comput. Commun. Eng. 5(7), (2017)

    Google Scholar 

  10. Ebbits -Fraunhofer FIT. https://www.fit.fraunhofer.de/en/fb/ucc/projects/ebbits.html

  11. Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C., Atkinson, R.: (2016, May). Threat analysis of IoT networks using artificial neural network intrusion detection system. In Networks, Computers and Communications (ISNCC), International Symposium on IEEE, pp. 1–6 (2016)

    Google Scholar 

  12. Koroniotis, N., Moustafa, N., Sitnikova, E., Slay, J.: Towards developing network forensic mechanism for Botnet activities in the IoT based on machine learning techniques. In: International Conference on Mobile Networks and Management, pp. 30–44. Springer, Cham (2017)

    Google Scholar 

Download references

Acknowledgements

This research was supported by Information Security Education and Awareness (ISEA) Project II funded by Ministry of Electronics and Information Technology (MeitY), Govt. of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vikash Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, V., Das, A.K., Sinha, D. (2020). Statistical Analysis of the UNSW-NB15 Dataset for Intrusion Detection. In: Das, A., Nayak, J., Naik, B., Pati, S., Pelusi, D. (eds) Computational Intelligence in Pattern Recognition. Advances in Intelligent Systems and Computing, vol 999. Springer, Singapore. https://doi.org/10.1007/978-981-13-9042-5_24

Download citation

Publish with us

Policies and ethics