Abstract
Intrusion Detection System (IDS) has been developed to protect the resources in the network from different types of threats. Existing IDS methods can be classified as either anomaly based or misuse (signature) based or sometimes combination of both. This paper proposes a novel misuse-based intrusion detection system to defend our network from five categories such as Exploit, DOS, Probe, Generic, and Normal. Most of the related works on IDS are based on KDD99 or NSL-KDD 99 dataset. These datasets are considered obsolete to detect recent types of attacks and have no significance. In this paper, UNSW-NB15 (Moustafa and Slay, Military Communications and Information Systems Conference (2015) [1]) dataset is considered as the offline dataset to design intrusion detection model for detecting malicious activities in the network. The performance evaluation of proposed work with the UNSW-NB15 (benchmark dataset) shows higher accuracy and IDR compared to other existing approaches. Performance analysis proves that clustering technique is really useful in order to analyze similarity in behavior of different categories and hence helpful to improve the performance of IDS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Military Communications and Information Systems Conference, pp. 1–6 (2015)
Malek, Z., Trivedi, B.: A Study of Anomaly Intrusion Detection Using Machine Learning Techniques, vol. 2, (1) (2013)
Haroon, A., Shah, M.A., Asim, Y., Naeem, W., Kamran, M., Javaid, Q.: Constraints in the IoT: the world in 2020 and beyond. Constraints J. 7(11), (2016)
KDD 99 data set. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446–452 (2015)
Moustafa, N., Slay., J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J.: A Glob. Perspect. 25(1–3), 18–31(2016)
Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83, 12–27 (2017)
Raza, S., Wallgren, L., Voigt, T.: SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)
Mehare, T., M., Bhosale, S.: Design and development of intrusion detection system for internet of things. Int. J. Innov. Res. Comput. Commun. Eng. 5(7), (2017)
Ebbits -Fraunhofer FIT. https://www.fit.fraunhofer.de/en/fb/ucc/projects/ebbits.html
Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C., Atkinson, R.: (2016, May). Threat analysis of IoT networks using artificial neural network intrusion detection system. In Networks, Computers and Communications (ISNCC), International Symposium on IEEE, pp. 1–6 (2016)
Koroniotis, N., Moustafa, N., Sitnikova, E., Slay, J.: Towards developing network forensic mechanism for Botnet activities in the IoT based on machine learning techniques. In: International Conference on Mobile Networks and Management, pp. 30–44. Springer, Cham (2017)
Acknowledgements
This research was supported by Information Security Education and Awareness (ISEA) Project II funded by Ministry of Electronics and Information Technology (MeitY), Govt. of India.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, V., Das, A.K., Sinha, D. (2020). Statistical Analysis of the UNSW-NB15 Dataset for Intrusion Detection. In: Das, A., Nayak, J., Naik, B., Pati, S., Pelusi, D. (eds) Computational Intelligence in Pattern Recognition. Advances in Intelligent Systems and Computing, vol 999. Springer, Singapore. https://doi.org/10.1007/978-981-13-9042-5_24
Download citation
DOI: https://doi.org/10.1007/978-981-13-9042-5_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9041-8
Online ISBN: 978-981-13-9042-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)