Abstract
Benchmark datasets are the inevitable tool required to scrutinize vulnerabilities and tools in network security. Current datasets lack correlation between normal and the real-time network traffic. Behind every evaluation and establishment of attack detection, such datasets are the cornerstone deployed by research community. Creating our own dataset is a herculean task. Hence analyzing the subsisting datasets aids to provide a thorough clarity on the effectiveness when deployed in real time environments. This paper work focus on analysis and comparison of UNSW-NB15 with NSL-KDD dataset based on performance analysis and accuracy using machine learning classifiers. Feasibility, reliability and dependability of the dataset is reviewed and discussed by considering various performance measures such as precision, recall, F-score, specificity using various machine learning classifiers Naïve Bayes, Logistic Regression, SMO, J48 and Random Forest. Experimental results give out its noticeable classification accuracy of 0.99 with the random forest classifier having 0.998 recall and specificity 0.999 respectively. Research studies reveal the fact that threat diagnosis using conventional dataset and sophisticated technologies cover only 25% of threat taxonomy and hence the poor performance of existing intrusion detection systems. Thorough analysis and exploration of the dataset will pave the way for the outstanding performance of the intelligent Intrusion Detection System.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Frank, H., et al.: Optimal design of centralized computer networks. Networks 1(1), 43–57 (1971)
Karnaugh, M.: A new class of algorithms for multipoint network optimization. IEEE Trans. Commun. 24(5), 500–505 (1976)
Newman, M.E.J.: Modularity and community structure in networks. Proc. Natl. Acad. Sci. 103(23), 8577–8582 (2006)
Silander, T., Myllymaki, P.: A simple approach for finding the globally optimal Bayesian network structure. arXiv preprint arXiv: 1206.6875 (2012)
Kassabalidis, I., El-Sharkawi, M.A., Marks II, R.J., Arabshahi, P., Gray, A.A.: Gambardella, swarm intelligence for routing in communication networks. Department of Electrical Engineering, Box 352500 (2003)
Sharma, P., Khurana, N.: Study of optimal path finding techniques. Int. J. Adv. Technol. 4(2), 124–130 (2013)
Viegas, E., Santin, A., Bessani, A., Neves, N.: BigFlow: real-time and reliable anomaly-based intrusion detection for high-speed networks. Future Gener. Comput. Syst. 93, 473–485 (2019)
Sooda, K., Nair, T.R.: A comparative analysis for determining the optimal path using PSO and GA. arXiv preprint arXiv:1407.5327 (2014)
Li, B., et al.: Grid-based path planner using multivariant optimization algorithm, pp. 89-96. Airtilibrary Publication (2015)
Attarzadeh, I., Rezaee, A.: A new method for finding the shortest path in network and reducing the time of routing, using gray wolf optimizer (GWO) and chaotic system. Thesis, Slamic Azad University Tehran Science and Research Branch (2016)
Singh, V., Bandyopadhyay, M., Singh, M.P.: Geospatial network analysis using particle swarm optimization. Int. J. Comput. Electr. Autom. Control Inf. Eng. (2014)
Jin, D., Gabrys, B., Dang, J.: Combined node and link partitions method for finding overlapping communities in complex networks. Sci. Rep. 5, 8600 (2015)
Zhang, L.: Virtual clock: a new traffic control algorithm for packet switching networks. ACM SIGCOMM Comput. Commun. Rev. 20(4) (1990)
Moore, A.W., Zuev, D.: Internet traffic classification using Bayesian analysis techniques. ACM SIGMETRICS Perform. Eval. Rev. 33(1) (2005)
WAN and application solution guide. https://www.cisco.com
Huang, S., et al.: A statistical-feature-based approach to internet traffic classification using machine learning. In: 2009 International Conference on Ultra Modern Telecommunications & Workshops. IEEE (2009)
Zhen, L., Qiong, L.: A new feature selection method for internet traffic classification using ML. Phys. Proc. 33, 1338–1345 (2012)
Bujlow, T., Riaz, T., Pedersen, J.M.: A method for classification of network traffic based on C5. 0 machine learning algorithm. In: 2012 International Conference on Computing, Networking and Communications (ICNC). IEEE (2012)
Bujlow, T., Carela-Espanol, V.: Comparison of deep packet inspection (DPI) tools for traffic classification (2013)
Bujlow, T., Pedersen, J.M.: A practical method for multilevel classification and accounting of traffic in computer networks. Technical report, Section for Networking and Security, Department of Electronic Systems, Aalborg University (2014)
Singh, K., Agrawal, S.: Comparative analysis of five machine learning algorithms for IP traffic classification (2011)
Bakhshi, T., Ghita, B.: On internet traffic classification: a two-phased machine learning approach. J. Comput. Netw. Commun. 2016 (2016)
Zhao, S., Zhang, Y., Chang, P.: Network traffic classification using tri-training based on statistical flow characteristics. In: 2017 IEEE Trustcom/BigDataSE/ICESS (2017)
Ameur, C.B., Mory, E., Cousin, B.: Combining traffic-shaping methods with congestion control variants for HTTP adaptive streaming. Multimed. Syst. 24(1), 1–18 (2018)
Nguyen, T.T.T., Armitage, G.J.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(1–4), 56–76 (2008)
Kim, H., et al.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT Conference. ACM (2008)
Nascimento, Z., Sadok, D.: MODC: a pareto-optimal optimization approach for network traffic classification based on the divide and conquer strategy. Information 9(9), 233 (2018)
Ertam, F., Avci, E.: Classification with intelligent systems for internet traffic in enterprise networks. Int. J. Comput. Commun. Instr. Eng. (IJCCIE) 3 (2016)
Li, Y., et al.: Survivability optimization and analysis of network topology based on average distance. In: IEEE Asia Communications and Photonics Conference and Exhibition ACP (2009)
Hindy, H., et al.: A taxonomy and survey of Intrusion detection system design techniques, network threats and datasets. Article Number 1, vol. 1, pp. 1–35 (2018)
Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive dataset for network Intrusion detection systems (UNSW-NB15 network dataset). In: Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, pp. 1–6 (2015)
UNB. NSL-KDD Dataset (2019). https://www.unb.ca/cic/datasets/nsl.html
Dhanabal, L., Shantharajah, S.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. 4, 446–452 (2015)
ACCS. UNSW-NB15 Dataset (2019). https://www.unsw.adfa.edu.au/unsw-canberra cyber cybersecurity ADFA-NB15-Datasets
Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J.: Glob. Perspect. 25, 18–31 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dickson, A., Thomas, C. (2021). Analysis of UNSW-NB15 Dataset Using Machine Learning Classifiers. In: Thampi, S.M., Piramuthu, S., Li, KC., Berretti, S., Wozniak, M., Singh, D. (eds) Machine Learning and Metaheuristics Algorithms, and Applications. SoMMA 2020. Communications in Computer and Information Science, vol 1366. Springer, Singapore. https://doi.org/10.1007/978-981-16-0419-5_16
Download citation
DOI: https://doi.org/10.1007/978-981-16-0419-5_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0418-8
Online ISBN: 978-981-16-0419-5
eBook Packages: Computer ScienceComputer Science (R0)