Skip to main content

Performance Evaluation of Advanced Machine Learning Algorithms for Network Intrusion Detection System

  • Conference paper
  • First Online:
Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 116))

Abstract

In the past decade, there is a terrific growth on Internet and at the same time, we have seen an increase in malicious attacks on government, corporate, military, financial organizations. To overcome these attacks, Intrusion Detection Systems (IDSs) are developed and accepted by many institutions to keep a monitor on intrusion and additional harmful behavior. However, these IDSs still have some obstacles that are low detection accuracy, False Negatives (FN) and False Positives (FP). To overcome these problems, Machine Learning (ML) techniques are used which help in increasing the intrusion detection accuracy and greatly decreases the false negative rate and false positive rate. In this paper, we have considered five algorithms for evaluation, namely Decision Tree (D-tree), Random Forest (RF), Gradient Boosting (GB), AdaBoost (AB), Gaussian Naïve Bayes (GNB) on UNSW-NB15 dataset. And we found that Random Forest is the best classifier based on the following metrics detection accuracy, F1 score, and false positive rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Heady, G. Luger, A. Maccabe, M. Servilla, The Architecture of a Network Level Intrusion Detection System (Computer Science Department, University of New Mexico, New Mexico, Tech. rep., 1990)

    Book  Google Scholar 

  2. M. Aydın, M. Ali, A. Halim Zaim, K. Gökhan Ceylan, A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 517–526 (2009)

    Google Scholar 

  3. R. Thomas, D. Pavithram, A Survey of Intrusion Detection Models based on NSL-KDD Data Set (Dubai, UAE, 2018)

    Google Scholar 

  4. A. Divekar, M. Parekh, V. Savla, R. Mishra, M. Shirole, Benchmarking datasets for Anomaly-based network intrusion detection: KDD CUP 99 alternatives 2018, in IEEE 3rd International Conference on Computing, Communication and Security, Kathmandu (Nepal, 2018)

    Google Scholar 

  5. S.-Y. Ji, B.-K. Jeong, S. Choi, D.H. Jeong, A multi level intrusion detection method for abnormal network behaviors. J. Netw. Comput. Appl. 62, 9–17 (2016)

    Google Scholar 

  6. D.Md. Farid, M.Z. Rahman, Anomaly network intrusion detection based on improved self adaptive bayesian algorithm. J. Comput. 5(1) (2010)

    Google Scholar 

  7. D.Md. Farid, N. Harbi, M.Z. Rahman, Combining naive bayes and decision tree for adaptive intrusion detection. Int. J. Netw. Secur. Appl. 2(2), 12–25 (2010)

    Google Scholar 

  8. M.F. Suleiman, B. Issac, Performance comparison of intrusion detection machine learning classifiers on benchmark and new datasets, in 28th International Conference on Computer Theory and Applications (ICCTA 2018) (2018)

    Google Scholar 

  9. J. Zhang, M. Zulkernine, A. Haque, Random-Forests-Based Network Intrusion Detection Systems (IEEE, 2008)

    Google Scholar 

  10. U. Cavusoglu, A New Hybrid Approach for Intrusion Detection Using Machine Learning Methods (Springer, Berlin, 2019)

    Google Scholar 

  11. N. Sultana, N. Chilamkurti, W. Peng, R. Alhadad, Survey on SDN Based Network Intrusion Detection System Using Machine Learning Approaches (Springer, Berlin, 2018)

    Google Scholar 

  12. P. Gogoi et al. Packet and flow based network intrusion dataset, in Contemporary Computing (Springer, Berlin, 2012), pp. 322–334

    Google Scholar 

  13. UNSW-NB15, https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/

  14. N. Moustafa, J. Slay, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), in Military Communications and Information Systems Conference (MilCIS) (IEEE, 2015), pp. 1–6

    Google Scholar 

  15. F. Tsai, Y.F. Hsu, C.Y. Lin, W.Y. Lin, Intrusion detection by machine learning: a review. Exp. Syst. Appl. 36(10), 11994–12000 (2009)

    Google Scholar 

  16. P. Aggarwal, S.K. Sharma, An empirical comparison of classifiers to analyze intrusion detection, in 2015 Fifth International Conference on Advanced Computing Communication Technologies (ACCT) (IEEE, 2015), pp. 446–450

    Google Scholar 

  17. M.C. Belavagi, B. Muniyal, Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput. Sci. 89, 117–123 (2016)

    Google Scholar 

  18. J. Zhang, M. Zulkernine, A. Haque Random-forests-based network intrusion detection systems. IEEE Trans. Syst. Man Cybern.—Part C: Appl. Rev. 38(5) (2008)

    Google Scholar 

  19. M. Kulariya, P. Saraf, R. Ranjan, G.P. Gupta, Performance analysis of network intrusion detection schemes using apache spark, in International Conference on Communication and Signal Processing (India, 2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sharfuddin Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khan, S., Sivaraman, E., Honnavalli, P.B. (2020). Performance Evaluation of Advanced Machine Learning Algorithms for Network Intrusion Detection System. In: Dutta, M., Krishna, C., Kumar, R., Kalra, M. (eds) Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India. Lecture Notes in Networks and Systems, vol 116. Springer, Singapore. https://doi.org/10.1007/978-981-15-3020-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3020-3_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3019-7

  • Online ISBN: 978-981-15-3020-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics