Professional Documents
Culture Documents
INDEX1
INDEX1
1 Abstract 2
2 Introduction 2
3 Dataset 3
Descriptions
4 NSL-KDD 3
5 Related works 4
6 Classification 5
Algorithms
7 Methodology 6
8 Conclusion 8
9 References 8
1
Intrusion Detection System Using
machine learning Algorithms
Abstract
3
1. Introduction
4
efficiency and higher accuracy at the first a
presentation of our DATASET that will be trained by 3
different algorithms of classification; the next section
represents ours second DATASET but this time it well be
trained by the higher accuracy of the tree algorithms
bellows; the last section is a conclusion as well as some
issues which have been highlighted for future research.
5
2. Dataset Descriptions
2.1 NSL-KDD
7
3. Related works
8
evaluated the performance of some most commonly
used classification ML algorithms such as NB, SVM, DT
and RF on apache spark big data environment. They
measured time of detection, time of building and the
time of prediction for network intrusion detection
systems. They used UNSW-NB15 data-set for the
purpose of performance evaluation and claimed that
RF technique was outperformer with respect to
specificity, accuracy, sensitivity, and also execution time
among all the four other tested algorithms In (Slay
N.M., 2015), the authors proposed a hybrid feature
reduction approach based on attribute values’ CP
followed by an ARM. First, the dataset was splitted into
partitions equally, the reason behind was to reduce the
processingtime, then the output of CP technique was
given as input to ARM to reduce number of feature. In
the decision-engine expectation maximization
clustering, logistic regression and naive bayes
algorithms were employed for network intrusion
detection to compare and evaluate the results. : Many
studies focus on identifying the most relevant features
for intrusion detection and reducing the dimensionality
of the dataset to improve the efficiency and
effectiveness of machine learning algorithm Ensemble
Learning Approaches: Research in this area explores
the use of ensemble methods.
9
1.LDearning for Intrusion Detection: Recent
advancements in deep learning have led to the
exploration of convolutional neural networks
(CNNs), recurrent neural networks (RNNs), and
other deep learning architectures for detecting
intrusions in network traffic and system logs.
10
Unsupervised Learning for Anomaly Detection:
Unsupervised learning techniques, such as clustering
and autoencoders, are explored for anomaly detection
in network traffic and system logs, where labeled
training data may be scarce or expensive to
obtain.Transfer Learning and Domain Adaptation:
Research in this area investigates techniques for
transferring knowledge from related domains or
adapting pre-trained models to new environments,
improving the generalization and robustness of
intrusion detection systems. become more prominent,
there is a focus on developing intrusion detection
systems that can analyze network traffic and detect
intrusions while preserving the privacy of sensitive
information.These are just a few examples of the
diverse research areas and topics related to intrusion
detection systems using machine learning algorithms.
11
Continuous exploration and innovation in these areas
are essential for developing effective and robust
defense mechanisms against evolving cyber
threats.They claim 0 100 000 200 000 normal generic
exploits fuzzers dos recon… analysis backd… shellc…
worms Total UNSW-NB15 details Train-set Test-set 0 50
000 100 000 150 000 dos probe r2l u2r Total NSL- KDD
details Train-set 67 343 Test-set 9,711 ITM Web of
Conferences 46, 0 (2022) ICEAS'22
200https://doi.org/10.1051/itmconf/20224602003 2
that the model was able to boost accuracy, reduce false
alarm rate and shorten processing time. Datasets were
NSL-KDD and UNSW-NB15.
12
4. Classification Algorithms
13
K-Nearest Neighbor (KNN): is another reliable
classification algorithm used for classifying data classes.
One of its promising features is that it can be used for
both classification regression purposes.
15
16
The SVM algorithms showed a better accuracy again
with a similar type of DATASET that they have deferent
attacks and size
17
6. Conclusion
18
References
19
6. A. Iftikhar, M. Basheri, M. Javed Iqbal, A. Raheem;
“Performance Comparison of Support Vector Machine,
Random Forest, and Extreme Learning Machine for
Intrusion Detection”, IEEE ACCESS, Survivability
Strategies for Emerging Wireless Networks,
6 ,pp.33789-33795, (2018)
20