Proceedings of International Conference on Applied Innovation in IT
2022/03/09, Volume 10, Issue 1, pp.21-27
Anomaly Detection with Various Machine Learning Classification Techniques over UNSW-NB15 Dataset
Martina Shushlevska, Danijela Efnusheva, Goran Jakimovski, Zdravko Todorov Abstract: The exponential growth of computers and devices connected to the Internet and the variety of commercial services offered creates the need to protect Internet users. As a result, intrusion detection systems (IDS) are becoming an essential part of each computer-communication system, detecting and responding to malicious network traffic and computer abuse. In this paper, an IDS based on the UNSW-NB15 dataset has been implemented. The results obtained indicate F1 Score and Recall values of 76.1% and 85.3% for the Naive Bayes algorithm, 78.2% and 96.1% for Logistic Regression algorithm, 88.3% and 95.4% for Decision Tree classifier, and 89.3% and 98.5% for Random Forest.
Keywords: Anomaly Detection, Intrusion Detection System, Machine Learning, Network Security, UNSW-NB15 Dataset
DOI: 10.25673/76928
Download: PDF
References:
- L. H. Yeo, X. Che, and S. Lakkaraju, "Understanding modern intrusion detection systems: a survey," in
- Cryptography and Security Journal, 2017.
- P. Amudha, S. Karthik, and S. Sivakumari,"Classification techniques for intrusion detection-an overview," in International Journal of Computer Applications, vol. 76, no. 16, 2013.
- M. Almseidin, M. Alzubi, S. Kovacs, andM.Alkasassbeh, "Evaluation of machine learningalgorithms for intrusion detection system," in Proc. ofIEEE International Symposium on IntelligentSystems and Informatics, 2017.
- V. Golman, "An efficient hybrid intrusion detectionsystem based on C5.0 and SVM," in InternationalJournal of Database Theory and Application, vol. 7,no. 2, 2014, pp. 59-70.
- S. S. Tanpure, G. D. Patel, Z. Raja, J. Jagtap, andA.Pathan, "Intrusion detection system in data miningusing hybrid approach," in International Journal ofComputer Applications, 2016, pp. 0975-8887.
- S. A. Hajare, "Detection of network attacks using bigdata analysis," in International Journal on Recent andInnovation Trends in Computing andCommunication, vol. 4 (5), 2016, pp. 86-88.
- M. A. Ferrag, L. Maglaras, S. Moschoyiannis, H.Janicke, "Deep learning for cyber securityintrusion detection: approaches, datasets, andcomparative study," in Journal of InformationSecurity and Applications, vol. 50, 2020.
- D. D. Protić, "Review of KDD CUP ‘99, NSL-KDDand KYOTO 2006+ datasets," in Military TechnicalCourier, vol. 66 (3), 2018.
- M. Nour, J. Slay, "UNSW-NB15: a comprehensivedata set for network intrusion detection systems(UNSW-NB15 network data set)," in Proc. of IEEEMilitary Communications and Information SystemsConference, 2015.
- S. M. Othman, N. T. Alsohybe, F. M. Ba-Alwi, A. T. Zahary, "Survey on intrusion detection systemtypes," in International Journal of Cyber-Security andDigital Forensics, vol. 7, no. 4, 2018, pp. 444-462.
- B. Caswell, J. Beale, and A. Baker: Snort IntrusionDetection and Prevention Toolkit. MA, Burlingthon:Syngress, 2007.
- S. Danish, A. Nasir, H. K. Qureshi, A. B. Ashfaq,S.Mumtaz, and J. Rodriguez, "Network intrusiondetection system for jamming attack in LoRaWANjoin procedure," in Proc. of IEEE InternationalConference on Communications, 2018.
- K. Hutchison, "Wireless intrusion detection systems," SANS Institute, White Paper, 2005.
- W. Stallings, "Network security essentials:applications and standards", 6th ed. USA: Pearson,2017.
- S. Madhavan, "Mastering python for data science",UK: Packt Publishing, 2015.
- R. Ioshi, "Accuracy, Precision, Recall & F1 Score:Interpretation of Performance Measures," 2016, [Online]. Available: https://blog.exsilio.com/all/accuracy-precision-recall-f1-score-interpretation-of-performance-measures/.
|
HOME
- Call for Papers
- Paper Submission
- For authors
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceedings
PROCEEDINGS
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)
PAST CONFERENCES
ICAIIT 2024
-
Photos
-
Reports
ICAIIT 2023
-
Photos
-
Reports
ICAIIT 2021
-
Photos
-
Reports
ICAIIT 2020
-
Photos
-
Reports
ICAIIT 2019
-
Photos
-
Reports
ICAIIT 2018
-
Photos
-
Reports
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|