Proceedings of International Conference on Applied Innovation in IT
2022/03/09, Volume 10, Issue 1, pp.21-27

Anomaly Detection with Various Machine Learning Classification Techniques over UNSW-NB15 Dataset


Martina Shushlevska, Danijela Efnusheva, Goran Jakimovski, Zdravko Todorov


Abstract: The exponential growth of computers and devices connected to the Internet and the variety of commercial services offered creates the need to protect Internet users. As a result, intrusion detection systems (IDS) are becoming an essential part of each computer-communication system, detecting and responding to malicious network traffic and computer abuse. In this paper, an IDS based on the UNSW-NB15 dataset has been implemented. The results obtained indicate F1 Score and Recall values of 76.1% and 85.3% for the Naive Bayes algorithm, 78.2% and 96.1% for Logistic Regression algorithm, 88.3% and 95.4% for Decision Tree classifier, and 89.3% and 98.5% for Random Forest.

Keywords: Anomaly Detection, Intrusion Detection System, Machine Learning, Network Security, UNSW-NB15 Dataset

DOI: 10.25673/76928

Download: PDF

References:

  1. L. H. Yeo, X. Che, and S. Lakkaraju, "Understanding modern intrusion detection systems: a survey," in
  2. Cryptography and Security Journal, 2017.
  3. P. Amudha, S. Karthik, and S. Sivakumari,"Classification techniques for intrusion detection-an overview," in International Journal of Computer Applications, vol. 76, no. 16, 2013.
  4. M. Almseidin, M. Alzubi, S. Kovacs, andM.Alkasassbeh, "Evaluation of machine learningalgorithms for intrusion detection system," in Proc. ofIEEE International Symposium on IntelligentSystems and Informatics, 2017.
  5. V. Golman, "An efficient hybrid intrusion detectionsystem based on C5.0 and SVM," in InternationalJournal of Database Theory and Application, vol. 7,no. 2, 2014, pp. 59-70.
  6. S. S. Tanpure, G. D. Patel, Z. Raja, J. Jagtap, andA.Pathan, "Intrusion detection system in data miningusing hybrid approach," in International Journal ofComputer Applications, 2016, pp. 0975-8887.
  7. S. A. Hajare, "Detection of network attacks using bigdata analysis," in International Journal on Recent andInnovation Trends in Computing andCommunication, vol. 4 (5), 2016, pp. 86-88.
  8. M. A. Ferrag, L. Maglaras, S. Moschoyiannis, H.Janicke, "Deep learning for cyber securityintrusion detection: approaches, datasets, andcomparative study," in Journal of InformationSecurity and Applications, vol. 50, 2020.
  9. D. D. Protić, "Review of KDD CUP ‘99, NSL-KDDand KYOTO 2006+ datasets," in Military TechnicalCourier, vol. 66 (3), 2018.
  10. M. Nour, J. Slay, "UNSW-NB15: a comprehensivedata set for network intrusion detection systems(UNSW-NB15 network data set)," in Proc. of IEEEMilitary Communications and Information SystemsConference, 2015.
  11. S. M. Othman, N. T. Alsohybe, F. M. Ba-Alwi, A. T. Zahary, "Survey on intrusion detection systemtypes," in International Journal of Cyber-Security andDigital Forensics, vol. 7, no. 4, 2018, pp. 444-462.
  12. B. Caswell, J. Beale, and A. Baker: Snort IntrusionDetection and Prevention Toolkit. MA, Burlingthon:Syngress, 2007.
  13. S. Danish, A. Nasir, H. K. Qureshi, A. B. Ashfaq,S.Mumtaz, and J. Rodriguez, "Network intrusiondetection system for jamming attack in LoRaWANjoin procedure," in Proc. of IEEE InternationalConference on Communications, 2018.
  14. K. Hutchison, "Wireless intrusion detection systems," SANS Institute, White Paper, 2005.
  15. W. Stallings, "Network security essentials:applications and standards", 6th ed. USA: Pearson,2017.
  16. S. Madhavan, "Mastering python for data science",UK: Packt Publishing, 2015.
  17. R. Ioshi, "Accuracy, Precision, Recall & F1 Score:Interpretation of Performance Measures," 2016, [Online]. Available: https://blog.exsilio.com/all/accuracy-precision-recall-f1-score-interpretation-of-performance-measures/.

    Home

    PARTICIPATION

       - Committees
       - Proceedings


    PROCEEDINGS

       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2022
         - Message

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 


           ISSN 2199-8876
           Copyright © 2013-2021 Leonid Mylnikov, © 2022 at Anhalt University of Applied Sciences. All rights reserved.