Proceedings of International Conference on Applied Innovation in IT
2022/03/09, Volume 10, Issue 1, pp.21-27

Anomaly Detection with Various Machine Learning Classification Techniques over UNSW-NB15 Dataset


Martina Shushlevska, Danijela Efnusheva, Goran Jakimovski, Zdravko Todorov


Abstract: The exponential growth of computers and devices connected to the Internet and the variety of commercial services offered creates the need to protect Internet users. As a result, intrusion detection systems (IDS) are becoming an essential part of each computer-communication system, detecting and responding to malicious network traffic and computer abuse. In this paper, an IDS based on the UNSW-NB15 dataset has been implemented. The results obtained indicate F1 Score and Recall values of 76.1% and 85.3% for the Naive Bayes algorithm, 78.2% and 96.1% for Logistic Regression algorithm, 88.3% and 95.4% for Decision Tree classifier, and 89.3% and 98.5% for Random Forest.

Keywords: Anomaly Detection, Intrusion Detection System, Machine Learning, Network Security, UNSW-NB15 Dataset

DOI: 10.25673/76928

Download: PDF

References:

  1. L. H. Yeo, X. Che, and S. Lakkaraju, "Understanding modern intrusion detection systems: a survey," in
  2. Cryptography and Security Journal, 2017.
  3. P. Amudha, S. Karthik, and S. Sivakumari,"Classification techniques for intrusion detection-an overview," in International Journal of Computer Applications, vol. 76, no. 16, 2013.
  4. M. Almseidin, M. Alzubi, S. Kovacs, andM.Alkasassbeh, "Evaluation of machine learningalgorithms for intrusion detection system," in Proc. ofIEEE International Symposium on IntelligentSystems and Informatics, 2017.
  5. V. Golman, "An efficient hybrid intrusion detectionsystem based on C5.0 and SVM," in InternationalJournal of Database Theory and Application, vol. 7,no. 2, 2014, pp. 59-70.
  6. S. S. Tanpure, G. D. Patel, Z. Raja, J. Jagtap, andA.Pathan, "Intrusion detection system in data miningusing hybrid approach," in International Journal ofComputer Applications, 2016, pp. 0975-8887.
  7. S. A. Hajare, "Detection of network attacks using bigdata analysis," in International Journal on Recent andInnovation Trends in Computing andCommunication, vol. 4 (5), 2016, pp. 86-88.
  8. M. A. Ferrag, L. Maglaras, S. Moschoyiannis, H.Janicke, "Deep learning for cyber securityintrusion detection: approaches, datasets, andcomparative study," in Journal of InformationSecurity and Applications, vol. 50, 2020.
  9. D. D. Protić, "Review of KDD CUP ‘99, NSL-KDDand KYOTO 2006+ datasets," in Military TechnicalCourier, vol. 66 (3), 2018.
  10. M. Nour, J. Slay, "UNSW-NB15: a comprehensivedata set for network intrusion detection systems(UNSW-NB15 network data set)," in Proc. of IEEEMilitary Communications and Information SystemsConference, 2015.
  11. S. M. Othman, N. T. Alsohybe, F. M. Ba-Alwi, A. T. Zahary, "Survey on intrusion detection systemtypes," in International Journal of Cyber-Security andDigital Forensics, vol. 7, no. 4, 2018, pp. 444-462.
  12. B. Caswell, J. Beale, and A. Baker: Snort IntrusionDetection and Prevention Toolkit. MA, Burlingthon:Syngress, 2007.
  13. S. Danish, A. Nasir, H. K. Qureshi, A. B. Ashfaq,S.Mumtaz, and J. Rodriguez, "Network intrusiondetection system for jamming attack in LoRaWANjoin procedure," in Proc. of IEEE InternationalConference on Communications, 2018.
  14. K. Hutchison, "Wireless intrusion detection systems," SANS Institute, White Paper, 2005.
  15. W. Stallings, "Network security essentials:applications and standards", 6th ed. USA: Pearson,2017.
  16. S. Madhavan, "Mastering python for data science",UK: Packt Publishing, 2015.
  17. R. Ioshi, "Accuracy, Precision, Recall & F1 Score:Interpretation of Performance Measures," 2016, [Online]. Available: https://blog.exsilio.com/all/accuracy-precision-recall-f1-score-interpretation-of-performance-measures/.


    HOME

       - Call for Papers
       - For authors
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 12, Issue 1 (ICAIIT 2024)        - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

DOI: http://dx.doi.org/10.25673/115729


        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Anhalt University of Applied Sciences

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.