Skip to main content

2018 | OriginalPaper | Buchkapitel

Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection Using Weka

verfasst von : Nureni Ayofe Azeez, Obinna Justin Asuzu, Sanjay Misra, Adewole Adewumi, Ravin Ahuja, Rytis Maskeliunas

Erschienen in: Towards Extensible and Adaptable Methods in Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

For the past few years, it has been seen that the computer intrusion attacks are becoming more sophisticated, and the volume, velocity, and variance of traffic data have greatly increased. Because the conventional methods and tools have become impotent in the detection of intrusion attacks, most intrusion detection systems now embrace the use of machine learning tools and algorithms for efficiency. This is because of their ability to process large volume, velocity, and very high variance data. This work reviews and analyzes the performance of three out of the most commonly used machine learning algorithms in network intrusion. In this work, the performance of Naïve Bayes, decision tree, and random forest algorithms were evaluated as they were being trained and tested with the KDD CUP 1999 dataset from DARPA using a big data and machine learning tool called Weka. These classification algorithms are evaluated based on their precision, sensitivity, and accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Azeez, N. A., & Ademolu, O. (2016). CyberProtector: Identifying compromised URLs in electronic mails with Bayesian classification. In International Conference Computational Science and Computational Intelligence, pp. 959–965. Azeez, N. A., & Ademolu, O. (2016). CyberProtector: Identifying compromised URLs in electronic mails with Bayesian classification. In International Conference Computational Science and Computational Intelligence, pp. 959–965.
2.
Zurück zum Zitat Azeez, N. A., Okunoye, O. B., Oladeji, F. A., & Edafeadjeke, E. O. (2015). Towards an adaptive and scalable access control model for a cloud-based environment. In Nigerian Computer Society (NCS) 12th Annual Conference International Conference on Information Technology for Inclusive Development (Vol. 26, pp. 214–223). Azeez, N. A., Okunoye, O. B., Oladeji, F. A., & Edafeadjeke, E. O. (2015). Towards an adaptive and scalable access control model for a cloud-based environment. In Nigerian Computer Society (NCS) 12th Annual Conference International Conference on Information Technology for Inclusive Development (Vol. 26, pp. 214–223).
3.
Zurück zum Zitat Singh, R., & Singh, D. (2014). A review of network intrusion detection system. International Journal of Engineering and Technoscience, 5(1), 10–15. Singh, R., & Singh, D. (2014). A review of network intrusion detection system. International Journal of Engineering and Technoscience, 5(1), 10–15.
4.
Zurück zum Zitat Giorgio, G., & Fabio, R. (2003). Intrusion detection in computer networks by multiple classifier systems. Pattern Recognition Letters, 1795–1803. Giorgio, G., & Fabio, R. (2003). Intrusion detection in computer networks by multiple classifier systems. Pattern Recognition Letters, 1795–1803.
5.
Zurück zum Zitat Denning, E. D. (1987). An Intrusion-detection model. IEEE Transaction on Software Engineering, 222–232.CrossRef Denning, E. D. (1987). An Intrusion-detection model. IEEE Transaction on Software Engineering, 222–232.CrossRef
6.
Zurück zum Zitat Azeez, N. A., & Babatope, A. B. AANtID: An alternative approach to network intrusion detection. Journal of Computer Science and Its Application, 23(1) (2016). Azeez, N. A., & Babatope, A. B. AANtID: An alternative approach to network intrusion detection. Journal of Computer Science and Its Application, 23(1) (2016).
7.
Zurück zum Zitat Azeez, N. A., & Venter, I. M. (2013). Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment. SAIEE Africa Research, 104(2), 54–68. Azeez, N. A., & Venter, I. M. (2013). Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment. SAIEE Africa Research, 104(2), 54–68.
8.
Zurück zum Zitat Azeez, N. A., & Irwin, B. (2010). Cyber security: Challenges and the way forward. GESJ: Computer Science and Telecommunications, 1512–1232. Azeez, N. A., & Irwin, B. (2010). Cyber security: Challenges and the way forward. GESJ: Computer Science and Telecommunications, 1512–1232.
9.
Zurück zum Zitat Chandrasekhar, A. M., & Raghuveer, K. (2013). Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers. In 2013 International Conference Computer Communication and Informatics (ICCCI). Coimbatore, India. Chandrasekhar, A. M., & Raghuveer, K. (2013). Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers. In 2013 International Conference Computer Communication and Informatics (ICCCI). Coimbatore, India.
10.
Zurück zum Zitat Sumaiya, T. I., & Aswani, K. C. (2016). Intrusion detection model using fusion of chi-square and multi class SVM. Journal of King Saud University. Sumaiya, T. I., & Aswani, K. C. (2016). Intrusion detection model using fusion of chi-square and multi class SVM. Journal of King Saud University.
11.
Zurück zum Zitat Smaha, R. E., & Haystack. (1988). An intrusion detection system. In Proceedings of the IEEE Fourth Aerospace. Orlando, FL. Smaha, R. E., & Haystack. (1988). An intrusion detection system. In Proceedings of the IEEE Fourth Aerospace. Orlando, FL.
12.
Zurück zum Zitat Nidhi, S., Krishna, R., Rama, K. C. (2013). Novel intrusion detection system integrating layered framework with neural network. In IEEE 3rd International Advance Computing Conference (IACC). Ghaziabad. Nidhi, S., Krishna, R., Rama, K. C. (2013). Novel intrusion detection system integrating layered framework with neural network. In IEEE 3rd International Advance Computing Conference (IACC). Ghaziabad.
13.
Zurück zum Zitat Zhao, Y., Zhang, Y., Tong, W., & Chen, H. (2013). An improved feature selection algorithm based on MAHALANOBIS distance for network intrusion detection. In Sensor Network Security Technology and Privacy Communication System (SNS & PCS), 2013 International Conference. Nangang, China. Zhao, Y., Zhang, Y., Tong, W., & Chen, H. (2013). An improved feature selection algorithm based on MAHALANOBIS distance for network intrusion detection. In Sensor Network Security Technology and Privacy Communication System (SNS & PCS), 2013 International Conference. Nangang, China.
14.
Zurück zum Zitat Fengli, Z., & Dan, W. (2013). An effective feature selection approach for network intrusion detection. In Networking, Architecture and Storage (NAS), 2013 IEEE Eighth International Conference. Xi’an, China. Fengli, Z., & Dan, W. (2013). An effective feature selection approach for network intrusion detection. In Networking, Architecture and Storage (NAS), 2013 IEEE Eighth International Conference. Xi’an, China.
15.
Zurück zum Zitat Yang, L., Bin-xing, F., You, C., & Li, G. A (2006). lightweight intrusion detection model based on feature selection and maximum entropy model. In Communication Technology, 2006. ICCT ‘06. International Conference. Guilin, China. Yang, L., Bin-xing, F., You, C., & Li, G. A (2006). lightweight intrusion detection model based on feature selection and maximum entropy model. In Communication Technology, 2006. ICCT ‘06. International Conference. Guilin, China.
16.
Zurück zum Zitat Preecha, S., & Woraphon, L. (2015). Anomaly traffic detection based on PCA. The International Arab Journal of Information Technology, 253–260. Preecha, S., & Woraphon, L. (2015). Anomaly traffic detection based on PCA. The International Arab Journal of Information Technology, 253–260.
17.
Zurück zum Zitat Poojitha, G., Naveen, K. K., & Jayarami, P. R. (2010). Intrusion detection using artificial neural network. In 2010 International Conference on Computing Communication and Networking Technologies (ICCCNT). Karur, India. Poojitha, G., Naveen, K. K., & Jayarami, P. R. (2010). Intrusion detection using artificial neural network. In 2010 International Conference on Computing Communication and Networking Technologies (ICCCNT). Karur, India.
18.
Zurück zum Zitat Adel, N. T., & Mohsen, K. (2007). A new approach to intrusion detection based on an evolutionary. Computer Communications, 2201–2212. Adel, N. T., & Mohsen, K. (2007). A new approach to intrusion detection based on an evolutionary. Computer Communications, 2201–2212.
19.
Zurück zum Zitat Hui, L., & Jinhua, X. (2009). Three-level hybrid intrusion detection system. In International Conference on Information Engineering and Computer Science, 2009. ICIECS 2009. Wuhan, China. Hui, L., & Jinhua, X. (2009). Three-level hybrid intrusion detection system. In International Conference on Information Engineering and Computer Science, 2009. ICIECS 2009. Wuhan, China.
20.
Zurück zum Zitat Zhang, H. (2004). The optimality of Naive Bayes. New Brunswick, Canada: University of New Brunswick. Zhang, H. (2004). The optimality of Naive Bayes. New Brunswick, Canada: University of New Brunswick.
21.
Zurück zum Zitat Azeez, N. A., Ademola, P. A., Ademola, O. A., & Kehinde, K. A. (2011). Ancaee: A novel clustering algorithm for energy efficiency in wireless sensor networks. Wireless Sensor Network, 307–312. Azeez, N. A., Ademola, P. A., Ademola, O. A., & Kehinde, K. A. (2011). Ancaee: A novel clustering algorithm for energy efficiency in wireless sensor networks. Wireless Sensor Network, 307–312.
22.
Zurück zum Zitat Balogun, A. O., & Jimoh, R. G. (2015). Anomaly intrusion detection using an hybrid of decision tree. A Multidisciplinary Journal Publication of the Faculty of Science, Adeleke University, Ede, Nigeria, 67–73. Balogun, A. O., & Jimoh, R. G. (2015). Anomaly intrusion detection using an hybrid of decision tree. A Multidisciplinary Journal Publication of the Faculty of Science, Adeleke University, Ede, Nigeria, 67–73.
23.
Zurück zum Zitat Heady, R., Luger, G., Maccabe, A., & Servilla, M. The architecture of a network. Technical Report, Department of Computer Science, University (1990). Heady, R., Luger, G., Maccabe, A., & Servilla, M. The architecture of a network. Technical Report, Department of Computer Science, University (1990).
24.
Zurück zum Zitat Govind, P. G., & Manish, K. (2016). A framework for fast and efficient cyber security network. In 6th International Conference on Advances in Computing & Communications, ICACC 2016. Cochin, India. Govind, P. G., & Manish, K. (2016). A framework for fast and efficient cyber security network. In 6th International Conference on Advances in Computing & Communications, ICACC 2016. Cochin, India.
25.
Zurück zum Zitat Manning, C. D., Raghavan, P., & Schutze, H. (2008). Introduction to Information Retrieval. Cambridge University Press. Manning, C. D., Raghavan, P., & Schutze, H. (2008). Introduction to Information Retrieval. Cambridge University Press.
Metadaten
Titel
Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection Using Weka
verfasst von
Nureni Ayofe Azeez
Obinna Justin Asuzu
Sanjay Misra
Adewole Adewumi
Ravin Ahuja
Rytis Maskeliunas
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-2348-5_15

Premium Partner