Analysis of Intrusion Detection Systems in UNSW-NB15 and NSL-KDD Datasets with Machine Learning Algorithms

نویسندگان

چکیده

Recently, the need for Network-based systems and smart devices has been increasing rapidly. The use of in almost every field, provision services by private public institutions over network servers, cloud technologies database are completely remotely controlled. Due to these requirements systems, malicious software users, unfortunately, their interest areas. Some organizations exposed hundreds or even thousands attacks daily. Therefore, it is not enough solve with a virus program firewall. Detection correct analysis vital operation entire system. With deep learning machine learning, attack detection classification can be done successfully. In this study, comprehensive process was performed on UNSW-NB15 NSL-KDD datasets existing algorithms. UNSW-NB115 dataset, 98.6% 98.3% accuracy were obtained two-class multi-class, respectively, 97.8% 93.4% dataset. results prove that algorithms lateral solution intrusion systems.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Feature Selection for Intrusion Detection using NSL-KDD

These days, network traffic is increasing due to the increasing use of smart devices and the Internet. Amount of the intrusion detection studies focused on feature selection or reduction because some of the features are irrelevant and redundant which results lengthy detection process and degrades the performance of an intrusion detection system (IDS). The purpose of this study is to identify im...

متن کامل

A Two-Stage Classifier Approach using RepTree Algorithm for Network Intrusion Detection

In this paper, we present a two-stage classifier based on RepTree algorithm and protocols subset for network intrusion detection system. To evaluate the performance of our approach, we used the UNSW-NB15 data set and the NSL-KDD data set. In first phase our approach divides the incoming network traffics into three type of protocols TCP, UDP or Other, then classifies into normal or anomaly. In s...

متن کامل

Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set

A large set of machine learning and pattern classification algorithms trained and tested on KDD intrusion detection data set failed to identify most of the user-toroot and remote-to-local attacks, as reported by many researchers in the literature. In light of this observation, this paper aims to expose the deficiencies and limitations of the KDD data set to argue that this data set should not b...

متن کامل

Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context

A small subset of machine learning algorithms, mostly inductive learning based, applied to the KDD 1999 Cup intrusion detection dataset resulted in dismal performance for user-to-root and remote-to-local attack categories as reported in the recent literature. The uncertainty to explore if other machine learning algorithms can demonstrate better performance compared to the ones already employed ...

متن کامل

Feature Ranking and Support Vector Machines Classification Analysis of the NSL-KDD Intrusion Detection Corpus

Currently, signature based Intrusion Detection Systems (IDS) approaches are inadequate to address threats posed to networked systems by zero-day exploits. Statistical machine learning techniques offer a great opportunity to mitigate these threats. However, at this point, statistical based IDS systems are not mature enough to be implemented in realtime systems and the techniques to be used are n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bitlis Eren üniversitesi fen bilimleri dergisi

سال: 2023

ISSN: ['2147-3188', '2147-3129']

DOI: https://doi.org/10.17798/bitlisfen.1240469