Machine learning to improve the performance of anomaly-based network intrusion detection in big data

نویسندگان

چکیده

With the rapid growth of digital technology communications are overwhelmed by network data traffic. The demand for internet is growing every day in today's cyber world, raising concerns about security. Big Data a term that describes vast volume complicated critical evaluating patterns and determining what has occurred network. Therefore, detecting attacks large challenging. Intrusion detection system (IDS) promising cybersecurity research field. In this paper, we proposed an efficient classification scheme IDS, which divided into two procedures, on CSE-CIC-IDS-2018 dataset, pre-processing techniques including under-sampling, feature selection, classifier algorithms were used to assess decide best performing model classify invaders. We have implemented compared seven machine learning with various criteria. This work explored application random forest (RF) selection conjunction (ML) linear regression (LR), k-Nearest Neighbor (k-NN), trees (CART), Bayes, RF, multi layer perceptron (MLP), XGBoost order implement IDSS. experimental results show MLP algorithm most successful performance evaluation matrix.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Machine Learning Approaches to Network Anomaly Detection

Networks of various kinds often experience anomalous behaviour. Examples include attacks or large data transfers in IP networks, presence of intruders in distributed video surveillance systems, and an automobile accident or an untimely congestion in a road network. Machine learning techniques enable the development of anomaly detection algorithms that are non-parametric, adaptive to changes in ...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Anomaly Based Network Intrusion Detection by using Data Mining

As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attenti...

متن کامل

Machine Learning in Network Intrusion Detection

Network security is of great importance to individuals and organizations. Advanced technologies have been developed to protect both incoming and outgoing traffic, e.g. encryption of sensitive information, firewalls to block risky traffic. However, traditional firewalls and Intrusion Detection System (IDS) identify and block suspicious traffic based on preconfigured rules, traffic signatures as ...

متن کامل

Machine Learning in Network Intrusion Detection System

During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP’99 is the mostly widely used data set for the evaluation of these systems. As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a cr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2023

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v30.i2.pp1106-1119