Abstract
Security is the most significant issue in concerns of protecting information or data breaches. Furthermore, attackers present a new variety of cyber-attacks in the market, which prevent users from managing their network or computer system. For that reason, the growth of cybersecurity research studies, such as intrusion detection and prevention systems have great significance. The intrusion detection system (IDS) is an effective approach against malicious attacks. In this work, a range of experiments has been carried out on seven machine learning algorithms by using the CICIDS2017 intrusion detection dataset. It ensued to compute several performance metrics to examine the selected algorithms. The experimental results demonstrated that the K-Nearest Neighbors (KNN) classifier outperformed in terms of precision, recall, accuracy, and F1-score as compared to other machine learning classifiers. Nevertheless, All of the used machine learning classifiers except KNN trained their models in a reasonable time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789–33795 (2018)
Aksu, D., Üstebay, S., Aydin, M.A., Atmaca, T.: Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm. In: Czachórski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.) ISCIS 2018. CCIS, vol. 935, pp. 141–149. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00840-6_16
Bansal, A., Kaur, S.: Extreme gradient boosting based tuning for classification in intrusion detection systems. In: Singh, M., Gupta, P.K., Tyagi, V., Flusser, J., Ören, T. (eds.) ICACDS 2018. CCIS, vol. 905, pp. 372–380. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-1810-8_37
Boukhamla, A., Gaviro, J.C.: Cicids 2017 dataset: performance improvements and validation as a robust intrusion detection system testbed (2018)
Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
Hastie, T., Tibshirani, R., Friedman, J.: The elements of statistical learning, Chapter 6 (2001)
Hou, J., Fu, P., Cao, Z., Xu, A.: Machine learning based DDoS detection through netflow analysis. In: MILCOM 2018–2018 IEEE Military Communications Conference (MILCOM), pp. 1–6. IEEE (2018)
Hu, W., Hu, W., Maybank, S.: Adaboost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 38(2), 577–583 (2008)
Keller, J.M., Gray, M.R., Givens, J.A.: A fuzzy k-nearest neighbor algorithm. IEEE Trans. Syst. Man Cybern. 4, 580–585 (1985)
Panda, M., Patra, M.R.: Network intrusion detection using Naive Bayes. Int. J. Comput. Sci. Netw. Secur. 7(12), 258–263 (2007)
Papamartzivanos, D., Mármol, F.G., Kambourakis, G.: Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7, 13546–13560 (2019)
Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986)
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108–116 (2018)
Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994–12000 (2009)
Ustebay, S., Turgut, Z., Aydin, M.A.: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 71–76. IEEE (2018)
Zegeye, W., Dean, R., Moazzami, F.: Multi-layer hidden markov model based intrusion detection system. Mach. Learn. Knowl. Extr. 1(1), 265–286 (2019)
Acknowledgments
Mohammed and Freeh would thank Aljouf and Majmaah Universities, respectively, for the scholarship funds.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Alrowaily, M., Alenezi, F., Lu, Z. (2019). Effectiveness of Machine Learning Based Intrusion Detection Systems. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-24907-6_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24906-9
Online ISBN: 978-3-030-24907-6
eBook Packages: Computer ScienceComputer Science (R0)