Abstract
With the development of mobile Internet and cloud computing, the amount of network traffic has been significantly increased. Security problems have drawn a lot of attention, while traditional methods are becoming increasingly unsuitable for it. In this paper, three machine learning algorithms are employed to detect network intrusion, including KNN, Random Forest, and Multilayer Perceptron. Performance evaluation and comparison between them are conducted, in terms of precision, recall, training time, etc. Simulation results on the NSL-KDD, a benchmark data set of network intrusion detection, show that the Random Forest algorithm exhibits higher detection accuracy and remarkably shorter training time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xie, J., Li, S., Zhang, Y., et al.: A method based on hierarchical spatiotemporal features for trojan traffic detection. In: 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), pp. 1–8 (2019)
Li, Z., Batta, P., Trajkovic, L.: Comparison of machine learning algorithms for detection of network intrusions. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 4248–4253 (2018)
Qi, S., Jiang, D., Huo, L.: A prediction approach to end-to-end traffic in space information networks. Mob. Netw. Appl. (2019). https://doi.org/10.1007/s11036-019-01424-2, online available
Wang, Y., Jiang, D., Huo, L., Zhao, Y.: A new traffic prediction algorithm to software defined networking. Mob. Netw. Appl. (2019). https://doi.org/10.1007/s11036-019-01423-3. online available
Ahmad, I., Basheri, M., Iqbal, M.J., et al.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789–33795 (2018)
Jiang, D., Huo, L., Li, Y.: Fine-granularity inference and estimations to network traffic for SDN. PLoS ONE 13(5), 1–23 (2018)
Cosar, M., Kiran, H.E.: Performance comparison of open source IDSs via Raspberry Pi. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), pp. 1–5 (2018)
Jiang, D., Huo, L., Song, H.: Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans. Netw. Sci. Eng. 7(1), 80–90 (2020)
Sarvari, S., Sani, N.F.M., Hanapi, Z.M., et al.: An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access 8, 70651–70663 (2020)
Jiang, D., Wang, W., Shi, L., Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans. Netw. Sci. Eng. 7(1), 507–519 (2020)
Chiba, Z., Abghour, N., Moussaid, K., et al.: A hybrid optimization framework based on genetic algorithm and simulated annealing algorithm to enhance performance of anomaly network intrusion detection system based on BP neural network. In: 2018 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), pp. 1–6 (2018)
Jiang, D., Li, W., Lv, H.: An energy-efficient cooperative multicast routing in multi-hop wireless networks for smart medical applications. Neurocomputing 2017(220), 160–169 (2017)
Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366–64374 (2019)
Jiang, D., Zhang, P., Lv, Z., et al.: Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet of Things J. 3(6), 1437–1447 (2016)
Singh, K., Mathai, K.J.: Performance comparison of intrusion detection system between deep belief network (DBN) algorithm and state preserving extreme learning machine (SPELM) algorithm. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–7 (2019)
Jiang, D., Wang, Y., Lv, Z., Wang, W., Wang, H.: An energy-efficient networking approach in cloud services for IIoT networks. IEEE J. Sel. Areas Commun. 38(5), 928–941 (2020)
Zhang, Y., Li, P., Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019)
Wang, F., Jiang, D., Qi, S.: An adaptive routing algorithm for integrated information networks. China Commun. 7(1), 196–207 (2019)
Liu, W., Liu, X., Di, X., et al.: A novel network intrusion detection algorithm based on fast fourier transformation. In: 2019 1st International Conference on Industrial Artificial Intelligence (IAI), pp. 1–6 (2019)
Jiang, D., Wang, Y., Lv, Z., Qi, S., Singh, S.: Big data analysis based network behavior insight of cellular networks for Industry 4.0 applications. IEEE Trans. Ind. Inf. 16(2), 1310–1320 (2020)
Liang, W., Li, K., Long, J., et al.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inf. 16(3), 2063–2071 (2020)
Jiang, D., Huo, L., Lv, Z., Song, H., Qin, W.: A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans. Intell. Transp. Syst. 19(10), 3305–3319 (2018)
Khan, R.U., Zhang, X., Alazab, M., et al.: An improved convolutional neural network model for intrusion detection in networks. In: 2019 Cybersecurity and Cyberforensics Conference (CCC), pp. 74–77 (2019)
Huo, L., Jiang, D., Qi, S., et al.: An AI-based adaptive cognitive modeling and measurement method of network traffic for EIS. Mob. Netw. Appl. (2019). https://doi.org/10.1007/s11036-019-01419-z. online available
Miehling, E., Rasouli, M., Teneketzis, D.: A POMDP approach to the dynamic defense of large-scale cyber networks. IEEE Trans. Inf. Forensics Secur. 13(10), 2490–2505 (2018)
Acknowledgement
This work was supported in part by the National Natural Science Foundation of China (No. 61571104), the Sichuan Science and Technology Program (No. 2018JY0539), the Key projects of the Sichuan Provincial Education Department (No. 18ZA0219), the Fundamental Research Funds for the Central Universities (No. ZYGX2017KYQD170), the CERNET Innovation Project (No. NGII20190111), the Fund Project (Nos. 61403110405, 315075802), and the Innovation Funding (No. 2018510007000134). The authors wish to thank the reviewers for their helpful comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wang, Z., Jiang, D., Wang, Y., Zhang, J. (2021). A Performance Analysis Approach for Network Intrusion Detection Algorithms. In: Song, H., Jiang, D. (eds) Simulation Tools and Techniques. SIMUtools 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-030-72792-5_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-72792-5_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72791-8
Online ISBN: 978-3-030-72792-5
eBook Packages: Computer ScienceComputer Science (R0)