Skip to main content

Exploiting Machine Learning Technique for Attack Detection in Intrusion Detection System (IDS) Based on Protocol

  • Conference paper
  • First Online:
Advances in Information Systems, Artificial Intelligence and Knowledge Management (ICIKS 2023)

Abstract

An intrusion detection system (IDS) can be either software or hardware that computerizes the process of keeping track of and evaluating network or computer system activity for indications of security issues. IDS is a crucial component of the security infrastructure of many organizations due to an increase in the frequency and intensity of attackers over the past decades. The study proposes machine learning techniques for the classification and detection of normal and attack traffics using protocol types records of the NSL-KDD dataset. Three sets of datasets were extracted from NSL-KDD datasets based on ICMP, UDP, and TCP. The experiment was conducted on WEKA 3.8.5 using KNN, KStar, LWL, BayesNet, Naïve Bayes, and PART algorithms. The results indicated that the PART algorithm has the highest performance rating while NaiveBayes has the lowest performance rating utilizing the Correlation-based feature selection (CFS) using the Ranking Filter approach. It is concluded that the PART algorithm performs well across the dataset while NaiveBayes does not perform well across the dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amudha, P., Karthik, S., Sivakumari, S.: A hybrid swarm intelligence algorithm for intrusion detection using significant features. Sci. World J. 2015 (2015). https://doi.org/10.1155/2015/574589

  2. Jaiganesh, V., Sumathi, P., Mangayarkarasi, S.: An analysis of intrusion detection system using back propagation neural network. In: 2013 International Conference on Information Communication Embedded System ICICES, pp. 2013. 232–236 (2013). https://doi.org/10.1109/ICICES.2013.6508202

  3. Aladesote, O.I., Alese, B.K., Dahunsi, F.: Intrusion detection technique using hypothesis testing. Lect. Notes Eng. Comput. Sci. 1, 393–397 (2014)

    Google Scholar 

  4. Zuech, R., Khoshgoftaar, T.M., Seliya, N., Najafabadi, M.M., Kemp, C.: A new intrusion detection benchmarking system. In: Proceedings of 28th International Florida Artif. Intell. Res. Soc. Conf. FLAIRS 2015, pp. 252–255 (2015)

    Google Scholar 

  5. Agarwal, A., Sharma, P., Alshehri, M., Mohamed, A.A., Alfarraj, O.: Classification model for accuracy and intrusion detection using machine learning approach, pp. 1–22 (2021). https://doi.org/10.7717/peerj-cs.437

  6. Imran, H.M., Abdullah, A.B., Palaniappan, S.: Towards the low false alarms and high detection rate in intrusions detection system. Int. J. Mach. Learn. Comput. 3, 332–336 (2013). https://doi.org/10.7763/ijmlc.2013.v3.332

    Article  Google Scholar 

  7. Mahfouz, A.M., Venugopal, D., Shiva, S.G.: Comparative analysis of ML classifiers for network intrusion detection. In: Yang, X.-S., Sherratt, S., Dey, N., Joshi, A. (eds.) Fourth International Congress on Information and Communication Technology. AISC, vol. 1027, pp. 193–207. Springer, Singapore (2020). https://doi.org/10.1007/978-981-32-9343-4_16

    Chapter  Google Scholar 

  8. Meena, G., Choudhary, R.R.: A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: 2017 International Conference on Computer, Communications and Electronics (COMPTELIX), pp. 553–558 (2017).https://doi.org/10.1109/COMPTELIX.2017.8004032

  9. Sapre, S., Ahmadi, P., Islam, K.: A Robust Comparison of the KDDCup99 and NSL- KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms (2019)

    Google Scholar 

  10. Nehra, D., Kumar, K., Mangat, V.: Pragmatic analysis of machine learning techniques in network based IDS. In: Luhach, A.K., Jat, D.S., Hawari, K.B.G., Gao, X.-Z., Lingras, P. (eds.) ICAICR 2019. CCIS, vol. 1075, pp. 422–430. Springer, Singapore (2019). https://doi.org/10.1007/978-981-15-0108-1_39

    Chapter  Google Scholar 

  11. Amira, A.S., Hanafi, S.E.O., Hassanien, A.E.: Comparison of classification techniques applied for network intrusion detection and classification. J. Appl. Log. 24, 109–118 (2017). https://doi.org/10.1016/j.jal.2016.11.018

    Article  MathSciNet  Google Scholar 

  12. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software. ACM SIGKDD Explor. Newsl. 11, 10–18 (2009). https://doi.org/10.1145/1656274.1656278

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Olomi Isaiah Aladesote .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aladesote, O.I., Fakoya, J.T., Agbelusi, O. (2024). Exploiting Machine Learning Technique for Attack Detection in Intrusion Detection System (IDS) Based on Protocol. In: Saad, I., Rosenthal-Sabroux, C., Gargouri, F., Chakhar, S., Williams, N., Haig, E. (eds) Advances in Information Systems, Artificial Intelligence and Knowledge Management. ICIKS 2023. Lecture Notes in Business Information Processing, vol 486. Springer, Cham. https://doi.org/10.1007/978-3-031-51664-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-51664-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-51663-4

  • Online ISBN: 978-3-031-51664-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics