Abstract
An intrusion detection system (IDS) can be either software or hardware that computerizes the process of keeping track of and evaluating network or computer system activity for indications of security issues. IDS is a crucial component of the security infrastructure of many organizations due to an increase in the frequency and intensity of attackers over the past decades. The study proposes machine learning techniques for the classification and detection of normal and attack traffics using protocol types records of the NSL-KDD dataset. Three sets of datasets were extracted from NSL-KDD datasets based on ICMP, UDP, and TCP. The experiment was conducted on WEKA 3.8.5 using KNN, KStar, LWL, BayesNet, Naïve Bayes, and PART algorithms. The results indicated that the PART algorithm has the highest performance rating while NaiveBayes has the lowest performance rating utilizing the Correlation-based feature selection (CFS) using the Ranking Filter approach. It is concluded that the PART algorithm performs well across the dataset while NaiveBayes does not perform well across the dataset.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amudha, P., Karthik, S., Sivakumari, S.: A hybrid swarm intelligence algorithm for intrusion detection using significant features. Sci. World J. 2015 (2015). https://doi.org/10.1155/2015/574589
Jaiganesh, V., Sumathi, P., Mangayarkarasi, S.: An analysis of intrusion detection system using back propagation neural network. In: 2013 International Conference on Information Communication Embedded System ICICES, pp. 2013. 232–236 (2013). https://doi.org/10.1109/ICICES.2013.6508202
Aladesote, O.I., Alese, B.K., Dahunsi, F.: Intrusion detection technique using hypothesis testing. Lect. Notes Eng. Comput. Sci. 1, 393–397 (2014)
Zuech, R., Khoshgoftaar, T.M., Seliya, N., Najafabadi, M.M., Kemp, C.: A new intrusion detection benchmarking system. In: Proceedings of 28th International Florida Artif. Intell. Res. Soc. Conf. FLAIRS 2015, pp. 252–255 (2015)
Agarwal, A., Sharma, P., Alshehri, M., Mohamed, A.A., Alfarraj, O.: Classification model for accuracy and intrusion detection using machine learning approach, pp. 1–22 (2021). https://doi.org/10.7717/peerj-cs.437
Imran, H.M., Abdullah, A.B., Palaniappan, S.: Towards the low false alarms and high detection rate in intrusions detection system. Int. J. Mach. Learn. Comput. 3, 332–336 (2013). https://doi.org/10.7763/ijmlc.2013.v3.332
Mahfouz, A.M., Venugopal, D., Shiva, S.G.: Comparative analysis of ML classifiers for network intrusion detection. In: Yang, X.-S., Sherratt, S., Dey, N., Joshi, A. (eds.) Fourth International Congress on Information and Communication Technology. AISC, vol. 1027, pp. 193–207. Springer, Singapore (2020). https://doi.org/10.1007/978-981-32-9343-4_16
Meena, G., Choudhary, R.R.: A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: 2017 International Conference on Computer, Communications and Electronics (COMPTELIX), pp. 553–558 (2017).https://doi.org/10.1109/COMPTELIX.2017.8004032
Sapre, S., Ahmadi, P., Islam, K.: A Robust Comparison of the KDDCup99 and NSL- KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms (2019)
Nehra, D., Kumar, K., Mangat, V.: Pragmatic analysis of machine learning techniques in network based IDS. In: Luhach, A.K., Jat, D.S., Hawari, K.B.G., Gao, X.-Z., Lingras, P. (eds.) ICAICR 2019. CCIS, vol. 1075, pp. 422–430. Springer, Singapore (2019). https://doi.org/10.1007/978-981-15-0108-1_39
Amira, A.S., Hanafi, S.E.O., Hassanien, A.E.: Comparison of classification techniques applied for network intrusion detection and classification. J. Appl. Log. 24, 109–118 (2017). https://doi.org/10.1016/j.jal.2016.11.018
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software. ACM SIGKDD Explor. Newsl. 11, 10–18 (2009). https://doi.org/10.1145/1656274.1656278
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Aladesote, O.I., Fakoya, J.T., Agbelusi, O. (2024). Exploiting Machine Learning Technique for Attack Detection in Intrusion Detection System (IDS) Based on Protocol. In: Saad, I., Rosenthal-Sabroux, C., Gargouri, F., Chakhar, S., Williams, N., Haig, E. (eds) Advances in Information Systems, Artificial Intelligence and Knowledge Management. ICIKS 2023. Lecture Notes in Business Information Processing, vol 486. Springer, Cham. https://doi.org/10.1007/978-3-031-51664-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-51664-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-51663-4
Online ISBN: 978-3-031-51664-1
eBook Packages: Computer ScienceComputer Science (R0)