Abstract
Advancement of the network technology has increased our dependency on the Internet. Hence the security of the network plays a very important role. The network intrusions can be identified using Intrusion Detection System (IDS). Machine learning algorithms are used to predict the network behavior as intrusion or normal. This paper discusses the prediction analysis of different supervised machine learning algorithms namely Logistic Regression, Gaussian Naive Bayes, Support Vector Machine and Random Forest on NSL-KDD dataset. These machine learning classification techniques are used to predict the four different types of attacks namely Denial of Service attack, Remote to Local (R2L), Probe and User to Root(U2R) attacks using multi-class classification technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mukherjee, S., Sharma, N.: Intrusion detection using naive bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012). 2nd International Conference on Computer, Communication, Control and Information Technology (C3IT-2012), 25–26 February, 2012. http://www.sciencedirect.com/science/article/pii/S2212017312002964
Panda, M., Patra, M.R.: Semi-Naïve Bayesian method for network intrusion detection system. In: Leung, C.S., Lee, M., Chan, J.H. (eds.) ICONIP 2009. LNCS, vol. 5863, pp. 614–621. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10677-4_70
Devaraju, S., Ramakrishnan, S.: Performance comparison for intrusion detection system using neural network with KDD dataset. ICTACT J. Soft Comput. 4(3), 743–752 (2014)
Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16(4), 507–521 (2007). http://dx.doi.org/10.1007/s0077800600025
Gaikwad, D.P., Thool, R.C.: Intrusion detection system using bagging ensemble method of machine learning. In: 2015 International Conference on Computing Communication Control and Automation, pp. 291–295, February 2015
Leite, A., Girardi, R.: A hybrid and learning agent architecture for network intrusion detection. J. Syst. Softw. 130, 59–80 (2017). http://www.sciencedirect.com/science/article/pii/S0164121217300183
Belavagi, M.C., Muniyal, B.: Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput. Sci. 89, 117–123 (2016). http://www.sciencedirect.com/science/article/pii/S187705091631081X
Mitchell, T.M.: Machine Learning, 1st edn. McGraw-Hill Inc., New York (1997)
Nsl-kdd dataset. Accessed Dec 2015
Aburomman, A., Reaz, M.: A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput. Secur. 65, 135–152 (2017)
Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)
Bukhtoyarov, V., Zhukov, V.: Erratum: ensemble-distributed approach in classification problem solution for intrusion detection systems. In: Corchado, E., Lozano, J.A., Quintián, H., Yin, H. (eds.) IDEAL 2014. LNCS, vol. 8669, p. E1. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10840-7_60
Enache, C., Patriciu, V.V.: Intrusions detection based on support Vector machine optimized with swarm intelligence. In: 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI), pp. 153–158, May 2014
Panda, M., Abraham, A., Patra, M.R.: A hybrid intelligent approach for network intrusion detection. Procedia Eng 30, 1–9 (2012). International Conference on Communication Technology and System Design 2011. http://www.sciencedirect.com/science/article/pii/S1877705812008375
Koc, L., Mazzuchi, T.A., Sarkani, S.: A network intrusion detection system based on a hidden Naive Bayes multiclass classier. Expert Syst. Appl. 39(18), 13492–13500 (2012). http://www.sciencedirect.com/science/article/pii/S0957417412008640
Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424–430 (2012). http://www.sciencedirect.com/science/article/pii/S0957417411009948
Sindhu, S.S.S., Geetha, S., Kannan, A.: Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst. Appl. 39(1), 129–141 (2012). http://www.sciencedirect.com/science/article/pii/S0957417411009080
Bahri, E., Harbi, N., Huu, H.N.: Approach based ensemble methods for better and faster intrusion detection. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 17–24. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21323-6_3
Murphy, K.P.: Learning Machine: A Probabilistic Perspective. The MIT Press, Cambridge (2012)
Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001). http://www.cs.colorado.edu/grudic/teaching/CSCI5622-2004/RandomForests-ML-Journal.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Belavagi, M.C., Muniyal, B. (2017). Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-6898-0_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6897-3
Online ISBN: 978-981-10-6898-0
eBook Packages: Computer ScienceComputer Science (R0)