Skip to main content

Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 746))

Included in the following conference series:

Abstract

Advancement of the network technology has increased our dependency on the Internet. Hence the security of the network plays a very important role. The network intrusions can be identified using Intrusion Detection System (IDS). Machine learning algorithms are used to predict the network behavior as intrusion or normal. This paper discusses the prediction analysis of different supervised machine learning algorithms namely Logistic Regression, Gaussian Naive Bayes, Support Vector Machine and Random Forest on NSL-KDD dataset. These machine learning classification techniques are used to predict the four different types of attacks namely Denial of Service attack, Remote to Local (R2L), Probe and User to Root(U2R) attacks using multi-class classification technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mukherjee, S., Sharma, N.: Intrusion detection using naive bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012). 2nd International Conference on Computer, Communication, Control and Information Technology (C3IT-2012), 25–26 February, 2012. http://www.sciencedirect.com/science/article/pii/S2212017312002964

    Article  Google Scholar 

  2. Panda, M., Patra, M.R.: Semi-Naïve Bayesian method for network intrusion detection system. In: Leung, C.S., Lee, M., Chan, J.H. (eds.) ICONIP 2009. LNCS, vol. 5863, pp. 614–621. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10677-4_70

    Chapter  Google Scholar 

  3. Devaraju, S., Ramakrishnan, S.: Performance comparison for intrusion detection system using neural network with KDD dataset. ICTACT J. Soft Comput. 4(3), 743–752 (2014)

    Article  Google Scholar 

  4. Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16(4), 507–521 (2007). http://dx.doi.org/10.1007/s0077800600025

    Article  Google Scholar 

  5. Gaikwad, D.P., Thool, R.C.: Intrusion detection system using bagging ensemble method of machine learning. In: 2015 International Conference on Computing Communication Control and Automation, pp. 291–295, February 2015

    Google Scholar 

  6. Leite, A., Girardi, R.: A hybrid and learning agent architecture for network intrusion detection. J. Syst. Softw. 130, 59–80 (2017). http://www.sciencedirect.com/science/article/pii/S0164121217300183

    Article  Google Scholar 

  7. Belavagi, M.C., Muniyal, B.: Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput. Sci. 89, 117–123 (2016). http://www.sciencedirect.com/science/article/pii/S187705091631081X

  8. Mitchell, T.M.: Machine Learning, 1st edn. McGraw-Hill Inc., New York (1997)

    MATH  Google Scholar 

  9. Nsl-kdd dataset. Accessed Dec 2015

    Google Scholar 

  10. Aburomman, A., Reaz, M.: A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput. Secur. 65, 135–152 (2017)

    Article  Google Scholar 

  11. Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)

    Article  Google Scholar 

  12. Bukhtoyarov, V., Zhukov, V.: Erratum: ensemble-distributed approach in classification problem solution for intrusion detection systems. In: Corchado, E., Lozano, J.A., Quintián, H., Yin, H. (eds.) IDEAL 2014. LNCS, vol. 8669, p. E1. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10840-7_60

    Google Scholar 

  13. Enache, C., Patriciu, V.V.: Intrusions detection based on support Vector machine optimized with swarm intelligence. In: 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI), pp. 153–158, May 2014

    Google Scholar 

  14. Panda, M., Abraham, A., Patra, M.R.: A hybrid intelligent approach for network intrusion detection. Procedia Eng 30, 1–9 (2012). International Conference on Communication Technology and System Design 2011. http://www.sciencedirect.com/science/article/pii/S1877705812008375

    Article  Google Scholar 

  15. Koc, L., Mazzuchi, T.A., Sarkani, S.: A network intrusion detection system based on a hidden Naive Bayes multiclass classier. Expert Syst. Appl. 39(18), 13492–13500 (2012). http://www.sciencedirect.com/science/article/pii/S0957417412008640

    Article  Google Scholar 

  16. Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424–430 (2012). http://www.sciencedirect.com/science/article/pii/S0957417411009948

    Article  Google Scholar 

  17. Sindhu, S.S.S., Geetha, S., Kannan, A.: Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst. Appl. 39(1), 129–141 (2012). http://www.sciencedirect.com/science/article/pii/S0957417411009080

    Article  Google Scholar 

  18. Bahri, E., Harbi, N., Huu, H.N.: Approach based ensemble methods for better and faster intrusion detection. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 17–24. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21323-6_3

    Chapter  Google Scholar 

  19. Murphy, K.P.: Learning Machine: A Probabilistic Perspective. The MIT Press, Cambridge (2012)

    MATH  Google Scholar 

  20. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001). http://www.cs.colorado.edu/grudic/teaching/CSCI5622-2004/RandomForests-ML-Journal.pdf

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manjula C. Belavagi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Belavagi, M.C., Muniyal, B. (2017). Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6898-0_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6897-3

  • Online ISBN: 978-981-10-6898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics