Skip to main content

Performance Analysis of Single- and Ensemble-Based Classifiers for Intrusion Detection

  • Conference paper
  • First Online:
Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1057))

Abstract

The aim of this paper is to analyze the performance of an intrusion detection model using single- and ensemble-based classifiers. Several tree-based single classifiers were analyzed. The ensemble of tree-based classifiers was also analyzed to differentiate the superiority in their performance. Different proportions of the benchmark KDD dataset are utilized for observing the performance of the model. Classification based on the accuracy, model building time, and kappa statistic is evaluated as the performance measures in this paper. The base and ensemble classifiers resulted in better accuracy are observed in the experiments and only Naive Bayes and random tree resulted in minimum model building time. Most of the classifiers produced better results for kappa statistic. The highest statistic is computed for ADA classifier, and lowest error is computed for the random forest ensemble.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Denning, D.E.: An intrusion-detection model. IEEE Trans. Software Eng. 222–232 (1987)

    Article  Google Scholar 

  2. Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16, 507–521 (2007)

    Article  Google Scholar 

  3. Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37, 6225–6232 (2010)

    Article  Google Scholar 

  4. Amor, N.B., Benferhat, S., Elouedi, Z.: Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420–424 (2004)

    Google Scholar 

  5. Sornsuwit, P., Jaiyen, S.: Intrusion detection model based on ensemble learning for u2r and r2l attacks. In: 7th International Conference on Information Technology and Electrical Engineering (ICITEE), IEEE, pp. 354–359 (2015)

    Google Scholar 

  6. Aburomman, A.A., Reaz, M.B.: A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput. Secur. 65, 135–152 (2017)

    Article  Google Scholar 

  7. Amudha, P., Karthik, S., Sivakumari, S.: Intrusion detection based on core vector machine and ensemble classification methods. In: International Conference on Soft-Computing and Networks Security (ICSNS). IEEE, pp. 1–5 (2015)

    Google Scholar 

  8. Roy, S.S., Krishna, P.V., Yenduri, S.: Analyzing intrusion detection system: an ensemble based stacking approach. In: IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 307–309 (2014)

    Google Scholar 

  9. Alotaibi, B., Elleithy, K.: A majority voting technique for wireless intrusion detection systems. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1–6 (2016)

    Google Scholar 

  10. Tama, B.A, Rhee, K.H.: Classifier ensemble design with rotation forest to enhance attack detection of IDS in wireless network. In: 11th Asia Joint Conference on Information Security (Asia JCIS). IEEE, pp. 87–91 (2016)

    Google Scholar 

  11. Wang, Y., Shen, Y., Zhang, G.: Research on intrusion detection model using ensemble learning methods. In: 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 422–425 (2016)

    Google Scholar 

  12. Malhotra S., Bali V., Paliwal, K.K.: Genetic programming and K-nearest neighbour classifier based intrusion detection model. In: 7th International Conference Cloud Computing, Data Science & Engineering-Confluence. IEEE, pp. 42–46 (2017)

    Google Scholar 

  13. Aravind, M.M, Kalaiselvi, V.K.: Design of an intrusion detection system based on distance feature using ensemble classifier. In: 4th International Conference on Signal Processing, Communication and Networking (ICSCN). IEEE, pp. 1–6 (2017)

    Google Scholar 

  14. Kamarudin, M.H., Maple, C., Watson, T., Safa, N.S.: A logitboost-based algorithm for detecting known and unknown web attacks. IEEE Access. 5, 26190–26200 (2017)

    Article  Google Scholar 

  15. Belavagi, M.C., Muniyal, B.: Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput. Sci. 117–123 (2016)

    Article  Google Scholar 

  16. Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comp. Sci. 213–217 (2016)

    Article  Google Scholar 

  17. Quinlan, J.R.: C4. 5: Programs for Machine Learning. Elsevier, Amsterdam (2014)

    Google Scholar 

  18. Domingos, P., Pazzani, M.: On the optimality of the simple Bayesian classifier under zero-one loss. Mach. Learn. 103–130 (1997)

    Google Scholar 

  19. Arora, T., Dhir, R.: Correlation-based feature selection and classification via regression of segmented chromosomes using geometric features. Med. Biol. Eng. Compu. 55, 733–745 (2017)

    Article  Google Scholar 

  20. Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55, 119–139 (1997)

    Article  MathSciNet  Google Scholar 

  21. Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). Ann. Stat. 2, 337–407 (2000)

    Article  Google Scholar 

  22. Breiman, L.: Random forests. Mach. Learn. 4, 5–32 (2001)

    Article  Google Scholar 

  23. Cutler, A., Zhao, G.: Pert-perfect random tree ensembles. Comput. Sci. Stat. 33, 490–497 (2001)

    Google Scholar 

  24. Ruan, Y.X., Lin, H.T., Tsai, M.F.: Improving ranking performance with cost-sensitive ordinal classification via regression. Inf. Retrieval 1–20 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to I. Sumaiya Thaseen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hariharan, R., Sumaiya Thaseen, I., Usha Devi, G. (2020). Performance Analysis of Single- and Ensemble-Based Classifiers for Intrusion Detection. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1057. Springer, Singapore. https://doi.org/10.1007/978-981-15-0184-5_65

Download citation

Publish with us

Policies and ethics