scispace - formally typeset
Open Access

Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context.

Maheshkumar Sabhnani, +1 more
- pp 209-215
Reads0
Chats0
TLDR
Empirical results obtained through simulation indicate that noticeable performance improvement was achieved for probing, denial of service, and user-to-root in the KDD 1999 Cup intrusion detection dataset.
Abstract
A small subset of machine learning algorithms, mostly inductive learning based, applied to the KDD 1999 Cup intrusion detection dataset resulted in dismal performance for user-to-root and remote-to-local attack categories as reported in the recent literature. The uncertainty to explore if other machine learning algorithms can demonstrate better performance compared to the ones already employed constitutes the motivation for the study reported herein. Specifically, exploration of if certain algorithms perform better for certain attack classes and consequently, if a multi-expert classifier design can deliver desired performance measure is of high interest. This paper evaluates performance of a comprehensive set of pattern recognition and machine learning algorithms on four attack categories as found in the KDD 1999 Cup intrusion detection dataset. Results of simulation study implemented to that effect indicated that certain classification algorithms perform better for certain attack categories: a specific algorithm specialized for a given attack category . Consequently, a multi-classifier model, where a specific detection algorithm is associated with an attack category for which it is the most promising, was built. Empirical results obtained through simulation indicate that noticeable performance improvement was achieved for probing, denial of service, and user-to-root

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection

TL;DR: This paper applies Long Short Term Memory (LSTM) architecture to a Recurrent Neural Network (RNN) and train the IDS model using KDD Cup 1999 dataset and confirms that the deep learning approach is effective for IDS.
Journal ArticleDOI

A novel intrusion detection system based on hierarchical clustering and support vector machines

TL;DR: This study proposed an SVM-based intrusion detection system, which combines a hierarchical clustering algorithm, a simple feature selection procedure, and the SVM technique, which showed better performance in the detection of DoS and Probe attacks and the beset performance in overall accuracy.
Journal ArticleDOI

HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection

TL;DR: This paper proposes a novel IDS called the hierarchical spatial-temporal features-based intrusion detection system (HAST-IDS), which first learns the low-level spatial features of network traffic using deep convolutional neural networks (CNNs) and then learns high-level temporal features using long short-term memory networks.
Journal ArticleDOI

Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system

TL;DR: A multi-level hybrid intrusion detection model that uses support vector machine and extreme learning machine to improve the efficiency of detecting known and unknown attacks and a modified K-means algorithm is proposed to build a high-quality training dataset that contributes significantly to improving the performance of classifiers.
Journal ArticleDOI

A Supervised Intrusion Detection System for Smart Home IoT Devices

TL;DR: This paper proposes a three layer intrusion detection system (IDS) that uses a supervised approach to detect a range of popular network based cyber-attacks on IoT networks and demonstrates that the proposed architecture can automatically distinguish between IoT devices on the network, whether network activity is malicious or benign.
References
More filters
Book

Pattern classification and scene analysis

TL;DR: In this article, a unified, comprehensive and up-to-date treatment of both statistical and descriptive methods for pattern recognition is provided, including Bayesian decision theory, supervised and unsupervised learning, nonparametric techniques, discriminant analysis, clustering, preprosessing of pictorial data, spatial filtering, shape description techniques, perspective transformations, projective invariants, linguistic procedures, and artificial intelligence techniques for scene analysis.
Book

Clustering Algorithms

Related Papers (5)