Effective Machine Learning Classifiers for Intrusion Detection in Computer Network

Authors

  • Kayode A. Okewale Department of Computer and Information Science, Northumbria University, Newcastle
  • Ifedotun R. Idowu Department of Computer Science, Federal College of Animal Health & Production Technology, Ibadan, Nigeria
  • Bamidele S. Alobalorun Department of Computer Science, Kwara State University, Malete, Ilorin, Nigeria
  • Falilat A. Alabi Department of Computer Science, Federal College of Animal Health & Production Technology, Ibadan, Nigeria

Keywords:

CART, Chi-Square, Computer Networks, IDS, KNN, MLR, NSL, KDD, CUP

Abstract

Cyber security has finally become inevitable due to the increase in use of internet and computer networks. This has given access to cyber-attacks in the network services. However, Intrusion detection systems (IDSs) have been incorporated into networks so as to overcome these huge challenges. IDSs are capable of identifying malicious or abnormal activity in the network and draw the attention of the network administrator to it. Furthermore, approaches based on machine learning (ML) are able to increase IDS effectiveness. In this study, the NSL-KDD CUP dataset was used to develop and validate three individual models using three supervised machine learning algorithms: Classification and Regression Tree (CART), Multinomial Logistics Regression (MLR), and K-Nearest Neighbor (KNN).Data preprocessing and Feature Selection was initiated in order to remove outliers and imbalance in the dataset and optimally select the best feature to avoid data redundancy. Performance evaluation was conducted on each of the model developed with the following metrics as training time, precision accuracy, sensitivity, , f-Score and specificity, The evaluation`s final findings indicate that KNN is the most effective classifier, with a classification accuracy of 99.38% and a training time of 13.64 seconds with the lowest error rate (0.006161), making it the best model and encouraging further study.

 

References

Kizza, Joseph. Guide to Computer Network Security. 10.1007/978-3-319-55606-2,2017.

Jyothsna, V., & Munivara Prasad, K. (2020). Anomaly-Based Intrusion Detection System. Computer and Network Security. doi: 10.5772/intechopen.8228, 2017

Abduvaliyev, A. S. K. Pathan, J. Zhou, R. Roman, and W. C. Wong,(2021) “On the vital areas of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys Tutorials, vol. 15, no. 3, pp. 1223–1237, 2017

Olofintuyi, S.S. & Omotehinwa, T.O. Performance Evaluation of Supervised Ensemble Cyber Situation Perception Models for Computer Network. Computing, Information Systems, Development Informatics & Allied Research Journal. Vol 11 No 2, Pp 1-.14. DOI Affix - https://doi.org/ 10.22624/AIMS/CISDI/V12N1P1. Available online at www.computing-infosystemsjournal.info, 2021

Ahanger, A.S., Khan, S.M., & Masoodi, F. An Effective Intrusion Detection System using Supervised Machine Learning Techniques. 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), 1639-1644, 2021

Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali "Review Paper on Shallow Learning and Deep Learning Methods for Network security." International Journal of Scientific Research in Computer Science and Engineering 6.5 (2018): 45-54.

Maimuna Yusuf Ma`aji and Muhammad Sirajo Ali,Models Comparison Based On Intrusion Detection Using Machine Learning,Sule Lamido University Journal of Science &Technology Vol. 6No. 1&2, pp. 74-86https://doi.org/10.56471/slujst.v6i.358.Online ISSN: 2736-0903 PrintISSN: 2736-089Xwww.slujst.edu.ng.,2023

.Iram Abrar, Zahrah Ayub, Faheem Masoodi and Kashmir, Jammu & Kashmir ‘‘A Machine Learning Approach for Intrusion Detection System on NSL-KDD Dataset’’ Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020) IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9, 2020

Soe,Y.N; Santosa P.I.; and Hartanto,R. ( "DDoS Attack Detection Based on Simple ANN with SMOTE for IoT Environment," 2019 Fourth International Conference on Informatics and Computing (ICIC), Semarang, Indonesia, pp. 1-5, doi: 10.1109/ICIC47613.2019.8985853,2019

Diro AA, Chilamkurti N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems 82:761–768 DOI 10.1016/j.future.2017.08.043.

J. Dhiviya Rose, Isha Mittal, Ramya Mihir "Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool." International Journal of Scientific Research in Computer Science and Engineering 10.2 (2022): 64-68.

Elbasiony M., Reda, et al. “A hybrid network intrusion detection framework based on random forests and weighted k-means,” Ain Shams Engineering Journal, Vol. 4, No. 4, pp.753-762, 2020

Roopak, M., Tian G.Y and Chambers J."An Intrusion Detection System Against DDoS Attacks in IoT Networks," 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 0562-0567, doi: 10.1109/CCWC47524.2020.9031206, 2020

Eduardo K. Viegas, Altair O. Santin and Luiz S. Oliveira. “Toward a reliable anomaly-based intrusion detection in real-world environments,” Computer Networks, Vol. 127, pp. 200-216,2017

T. Parvin, T. Nasrin, J. Khatun, M. Chatterjee "Predictive Machine Learning Model for Detection and Classification of Diabetes." International Journal of Scientific Research in Multidisciplinary Studies 7.9 (2021):11-17.

Dhakne, A.R., Chatur, P.N. A Comprehensive Survey on Intrusion Detection Systems in Wireless Sensor Network. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_65,2016

Mehmood, T., &Rais, H. B. M. “Machine learning algorithms in context of intrusion detection.” International Conference on Computer and Information Sciences (ICCOINS): 369-373, 2016

Idowu, I. R., Adeniji, O. D., Okewale, K., &Alabi, F. A. Detection of Cyberbullying in the Social Media Space using Maximum Entropy and Convolutional Neural Network. Journal of Engineering Research and Reports, 23(2), 40-48. https://doi.org/10.9734/jerr/2022/v23i217595, 2022

Alqahtani, H., Sarker, I. H., Kalim, A., Minhaz Hossain, S. M., Ikhlaq, S., & Hossain, S. Cyber intrusion detection using machine learning classification techniques. In N. Chaubey, S. Parikh, & K. Amin (Eds.), Computing Science, Communication and Security: First International Conference, COMS2 2020 Gujarat, India, March 26–27, , Revised Selected Papers (pp. 121-131). (Communications in Computer and Information Science; Vol. 1235 CCIS). Springer, Springer Nature. https://doi.org/10.1007/978-981-15-6648-6_10, 2020

OOthman, S. M., Ba-Alwi, F. M., Alsohybe, N. T., & Al-Hashida, A. Y. “Intrusion detection model using machine learning algorithm on Big Data environment. ”Journal of Big Data 5(1): 34.201

Awotunde J.B.,Ajagbe S.A, IdowuI.R., Ndunagu J.N. .An Enhanced Cloud-IoMT-based and Machine Learing for effective COVID-19 Diagniosis System.In :Al-TurjmanF.;Nayyar A.., Devi A., Shukla P.K.(eds) Intelligence of Things: AI-IoT Based Critical-Applications and Innovations. Springer,Cham. https://doi.org/10.1007/978-3-030-82800-4_3, 2021.

Downloads

Published

2023-04-30

How to Cite

[1]
K. A. Okewale, I. R. Idowu, B. S. Alobalorun, and F. A. Alabi, “Effective Machine Learning Classifiers for Intrusion Detection in Computer Network”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 11, no. 2, pp. 14–22, Apr. 2023.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.