A comparative analysis of undersampling techniques for network intrusion detection systems design

نویسندگان

چکیده

Intrusion Detection Systems (IDS) figure as one of the leading solutions adopted in network security area to prevent intrusions and ensure data services security. However, this issue requires IDS be assertive efficient processing time. Undersampling techniques allow classifiers evaluated from smaller subsets a representative manner, aiming high metrics less There are several literature for projects, but some criteria not respected, such adoption replicable methodology. In work, we selected three undersampling methodologies: random, Cluster centroids, NearMiss two novel unbalanced datasets (CIC2017 CIC2018) comparison between five using cross-validation Wilcoxon statistical test. Our main contribution is systematic methodology subsampling balance sets project. We choose classifier's choice an design: accuracy, f1-measure, The results indicate that under-sampling by centroids presents best performance when applied distance-based classifiers. Moreover, influence process choosing classifier design IDS.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Neural Network Techniques for Improved Intrusion Detection in Communication Systems

In this paper we discuss the main research approaches in the development of automated and systematic methods for intrusion detection. In this critical overview, the key concept underlying the presented intrusion detection systems is that they involve pattern analysis techniques to discover consistent and useful patterns of system features that describe program and user behaviour, and the set of...

متن کامل

Data Mining Techniques for (Network) Intrusion Detection Systems

In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In this paper, we are mostly focused on data mining techniques that are being used for such purposes. We debate on the advantages and disadvantages of thes...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

Machine Learning Techniques for Network Intrusion Detection

Most of the currently available network security techniques are not able to cope with the dynamic and increasingly complex nature of cyber attacks on distributed computer systems. Therefore, an automated and adaptive defensive tool is imperative for computer networks. Alongside the existing prevention techniques such as encryption and firewalls, Intrusion Detection System (IDS) has established ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Communication and Information Systems

سال: 2021

ISSN: ['1980-6604', '1980-6612']

DOI: https://doi.org/10.14209/jcis.2021.3