Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning

نویسندگان

چکیده

Cyberattacks have increased in tandem with the exponential expansion of computer networks and network applications throughout world. In this study, we evaluate compare four features selection methods, seven classical machine learning algorithms, deep algorithm on one million random instances CSE-CIC-IDS2018 big data set for intrusions. The dataset was preprocessed cleaned all algorithms were trained original values features. feature methods highlighted importance related to forwarding direction (FWD) two flow measures (FLOW) predicting binary traffic type; benign or attack. Furthermore, results revealed that whether models are top 30 selected by any techniques used experiment, there is no significant difference model performance. Moreover, may be able train ML only them perform similarly data,which result preferable terms complexity, explainability, scale deployment. choosing unanimity instead features, training time reduced from 10% 50%

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Machine Learning for Network Intrusion Detection

Cyber security is an important and growing area of data mining and machine learning applications. We address the problem of distinguishing benign network traffic from malicious network-based attacks. Given a labeled dataset of some 5M network connection traces, we have implemented both supervised (Decision Trees, Random Forests) and unsupervised (Local Outlier Factor) learning algorithms to sol...

متن کامل

Machine Learning for Network Intrusion Detection

3 Reviewed Work 2 3.1 Machine Learning in Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3.1.1 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3.1.2 Methods and Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3.2 Active Learning for Network Intrusion Detection . . . . . . . ...

متن کامل

Machine Learning in Network Intrusion Detection

Network security is of great importance to individuals and organizations. Advanced technologies have been developed to protect both incoming and outgoing traffic, e.g. encryption of sensitive information, firewalls to block risky traffic. However, traditional firewalls and Intrusion Detection System (IDS) identify and block suspicious traffic based on preconfigured rules, traffic signatures as ...

متن کامل

Machine Learning in Network Intrusion Detection System

During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP’99 is the mostly widely used data set for the evaluation of these systems. As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a cr...

متن کامل

Machine Learning for Network Intrusion Detection

In recent years, networks have become an increasingly valuable target of malicious attacks due to the increased amount of user data they contain. In defense, Network Intrusion Detection Systems (NIDSs) have been developed to detect and report suspicious activity (i.e. an attack). In this project, we explore unsupervised learning techniques for building NIDs, which only analyze unencrypted packe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of interactive mobile technologies

سال: 2022

ISSN: ['1865-7923']

DOI: https://doi.org/10.3991/ijim.v16i14.30197