2023
DOI: 10.3390/app13127328
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Algorithms for Raw and Unbalanced Intrusion Detection Data in a Multi-Class Classification Problem

Abstract: Various machine learning algorithms have been applied to network intrusion classification problems, including both binary and multi-class classifications. Despite the existence of numerous studies involving unbalanced network intrusion datasets, such as CIC-IDS2017, a prevalent approach is to address the issue by either merging the classes to optimize their numbers or retaining only the most dominant ones. However, there is no consistent trend showing that accuracy always decreases as the number of classes inc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 48 publications
1
2
0
Order By: Relevance
“…However, it suffers from the same limitation of false alarm rate and detection rate optimization. Similar weaknesses are noticeable in the papers of A. Fatani et al [15], M. Bacevicius et al [16], and H. Alshahrani et al [17]. This paper presents a unique approach to discovering the balance between intrusion detection and false positive rates.…”
Section: Literature Reviewsupporting
confidence: 61%
“…However, it suffers from the same limitation of false alarm rate and detection rate optimization. Similar weaknesses are noticeable in the papers of A. Fatani et al [15], M. Bacevicius et al [16], and H. Alshahrani et al [17]. This paper presents a unique approach to discovering the balance between intrusion detection and false positive rates.…”
Section: Literature Reviewsupporting
confidence: 61%
“…IoT-Based Network Intrusion Detection Systems ((References: [54,58,62,63,64,65,66,67,68,69,99,100,101]) Disparate Membership Inference Attacks (Reference: [35]) Analysis of Open Source Datasets for IDS (Reference: [23,27]) Hybrid Deep Learning Model for IDS (Reference: [32]) Smart Home Anomaly-Based IDS ( Reference: [36]) The research articles meticulously examined in this study have been judiciously classified according to their quartile rankings, providing invaluable insights into the academic influence and eminence of these esteemed publications. The quartile categorization, elegantly portrayed in Fig.…”
Section: ) Cluster 4: Other Topicsmentioning
confidence: 99%
“…The essay successfully highlights the need to handle the dataset difficulties in anomaly detection as a whole, however it might be strengthened by elaborating on several points. This research paper [23] presents a comprehensive examination of the categorization of IDS with regards to their architecture, detection techniques, decision-making processes, and localization. This research covers a range of IDS methods that are based on ML techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Among the wide variety of ANNs, feed-forward networks were used in this study, particularly following a model-averaged neural network (avNNet) [58,59]. The idea be-hind avNNet is to train multiple neural network models with different configurations or initializations, and then average their predictions to obtain a more robust and accurate final prediction.…”
Section: Artificial Neural Network (Ann)mentioning
confidence: 99%