2018 28th International Conference on Computer Theory and Applications (ICCTA) 2018
DOI: 10.1109/iccta45985.2018.9499140
|View full text |Cite
|
Sign up to set email alerts
|

Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets

Abstract: With the tremendous growth of the Internet and the continuous increase in malicious attacks on corporate networks, Intrusion Detection Systems (IDS) have been designed and adopted by organizations to accurately detect intrusion and other malicious activities. But these IDSs still suffer from setbacks such as False Positives (FP), low detection accuracy and False Negatives (FN). To enhance the performance of IDSs, machine learning classifiers are used to aid detection accuracy and greatly reduce the false posit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 11 publications
1
6
0
Order By: Relevance
“…The LSTM models outperform because LSTM can capture the temporal dependency presented in sequence of packets, while MLP cannot. In addition, our LSTM models outperform the previous works[28,5,30]…”
mentioning
confidence: 67%
See 1 more Smart Citation
“…The LSTM models outperform because LSTM can capture the temporal dependency presented in sequence of packets, while MLP cannot. In addition, our LSTM models outperform the previous works[28,5,30]…”
mentioning
confidence: 67%
“…After publication of UNSW-NB15, there have been many research works to apply myriad of machine learning techniques to the dataset. Suleiman et al applied various classical machine learning algorithms such as Random Forest, K-nearest neighbor, and Support Vector Machine [28]. Among the experiments, J48 and K-NN algorithms were proposed as the most suitable models with high efficiency and accuracy.…”
Section: Network Intrusion Detection Methodsmentioning
confidence: 99%
“…Table 5 presents the accuracy obtained by implementing the proposed T‐SNERF algorithm. Random forest initially obtained 97.60% in Table 3, which increased by 7.46% after using CFS technique, compared to 90.14% in [80]. Also, random forest accuracy has been increased by 2.4% by implementing T‐SNE algorithm prior to the classification to achieve 100% accuracy and 0% FPR using nine features selected using CFS.…”
Section: Resultsmentioning
confidence: 99%
“…Suleiman and Issac [18] attempted to improve the detection performance of intrusion detection systems (IDS) using machine learning. IDS suffers from setbacks such as false positives (FP), low detection accuracy, and false negatives (FN).…”
Section: Related Workmentioning
confidence: 99%