2022
DOI: 10.3991/ijim.v16i14.30197
|View full text |Cite
|
Sign up to set email alerts
|

Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning

Abstract: Cyberattacks have increased in tandem with the exponential expansion of computer networks and network applications throughout the world. In this study, we evaluate and compare four features selection methods, seven classical machine learning algorithms, and the deep learning algorithm on one million random instances of CSE-CIC-IDS2018 big data set for network intrusions. The dataset was preprocessed and cleaned and all learning algorithms were trained on the original values of features. The feature selection m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…To illustrate the efficacy of the approach in terms of intrusion detection, the framework is tested using a variety of simulations using the most recent CICDDoS2019 dataset. The average AWID dataset 98.54% [7] CICIDS2017 dataset 97.16% [8] Simulation dataset of 59,529 95% [9] NSL-KDD dataset 99.02% [10] NSL-KDD dataset 99.76% [11] CICDDoS2019 dataset 94% [12] CSE-CIC-IDS2018 dataset 94 % [13] Phishing dataset 88% [14] Simulation dataset 95.7% detection accuracy of the suggested solution was 94%, with a false alarm rate of 0.0952, and detection rates and precisions of 97.49% and 91.22%, respectively.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…To illustrate the efficacy of the approach in terms of intrusion detection, the framework is tested using a variety of simulations using the most recent CICDDoS2019 dataset. The average AWID dataset 98.54% [7] CICIDS2017 dataset 97.16% [8] Simulation dataset of 59,529 95% [9] NSL-KDD dataset 99.02% [10] NSL-KDD dataset 99.76% [11] CICDDoS2019 dataset 94% [12] CSE-CIC-IDS2018 dataset 94 % [13] Phishing dataset 88% [14] Simulation dataset 95.7% detection accuracy of the suggested solution was 94%, with a false alarm rate of 0.0952, and detection rates and precisions of 97.49% and 91.22%, respectively.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Authors in [12] used CSE-CIC-IDS2018 which is a big data set the feature selection methods has been highlighted, The experiment findings show that random forest, decision tree, KNN, Adaboost, achieved close results with average of 94%.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Network traffic can also be viewed by analyzing network packets. Network packets are a fundamental object that can be analyzed in network forensics, this is done to collect data related to network traffic that can be used as evidence in court [21], [34], [39], [44]. The main threats of injection attacks include theft of credentials, forced access to a system and violation of the integrity of stored data.…”
Section: Dos Injectionmentioning
confidence: 99%
“…However, they have a downside in the form of a high false-positive rate, detecting malicious and unusual traffic across the entire network attack surface. Machine learning involves the development of systems that can learn from data and uncover concealed patterns [7][8][9]. The main challenge lies in efficiently sifting through the abundant data to unearth valuable and relevant information.…”
Section: Background and Related Workmentioning
confidence: 99%