Journal of Information Security

Volume 11, Issue 1 (January 2020)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Comparing the Area of Data Mining Algorithms in Network Intrusion Detection

HTML  XML Download Download as PDF (Size: 4062KB)  PP. 1-18  
DOI: 10.4236/jis.2020.111001    926 Downloads   2,256 Views  Citations

ABSTRACT

The network-based intrusion detection has become common to evaluate machine learning algorithms. Although the KDD Cup’99 Dataset has class imbalance over different intrusion classes, still it plays a significant role to evaluate machine learning algorithms. In this work, we utilize the singular valued decomposition technique for feature dimension reduction. We further reconstruct the features form reduced features and the selected eigenvectors. The reconstruction loss is used to decide the intrusion class for a given network feature. The intrusion class having the smallest reconstruction loss is accepted as the intrusion class in the network for that sample. The proposed system yield 97.90% accuracy on KDD Cup’99 dataset for the stated task. We have also analyzed the system with individual intrusion categories separately. This analysis suggests having a system with the ensemble of multiple classifiers; therefore we also created a random forest classifier. The random forest classifier performs significantly better than the SVD based system. The random forest classifier achieves 99.99% accuracy for intrusion detection on the same training and testing data set.

Share and Cite:

Alagrash, Y. , Drebee, A. and Zirjawi, N. (2020) Comparing the Area of Data Mining Algorithms in Network Intrusion Detection. Journal of Information Security, 11, 1-18. doi: 10.4236/jis.2020.111001.

Cited by

[1] Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis
Machine Learning for Cyber Security: 4th International …, 2023
[2] Intelligent robot navigation system based on data mining algorithm
… Seminar on Artificial Intelligence, Networking, and …, 2023
[3] Smart community security management system based on big data mining algorithm
2022
[4] Optimization Analysis of Public Policy Online Voting System Based on Data Mining Algorithm
2022 3rd International Conference on Big Data …, 2022
[5] Implementation of parallelization of data mining algorithms based on big data and cloud computing
… on Forthcoming Networks and Sustainability (FoNeS …, 2022
[6] Construction of German Machine Intelligent Translation System Based on Data Mining Algorithm
International Transactions on Electrical Energy …, 2022
[7] Research on Data Mining Algorithm of Associated User Network Based on Multi-Information Fusion
Journal of Sensors, 2022
[8] Analysis on the Educational Value of Winter Olympic Spirit in Track and Field Teaching Based on Data Mining under Artificial Intelligence
Journal of …, 2022
[9] Evaluation of machine learning approaches for sensor-based human activity recognition
International Journal of Nonlinear …, 2022
[10] Data Security Detection and Location Technology Based on DLP Network
The 2021 International …, 2022
[11] Construction of Network Data Security Detection System Based on Data Mining Algorithm
The 2021 International …, 2022
[12] Campus Network Intrusion Detection Method Based on Convolutional Neural Network in Big Data Environment
Application of Intelligent Systems in Multi-modal …, 2022
[13] Network Intrusion Detection Method Based on Improved CNN in Internet of Things Environment
Mobile Information Systems, 2022
[14] The Diminished Importance of Connection-based Features in Intrusion Detection
2021 IEEE International …, 2021
[15] Intelligent Network Intrusion Prevention Feature Collection and Classification Algorithms
2021
[16] Machine Learning Based on User Behavior as a Resource Utilization to Detect Malware
2020
[17] SAAE-DNN: Deep Learning Method on Intrusion Detection
2020

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.