Journal of Machine and Computing


A Comparative Study of Machine Learning Algorithms on Intrusion Detection System



Journal of Machine and Computing

Received On : 30 December 2021

Revised On : 25 February 2022

Accepted On : 05 March 2022

Published On : 05 April 2022

Volume 02, Issue 02

Pages : 067-073


Abstract


To detect malicious activity, an intrusion detection system (IDS) automates the procedure of observing and reasoning events that take place in the computer network. The existing intrusion detection system is confined to particular sorts of malicious activity, and it may not be able to identify new types of malicious activity, thus ML techniques were employed to implement the detection system at a faster rate. The intrusion detection system employs ML technologies such as random forest and support vector machines. This system has three main modules: data preparation, feature mapping, modelling and accuracy analyser. In this paper accuracy and sensitivity of both the support vector and random forest algorithms will be compared, with the results verified at a faster rate. The results show that machine learning approaches can aid intrusion detection using a dataset (KDD '99) that also highlights the findings of the prediction model which can differentiate between intrusions and normal connections.


Keywords


Detection, Intrusion, KDD’99, Dataset, Prediction, Attacks


  1. Khraisat, A., Gondal, I., Vamplew, P. et al. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2, 20 (2019). https://doi.org/10.1186/s42400-019-0038-7
  2. Disha, R.A., Waheed, S. Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity 5, 1 (2022). https://doi.org/10.1186/s42400-021-00103-8
  3. Jadhav, A.D., Pellakuri, V. Highly accurate and efficient two phase-intrusion detection system (TP-IDS) using distributed processing of HADOOP and machine learning techniques. J Big Data 8, 131 (2021). https://doi.org/10.1186/s40537-021-00521-y
  4. Gassais, R., Ezzati-Jivan, N., Fernandez, J.M. et al. Multi-level host-based intrusion detection system for Internet of things. J Cloud Comp 9, 62 (2020). https://doi.org/10.1186/s13677-020-00206-6
  5. Khraisat, A., Alazab, A. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecur 4, 18 (2021).https://doi.org/10.1186/s42400-021-00077-7
  6. Seth, S., Singh, G. & Kaur Chahal, K. A novel time efficient learning-based approach for smart intrusion detection system. J Big Data 8, 111 (2021). https://doi.org/10.1186/s40537-021-00498
  7. M. R., G.R., Ahmed, C.M. & Mathur, A. Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. Cybersecur 4, 27 (2021). https://doi.org/10.1186/s42400-021-00095-5
  8. Wu, T., Fan, H., Zhu, H. et al. Intrusion detection system combined enhanced random forest with SMOTE algorithm. EURASIP J. Adv. Signal Process. 2022, 39 (2022). https://doi.org/10.1186/s13634-022-00871-6
  9. Hu, Y., Bai, F., Yang, X. et al. IDSDL: a sensitive intrusion detection system based on deep learning. J Wireless Com Network 2021, 95 (2021). https://doi.org/10.1186/s13638-021-01900-y
  10. Megantara, A.A., Ahmad, T. A hybrid machine learning method for increasing the performance of network intrusion detection systems. J Big Data 8, 142 (2021). https://doi.org/10.1186/s40537-021-00531-w
  11. Steven huang, Kaggle,2019, Https://Www.Kaggle.Com/Datasets/Galaxyh/Kdd-Cup-1999-Data/Metadata,‘Kddcup1999 Data Computer Network Intrusion Detection’

Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Anusha Manjunath Raykar and Ashwini K B, “A Comparative Study of Machine Learning Algorithms on Intrusion Detection System”, Journal of Machine and Computing, vol.2, no.2, pp. 067-073, April 2022. doi: 10.53759/7669/jmc202202009.


Copyright


© 2022 Anusha Manjunath Raykar and Ashwini K B. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.