Comparison of classification techniques for intrusion detection dataset using WEKA

Tanya Garg, Surinder Singh Khurana
{"title":"Comparison of classification techniques for intrusion detection dataset using WEKA","authors":"Tanya Garg, Surinder Singh Khurana","doi":"10.1109/ICRAIE.2014.6909184","DOIUrl":null,"url":null,"abstract":"As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. Although numerous network security tools have been developed, yet the fast growth of intrusive activities is still a serious issue. Intrusion detection systems (IDSs) are used to detect intrusive activities on the network. Machine learning and classification algorithms help to design “Intrusion Detection Models” which can classify the network traffic into intrusive or normal traffic. In this paper we present the comparative performance of NSL-KDD based data set compatible classification algorithms. These classifiers have been evaluated in WEKA (Waikato Environment for Knowledge Analysis) environment using 41 attributes. Around 94,000 instances from complete KDD dataset have been included in the training data set and over 48,000 instances have been included in the testing data set. Garrett's Ranking Technique has been applied to rank different classifiers according to their performance. Rotation Forest classification approach outperformed the rest.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"44","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRAIE.2014.6909184","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 44

Abstract

As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. Although numerous network security tools have been developed, yet the fast growth of intrusive activities is still a serious issue. Intrusion detection systems (IDSs) are used to detect intrusive activities on the network. Machine learning and classification algorithms help to design “Intrusion Detection Models” which can classify the network traffic into intrusive or normal traffic. In this paper we present the comparative performance of NSL-KDD based data set compatible classification algorithms. These classifiers have been evaluated in WEKA (Waikato Environment for Knowledge Analysis) environment using 41 attributes. Around 94,000 instances from complete KDD dataset have been included in the training data set and over 48,000 instances have been included in the testing data set. Garrett's Ranking Technique has been applied to rank different classifiers according to their performance. Rotation Forest classification approach outperformed the rest.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于WEKA的入侵检测数据集分类技术比较
随着基于网络的应用的快速发展,网络安全机制需要得到更多的关注,以提高速度和精度。新的入侵类型不断发展,对网络安全构成严重威胁。尽管已经开发了许多网络安全工具,但入侵活动的快速增长仍然是一个严重的问题。入侵检测系统(ids)用于检测网络中的入侵行为。机器学习和分类算法有助于设计“入侵检测模型”,将网络流量分为入侵流量和正常流量。本文给出了基于NSL-KDD的数据集兼容分类算法的性能比较。这些分类器在WEKA (Waikato Environment for Knowledge Analysis)环境中使用41个属性进行了评估。来自完整KDD数据集的大约94,000个实例已被包含在训练数据集中,超过48,000个实例已被包含在测试数据集中。加勒特的排名技术被应用于根据不同分类器的表现进行排名。轮作森林分类方法优于其他分类方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
New ISFET interface circuits with noise reduction capability Energy conservation of access point using CAPS algorithms A self explanatory review of decision tree classifiers Mobile sensing platform for non-ionizing radiation measurement Improved Blocking Expanding Ring Search (I-BERS) protocol for energy efficient routing in MANET
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1