Deploying and Analyzing Classification Algorithms for Intrusion Detection

Himanshu Pandey, Saumya Bhadauria
{"title":"Deploying and Analyzing Classification Algorithms for Intrusion Detection","authors":"Himanshu Pandey, Saumya Bhadauria","doi":"10.1109/IATMSI56455.2022.10119264","DOIUrl":null,"url":null,"abstract":"Intrusion Detection Systems that use anomaly de-tection can detect unknown assaults, but they are less accurate, resulting in many false alarms. In this paper, machine learning techniques are examined in order to create IDSs that may be used in existing computer networks. In order to improve detection quality, a three-step optimization technique is first provided: 1) rebalancing the dataset with augmented data, 2) optimizing model performance, and 3) integrating the results of the best models through ensemble learning. This method has problems because the models are trained on previously known assaults and so do not do anomaly detection. To solve the existing issues, we studied the accuracy, sensitivity, roc curve, false positive rate of various binary and multi-class classifiers like KNN, Linear SVM, Quadratic SVM, multi-layer perceptron(MLP), and some other general classification algorithms, which inferred to us that some advancements could be made to the existing models. We developed a new and better LSTM (Long Short Term Memory) technique, a deep learning technique for recognizing attacks and storing them in long-term memory in order to counter future attacks.","PeriodicalId":221211,"journal":{"name":"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IATMSI56455.2022.10119264","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Intrusion Detection Systems that use anomaly de-tection can detect unknown assaults, but they are less accurate, resulting in many false alarms. In this paper, machine learning techniques are examined in order to create IDSs that may be used in existing computer networks. In order to improve detection quality, a three-step optimization technique is first provided: 1) rebalancing the dataset with augmented data, 2) optimizing model performance, and 3) integrating the results of the best models through ensemble learning. This method has problems because the models are trained on previously known assaults and so do not do anomaly detection. To solve the existing issues, we studied the accuracy, sensitivity, roc curve, false positive rate of various binary and multi-class classifiers like KNN, Linear SVM, Quadratic SVM, multi-layer perceptron(MLP), and some other general classification algorithms, which inferred to us that some advancements could be made to the existing models. We developed a new and better LSTM (Long Short Term Memory) technique, a deep learning technique for recognizing attacks and storing them in long-term memory in order to counter future attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
入侵检测分类算法的部署与分析
采用异常检测的入侵检测系统可以检测到未知的攻击,但检测的准确性较低,容易产生误报。在本文中,为了创建可用于现有计算机网络的ids,研究了机器学习技术。为了提高检测质量,首先提出了一种三步优化技术:1)用增强数据重新平衡数据集,2)优化模型性能,3)通过集成学习整合最佳模型的结果。这种方法存在问题,因为模型是在先前已知的攻击上训练的,因此不进行异常检测。为了解决存在的问题,我们研究了KNN、Linear SVM、Quadratic SVM、multi-layer perceptron(MLP)等各种二分类器和多分类器的准确率、灵敏度、roc曲线、假阳性率等一些通用分类算法,这给我们提供了一些可以改进现有模型的推断。我们开发了一种新的更好的LSTM(长短期记忆)技术,这是一种用于识别攻击并将其存储在长期记忆中以应对未来攻击的深度学习技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Hardware and Software Development of a Small Scale Driverless Vehicle A Study on The Impact of Road Traffic Congestion at Vadapalani-Chennai Agrobot- An IoT-Based Automated Multi-Functional Robot Additional Reviewers Subcarrier Selection and User Matching Technique for Downlink NOMA System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1