Network intrusion detection system using an optimized machine learning algorithm

IF 0.6 Q3 ENGINEERING, MULTIDISCIPLINARY Mehran University Research Journal of Engineering and Technology Pub Date : 2023-01-01 DOI:10.22581/muet1982.2301.14
Abdulatif Alabdulatif, S. Rizvi
{"title":"Network intrusion detection system using an optimized machine learning algorithm","authors":"Abdulatif Alabdulatif, S. Rizvi","doi":"10.22581/muet1982.2301.14","DOIUrl":null,"url":null,"abstract":"The rapid growth of the data-communications network for real-world commercial applications requires security and robustness. Network intrusion is one of the most prominent network attacks. Moreover, the variants of network intrusion have also been extensively reported in the literature. Network Intrusion Detection Systems (NIDS) have already been devised and proposed in the literature to handle this issue. In the recent literature, Kitsune, NIDS, and its dataset have received approx. 500 citations so far in 2019. But, still, the comprehensive parametric evaluation of this dataset using a machine learning algorithm was missing in the literature that could submit the best algorithm for network intrusion attack detection and classification in Kitsune. In this connection, two previous studies were reported to investigate the best machine algorithm (these two studies were reported by us). Through these studies, it was concluded that the Tree algorithm and its variants are best suited to detect and classify all eight types of network attacks available in the Kitsune dataset. In this study, the hyper-parameter optimization of the optimized Tree algorithm is presented for all eight types of network attack. In this study, the optimizer functions Bayesian, Grid Search, and Random Search were chosen. The performance has been ranked based on training and testing accuracy, training and testing cost, and prediction speed for each optimizer. This study will submit the best point hyper-parameter for the respective epoch against each optimizer.","PeriodicalId":44836,"journal":{"name":"Mehran University Research Journal of Engineering and Technology","volume":" ","pages":""},"PeriodicalIF":0.6000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mehran University Research Journal of Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22581/muet1982.2301.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid growth of the data-communications network for real-world commercial applications requires security and robustness. Network intrusion is one of the most prominent network attacks. Moreover, the variants of network intrusion have also been extensively reported in the literature. Network Intrusion Detection Systems (NIDS) have already been devised and proposed in the literature to handle this issue. In the recent literature, Kitsune, NIDS, and its dataset have received approx. 500 citations so far in 2019. But, still, the comprehensive parametric evaluation of this dataset using a machine learning algorithm was missing in the literature that could submit the best algorithm for network intrusion attack detection and classification in Kitsune. In this connection, two previous studies were reported to investigate the best machine algorithm (these two studies were reported by us). Through these studies, it was concluded that the Tree algorithm and its variants are best suited to detect and classify all eight types of network attacks available in the Kitsune dataset. In this study, the hyper-parameter optimization of the optimized Tree algorithm is presented for all eight types of network attack. In this study, the optimizer functions Bayesian, Grid Search, and Random Search were chosen. The performance has been ranked based on training and testing accuracy, training and testing cost, and prediction speed for each optimizer. This study will submit the best point hyper-parameter for the respective epoch against each optimizer.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络入侵检测系统采用优化的机器学习算法
用于现实世界商业应用的数据通信网络的快速增长需要安全性和稳健性。网络入侵是最突出的网络攻击之一。此外,网络入侵的变体也在文献中得到了广泛报道。网络入侵检测系统(NIDS)已经在文献中被设计和提出来处理这个问题。在最近的文献中,Kitsune、NIDS及其数据集在2019年迄今已收到约500次引用。但是,使用机器学习算法对该数据集进行综合参数评估的文献仍然缺失,该文献可以为Kitsune的网络入侵攻击检测和分类提供最佳算法。在这方面,据报道,之前的两项研究是为了研究最佳机器算法(这两项研究由我们报道)。通过这些研究,得出的结论是,Tree算法及其变体最适合检测和分类Kitsune数据集中可用的所有八种类型的网络攻击。在本研究中,针对所有八种类型的网络攻击,提出了优化树算法的超参数优化。在本研究中,选择了优化器函数贝叶斯、网格搜索和随机搜索。性能已经根据每个优化器的训练和测试准确性、训练和测试成本以及预测速度进行了排名。本研究将针对每个优化器提交相应历元的最佳点超参数。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
76
审稿时长
40 weeks
期刊最新文献
Heat transfer augmentation through engine oil-based hybrid nanofluid inside a trapezoid cavity Sustainable natural dyeing of cellulose with agricultural medicinal plant waste, new shades development with nontoxic sustainable elements Fabrication of low-cost and environmental-friendly EHD printable thin film nanocomposite triboelectric nanogenerator using household recyclable materials Compositional analysis of dark colored particulates homogeneously emitted with combustion gases (dark plumes) from brick making kilns situated in the area of Khyber Pakhtunkhwa, Pakistan Biosorption studies on arsenic (III) removal from industrial wastewater by using fixed and fluidized bed operation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1