Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Performance Analysis of Anomaly Based Network Intrusion Detection Systems
University of Science and Technology, Chittagong.
University of Science and Technology Chittagong.
University of Science & Technology Chittagong.
University of Science and Technology Chittagong.
Show others and affiliations
2018 (English)In: Proveedings of the 43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops), IEEE Computer Society, 2018Conference paper, Published paper (Refereed)
Abstract [en]

Because of the increased popularity and fast expansion of the Internet as well as Internet of things, networks are growing rapidly in every corner of the society. As a result, huge amount of data is travelling across the computer networks that lead to the vulnerability of data integrity, confidentiality and reliability. So, network security is a burning issue to keep the integrity of systems and data. The traditional security guards such as firewalls with access control lists are not anymore enough to secure systems. To address the drawbacks of traditional Intrusion Detection Systems (IDSs), artificial intelligence and machine learning based models open up new opportunity to classify abnormal traffic as anomaly with a self-learning capability. Many supervised learning models have been adopted to detect anomaly from networks traffic. In quest to select a good learning model in terms of precision, recall, area under receiver operating curve, accuracy, F-score and model built time, this paper illustrates the performance comparison between Naïve Bayes, Multilayer Perceptron, J48, Naïve Bayes Tree, and Random Forest classification models. These models are trained and tested on three subsets of features derived from the original benchmark network intrusion detection dataset, NSL-KDD. The three subsets are derived by applying different attributes evaluator’s algorithms. The simulation is carried out by using the WEKA data mining tool.

Place, publisher, year, edition, pages
IEEE Computer Society, 2018.
Series
Proceedings of the 43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops)
Keywords [en]
Intrusion detection systems, machine learning, NSL-KDD, feature selection, classification model, performance analysis
National Category
Computer Sciences Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
URN: urn:nbn:se:ltu:diva-70317OAI: oai:DiVA.org:ltu-70317DiVA, id: diva2:1237757
Conference
43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops), Chicago, October 1-4, 2018
Projects
A belief-rule-based DSS to assess flood risks by using wireless sensor networks
Funder
Swedish Research Council, 2014-4251Available from: 2018-08-09 Created: 2018-08-09 Last updated: 2018-08-13

Open Access in DiVA

fulltext(306 kB)6 downloads
File information
File name FULLTEXT01.pdfFile size 306 kBChecksum SHA-512
8ef90cfbdcec312ec9a7e2508a685867de8b15faa003224968bdceb7a271cd0cda5683c32304b70e227c40635c60430211197174e01009a96836efe44d690012
Type fulltextMimetype application/pdf

Other links

http://ieeelcn.org

Authority records BETA

Andersson, Karl

Search in DiVA

By author/editor
Hossain, Mohammad ShahadatAndersson, Karl
By organisation
Computer Science
Computer SciencesMedia and Communication Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 6 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 73 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf