Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Due to an exponential increase in the number of cyber-attacks, the need for improved Intrusion Detection Systems (IDS) is apparent than ever. In this regard, Machine Learning (ML) techniques are playing a pivotal role in the early classification of the attacks in case of intrusion detection within the system. However, due to the large number of algorithms available, the selection of the right method is a challenging task. To resolve this issue, this paper analyses some of the current state-of-the-art intrusion detection methods and discusses their pros and cons. Further, a review of different ML methods is carried out with four methods showing to be the most suitable one for classifying attacks. Several algorithms are selected and investigated to evaluate the performance of IDS. These IDS classifies binary and multiclass attacks in terms of detecting whether or not the traffic has been considered as benign or an attack. The experimental results demonstrate that binary classification has greater consistency in their accuracy results which ranged from 0.9938 to 0.9977, while multiclass ranges from 0.9294 to 0.9983. However, it has been also observed that multiclass provides the best results with the algorithm k-Nearest neighbor giving an accuracy score of 0.9983 while the binary classification highest score is 0.9977 from Random Forest. The experimental results demonstrate that multiclass classification produces better performance in terms of intrusion detection by specifically differentiating between the attacks and allowing a more targeted response to an attack.

[1]  Wadii Boulila,et al.  A Novel CNN-LSTM-based Approach to Predict Urban Expansion , 2021, Ecol. Informatics.

[2]  Zhuo Zou,et al.  A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network , 2020, IEEE Access.

[3]  Wadii Boulila,et al.  Voting Classifier-based Intrusion Detection for IoT Networks , 2021, Advances on Smart and Soft Computing.

[4]  Marc Frappier,et al.  Intrusion Detection Systems: A Cross-Domain Overview , 2019, IEEE Communications Surveys & Tutorials.

[5]  Mark A. Hall,et al.  Correlation-based Feature Selection for Machine Learning , 2003 .

[6]  Wadii Boulila,et al.  Detecting the Security Level of Various Cryptosystems Using Machine Learning Models , 2021, IEEE Access.

[7]  Kelly O. Finnerty,et al.  Cyber Security Breaches Survey 2020 , 2019 .

[8]  N. Japkowicz Why Question Machine Learning Evaluation Methods ? ( An illustrative review of the shortcomings of current methods ) , 2006 .

[9]  Arshad,et al.  Intrusion Detection and Attack Classification Leveraging Machine Learning Technique , 2020, 2020 14th International Conference on Innovations in Information Technology (IIT).

[10]  Peter Christen,et al.  A note on using the F-measure for evaluating record linkage algorithms , 2017, Statistics and Computing.

[11]  M. Rege,et al.  Machine Learning for Cyber Defense and Attack , 2018 .

[12]  Pekka Matilainen,et al.  Evaluation of the confusion matrix method in the validation of an automated system for measuring feeding behaviour of cattle , 2018, Behavioural Processes.

[13]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.

[14]  A. N. Zincir-Heywood,et al.  Intrusion Detection Systems , 2008 .

[15]  Arshad,et al.  Network Intrusion Detection Leveraging Machine Learning and Feature Selection , 2020, 2020 IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET).

[16]  Hafiz Adnan Niaz,et al.  Accelerated GPU Based Protein Sequence Alignment – An optimized database sequences approach , 2017 .

[17]  Imed Romdhani,et al.  Big data and IoT-based applications in smart environments: A systematic review , 2021, Comput. Sci. Rev..

[18]  Fuad A. Ghaleb,et al.  RS-DCNN: A novel distributed convolutional-neural-networks based-approach for big remote-sensing image classification , 2021, Comput. Electron. Agric..

[19]  Aladdin Ayesh,et al.  Intelligent intrusion detection systems using artificial neural networks , 2018, ICT Express.

[20]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[21]  Jawad Ahmad,et al.  A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things , 2021, IEEE Access.