Information security is one of the important issues to protect data or information from unauthorized access. Classification techniques play very important role in information security to classify data as legitimate or normal data. Nowadays, network traffic includes large amount of irrelevant information that increases complexity of classifier and affect the classification result, so we need to develop robust model that can classify the data with high accuracy. In this paper, various types of classification techniques are applied on NSL-KDD data with Tenfold cross-validation technique in two different viewpoints. First, the classification techniques are applied for two class problem as binary classification (normal and attack), and second, it is applied for five class problem as multiclass classification. Empirical result shows that random forest technique outperforms in case of two class problem as well as five class problem on NSL-KDD data set. Due to large amount of redundant data, we have also applied feature selection techniques on random forest tree model which is best model as binary classifier as well as multiclass classifier. Model produces highest accuracy with 15 features in case of binary classification. Performance of the various models are also evaluated using other performance measures like true-positive rate (TPR), false-positive rate (FPR), precision, F-measure and receiver operating characteristic (ROC) curve and the results are found to be satisfactory.
[1]
John Wang,et al.
Data Mining: Opportunities and Challenges
,
2003
.
[2]
Neelam Sharma,et al.
INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION
,
2012
.
[3]
Yun Zhang,et al.
A New Method of Feature Selection for Flow Classification
,
2012
.
[4]
Jiawei Han,et al.
Data Mining: Concepts and Techniques
,
2000
.
[5]
Shahram Sarkani,et al.
A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
,
2012,
Expert Syst. Appl..
[6]
Shailesh Singh Panwar.
Data Reduction and Neural Networking Algorithms to Improve Intrusion Detection System with NSL-KDD Dataset
,
2015
.
[7]
Mircea Gh. Negoita.
Book review of "Data mining methods for knowledge discovery by K. Cios, W. Pedrycz and R. Swiniarski" Kluwer. 1998
,
2000,
SKDD.