Benchmark Datasets for Network Intrusion Detection: A Review

Network Intrusion Detection is the process of monitoring the events occurring in a computer system or the network and analyzing them for the signs of possible intrusions. An intrusion is a potentially harmful activity of malicious user, aimed at compromising the confidentiality, availability and integrity of the system. Over the decades intrusion detection (ID) problem has been visited by the researchers in various available environments like finite state automata, rule based systems, Markov probabilis-tic approach, statically sought solutions and most popular of all data mining and machine learning techniques. The prerequisite for data mining is that data should be present and there should be some hidden patterns in the data which need to be unearthed. In this work, we intend to provide a thorough review of the benchmark datasets available for Network Intrusion Detection (NID) which researchers in the field can use to train and test their models. In addition, this work as the first of its kind implements k-NN a simple most instance based type of classifier over all the datasets that doesn't require a well planed and monolithic training phase, across different neighborhood sizes. Results show that off all the datasets k-NN performs better on NSL-KDD dataset due to the fact that NSL-KDD doesn't have any redundant network connections and connections being fairly distributed across all the classes.

[1]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[2]  Dr.R Ravinder Reddy Network Intrusion Anomaly Detection Using Radial Basis Function Networks , 2017 .

[3]  Zhang Yi,et al.  A hierarchical intrusion detection model based on the PCA neural networks , 2007, Neurocomputing.

[4]  Keke Gai,et al.  Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.

[5]  Andrew H. Sung,et al.  Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..

[6]  Jugal K. Kalita,et al.  An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection , 2015, Pattern Recognit. Lett..

[7]  A. A. Orunsolu,et al.  An Anti-Phishing Kit Scheme for Secure Web Transactions , 2017, ICISSP.

[8]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[9]  Shahaboddin Shamshirband,et al.  Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..

[10]  Gisung Kim,et al.  A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..

[11]  Jill Slay,et al.  The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..

[12]  Balachandra Muniyal,et al.  Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .

[13]  Jiankun Hu,et al.  Generation of a new IDS test dataset: Time to retire the KDD collection , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Shahram Sarkani,et al.  A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..

[15]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[16]  M. Sugumaran,et al.  A Fusion of Feature Extraction and Feature Selection Technique for Network Intrusion Detection , 2016 .

[17]  Mahesh Chandra Govil,et al.  A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).

[18]  Daniel Kudenko,et al.  Distributed response to network intrusions using multiagent reinforcement learning , 2015, Eng. Appl. Artif. Intell..

[19]  Pei-Chann Chang,et al.  A population-based incremental learning approach with artificial immune system for network intrusion detection , 2016, Eng. Appl. Artif. Intell..

[20]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[21]  S. Janakiraman,et al.  ACO based Distributed Intrusion Detection System , 2009, J. Digit. Content Technol. its Appl..

[22]  C. D. Jaidhar,et al.  Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).

[23]  Adel Sabry Eesa,et al.  A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..