Comparison of classification techniques for intrusion detection dataset using WEKA

As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. Although numerous network security tools have been developed, yet the fast growth of intrusive activities is still a serious issue. Intrusion detection systems (IDSs) are used to detect intrusive activities on the network. Machine learning and classification algorithms help to design “Intrusion Detection Models” which can classify the network traffic into intrusive or normal traffic. In this paper we present the comparative performance of NSL-KDD based data set compatible classification algorithms. These classifiers have been evaluated in WEKA (Waikato Environment for Knowledge Analysis) environment using 41 attributes. Around 94,000 instances from complete KDD dataset have been included in the training data set and over 48,000 instances have been included in the testing data set. Garrett's Ranking Technique has been applied to rank different classifiers according to their performance. Rotation Forest classification approach outperformed the rest.

[1]  Deokjai Choi,et al.  Application of Data Mining to Network Intrusion Detection: Classifier Selection Model , 2008, APNOMS.

[2]  S. García,et al.  An Extension on "Statistical Comparisons of Classifiers over Multiple Data Sets" for all Pairwise Comparisons , 2008 .

[3]  Manas Ranjan Patra,et al.  A Comparative Study of Data Mining Algorithms for Network Intrusion Detection , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[4]  Peter A. Flach,et al.  Machine Learning - The Art and Science of Algorithms that Make Sense of Data , 2012 .

[5]  Patrick Henry Winston,et al.  Artificial intelligence (3rd ed.) , 1992 .

[6]  Ranjita Kumari Dash,et al.  Selection Of The Best Classifier From Different Datasets Using WEKA , 2013 .

[7]  Ming-Yang Su,et al.  Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN , 2008, ISI Workshops.

[8]  Daniel T. Larose,et al.  Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .

[9]  Phurivit Sangkatsanee,et al.  Practical real-time intrusion detection using machine learning approaches , 2011, Comput. Commun..

[10]  Mohd Fauzi Othman,et al.  Comparison of different classification techniques using WEKA for breast cancer , 2007 .

[11]  Manas Ranjan Patra,et al.  Ensembling Rule Based Classifiers for Detecting Network Intrusions , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[12]  Subhash C. Bagui,et al.  Combining Pattern Classifiers: Methods and Algorithms , 2005, Technometrics.

[13]  Janez Demsar,et al.  Statistical Comparisons of Classifiers over Multiple Data Sets , 2006, J. Mach. Learn. Res..

[14]  Michael Neethu Classification of Intrusion Detection Dataset using machine learning Approaches , 2012 .

[15]  Neelam Sharma,et al.  INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .