Performance Analysis of Machine Learning Classifiers for Intrusion Detection

Modern tactical wireless network (TWN) communication technologies are not only capable of transmitting voice but also capable of transmitting data. Due to such capabilities, TWN have high security requirements as any security breach can lead to detrimental effects. Hence, securing such an environment is not only a requirement but also a virtual prerequisite to the network centric warfare operational (NCW) theory. One key to securing this environment is to promptly and accurately recognize information warfare attacks directed to the network and respond to them. This is achieved using intrusion detection systems (IDS). However, false detection of nodes in hostile environment remains a major problem that need to be addressed. Recently, machine learning methods and algorithms have shown applicability and are growing research area for cyber security and intrusion detection. Conversely, several decades of research in the field of machine learning have resulted in a multitude of different algorithms for solving a broad range of problems. The question then becomes, which one amongst these machine learning algorithms have the potential to enhance or address IDS issues in TWN. In this paper, seven machine learning classifiers are analyzed; Multi-Layer Perceptron, Bayesian Network, Support Vector Machine (SMO), Adaboost, Random Forest, Bootstrap Aggregation, and Decision Tree (J48). WEKA tool was used to implement and evaluate the classifiers. The results obtained indicate that ensemble-based learning methods outperformed single learning methods when we consider the detection accuracy metrics; AUC, TPR, and FPR. However, ensemble classifiers tend to be slower in in terms of build time and model test time.

[1]  Richard Harang,et al.  Extremely Lightweight Intrusion Detection (ELIDe) , 2013 .

[2]  A. Triulzi Intrusion Detection Systems and IPv 6 , 2003 .

[3]  Chung-Horng Lung,et al.  Evaluation of machine learning techniques for network intrusion detection , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[4]  Franz Pernkopf,et al.  Bayesian network classifiers versus selective k-NN classifier , 2005, Pattern Recognit..

[5]  Steven L. Salzberg,et al.  Book Review: C4.5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993 , 1994, Machine Learning.

[6]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[7]  Izzat Alsmadi,et al.  SDN-Based Real-Time IDS/IPS Alerting System , 2017 .

[8]  S. Selvakumar,et al.  SSENet-2011: A Network Intrusion Detection System dataset and its comparison with KDD CUP 99 dataset , 2011, 2011 Second Asian Himalayas International Conference on Internet (AH-ICI).

[10]  Jaesung Lim,et al.  Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[11]  A. Ayyasamy,et al.  A Novel Ensemble Approach for Effective Intrusion Detection System , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[12]  Alexander J. Smola,et al.  Support Vector Machines and Kernel Algorithms , 2002 .

[13]  Komwut Wipusitwarakun,et al.  Tactical wireless networks: A survey for issues and challenges , 2015, 2015 Asian Conference on Defence Technology (ACDT).

[14]  Sankar K. Pal,et al.  Multilayer perceptron, fuzzy sets, and classification , 1992, IEEE Trans. Neural Networks.

[15]  Jugal K. Kalita,et al.  Packet and Flow Based Network Intrusion Dataset , 2012, IC3.

[16]  Bernhard Schölkopf,et al.  Support Vector Machines and Kernel Algorithms. , 2005 .

[17]  A. Malathi,et al.  A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .

[18]  R. Vijayanand,et al.  Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection , 2018, Comput. Secur..

[19]  Orhan Yaman,et al.  Intrusion detection in computer networks via machine learning algorithms , 2017, 2017 International Artificial Intelligence and Data Processing Symposium (IDAP).

[20]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.