Full Paper View Go Back

Effective Machine Learning Classifiers for Intrusion Detection in Computer Network

Kayode A. Okewale1 , Ifedotun R. Idowu2 , Bamidele S. Alobalorun3 , Falilat A. Alabi4

Section:Research Paper, Product Type: Journal-Paper
Vol.11 , Issue.2 , pp.14-22, Apr-2023


Online published on Apr 30, 2023


Copyright © Kayode A. Okewale, Ifedotun R. Idowu, Bamidele S. Alobalorun, Falilat A. Alabi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kayode A. Okewale, Ifedotun R. Idowu, Bamidele S. Alobalorun, Falilat A. Alabi, “Effective Machine Learning Classifiers for Intrusion Detection in Computer Network,†International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.2, pp.14-22, 2023.

MLA Style Citation: Kayode A. Okewale, Ifedotun R. Idowu, Bamidele S. Alobalorun, Falilat A. Alabi "Effective Machine Learning Classifiers for Intrusion Detection in Computer Network." International Journal of Scientific Research in Computer Science and Engineering 11.2 (2023): 14-22.

APA Style Citation: Kayode A. Okewale, Ifedotun R. Idowu, Bamidele S. Alobalorun, Falilat A. Alabi, (2023). Effective Machine Learning Classifiers for Intrusion Detection in Computer Network. International Journal of Scientific Research in Computer Science and Engineering, 11(2), 14-22.

BibTex Style Citation:
@article{Okewale_2023,
author = {Kayode A. Okewale, Ifedotun R. Idowu, Bamidele S. Alobalorun, Falilat A. Alabi},
title = {Effective Machine Learning Classifiers for Intrusion Detection in Computer Network},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2023},
volume = {11},
Issue = {2},
month = {4},
year = {2023},
issn = {2347-2693},
pages = {14-22},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3093},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3093
TI - Effective Machine Learning Classifiers for Intrusion Detection in Computer Network
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Kayode A. Okewale, Ifedotun R. Idowu, Bamidele S. Alobalorun, Falilat A. Alabi
PY - 2023
DA - 2023/04/30
PB - IJCSE, Indore, INDIA
SP - 14-22
IS - 2
VL - 11
SN - 2347-2693
ER -

163 Views    216 Downloads    32 Downloads
  
  

Abstract :
Cyber security has finally become inevitable due to the increase in use of internet and computer networks. This has given access to cyber-attacks in the network services. However, Intrusion detection systems (IDSs) have been incorporated into networks so as to overcome these huge challenges. IDSs are capable of identifying malicious or abnormal activity in the network and draw the attention of the network administrator to it. Furthermore, approaches based on machine learning (ML) are able to increase IDS effectiveness. In this study, the NSL-KDD CUP dataset was used to develop and validate three individual models using three supervised machine learning algorithms: Classification and Regression Tree (CART), Multinomial Logistics Regression (MLR), and K-Nearest Neighbor (KNN).Data preprocessing and Feature Selection was initiated in order to remove outliers and imbalance in the dataset and optimally select the best feature to avoid data redundancy. Performance evaluation was conducted on each of the model developed with the following metrics as training time, precision accuracy, sensitivity, , f-Score and specificity, The evaluation`s final findings indicate that KNN is the most effective classifier, with a classification accuracy of 99.38% and a training time of 13.64 seconds with the lowest error rate (0.006161), making it the best model and encouraging further study.

Key-Words / Index Term :
CART, Chi-Square, Computer Networks, IDS, KNN, MLR, NSL KDD CUP

References :
[1.] Kizza, Joseph. Guide to Computer Network Security. 10.1007/978-3-319-55606-2,2017.
[2] Jyothsna, V., & Munivara Prasad, K. (2020). Anomaly-Based Intrusion Detection System. Computer and Network Security. doi: 10.5772/intechopen.8228, 2017
[3.] Abduvaliyev, A. S. K. Pathan, J. Zhou, R. Roman, and W. C. Wong,(2021) “On the vital areas of intrusion detection systems in wireless sensor networks,†IEEE Communications Surveys Tutorials, vol. 15, no. 3, pp. 1223–1237, 2017
[4.] Olofintuyi, S.S. & Omotehinwa, T.O. Performance Evaluation of Supervised Ensemble Cyber Situation Perception Models for Computer Network. Computing, Information Systems, Development Informatics & Allied Research Journal. Vol 11 No 2, Pp 1-.14. DOI Affix - https://doi.org/ 10.22624/AIMS/CISDI/V12N1P1. Available online at www.computing-infosystemsjournal.info, 2021
[5] Ahanger, A.S., Khan, S.M., & Masoodi, F. An Effective Intrusion Detection System using Supervised Machine Learning Techniques. 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), 1639-1644, 2021
[6] Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali "Review Paper on Shallow Learning and Deep Learning Methods for Network security." International Journal of Scientific Research in Computer Science and Engineering 6.5 (2018): 45-54.
[7] Maimuna Yusuf Ma`aji and Muhammad Sirajo Ali,Models Comparison Based On Intrusion Detection Using Machine Learning,Sule Lamido University Journal of Science &Technology Vol. 6No. 1&2, pp. 74-86https://doi.org/10.56471/slujst.v6i.358.Online ISSN: 2736-0903 PrintISSN: 2736-089Xwww.slujst.edu.ng.,2023
[8].Iram Abrar, Zahrah Ayub, Faheem Masoodi and Kashmir, Jammu & Kashmir ‘‘A Machine Learning Approach for Intrusion Detection System on NSL-KDD Dataset’’ Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020) IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9, 2020
[9] Soe,Y.N; Santosa P.I.; and Hartanto,R. ( "DDoS Attack Detection Based on Simple ANN with SMOTE for IoT Environment," 2019 Fourth International Conference on Informatics and Computing (ICIC), Semarang, Indonesia, pp. 1-5, doi: 10.1109/ICIC47613.2019.8985853,2019
[10.] Diro AA, Chilamkurti N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems 82:761–768 DOI 10.1016/j.future.2017.08.043.
[11] J. Dhiviya Rose, Isha Mittal, Ramya Mihir "Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool." International Journal of Scientific Research in Computer Science and Engineering 10.2 (2022): 64-68.
[12]Elbasiony M., Reda, et al. “A hybrid network intrusion detection framework based on random forests and weighted k-means,†Ain Shams Engineering Journal, Vol. 4, No. 4, pp.753-762, 2020
[13.] Roopak, M., Tian G.Y and Chambers J."An Intrusion Detection System Against DDoS Attacks in IoT Networks," 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 0562-0567, doi: 10.1109/CCWC47524.2020.9031206, 2020
[14] Eduardo K. Viegas, Altair O. Santin and Luiz S. Oliveira. “Toward a reliable anomaly-based intrusion detection in real-world environments,†Computer Networks, Vol. 127, pp. 200-216,2017
[15] T. Parvin, T. Nasrin, J. Khatun, M. Chatterjee "Predictive Machine Learning Model for Detection and Classification of Diabetes." International Journal of Scientific Research in Multidisciplinary Studies 7.9 (2021):11-17.
[16] Dhakne, A.R., Chatur, P.N. A Comprehensive Survey on Intrusion Detection Systems in Wireless Sensor Network. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_65,2016
[17.] Mehmood, T., &Rais, H. B. M. “Machine learning algorithms in context of intrusion detection.†International Conference on Computer and Information Sciences (ICCOINS): 369-373, 2016
[18.] Idowu, I. R., Adeniji, O. D., Okewale, K., &Alabi, F. A. Detection of Cyberbullying in the Social Media Space using Maximum Entropy and Convolutional Neural Network. Journal of Engineering Research and Reports, 23(2), 40-48. https://doi.org/10.9734/jerr/2022/v23i217595, 2022
[19] Alqahtani, H., Sarker, I. H., Kalim, A., Minhaz Hossain, S. M., Ikhlaq, S., & Hossain, S. Cyber intrusion detection using machine learning classification techniques. In N. Chaubey, S. Parikh, & K. Amin (Eds.), Computing Science, Communication and Security: First International Conference, COMS2 2020 Gujarat, India, March 26–27, , Revised Selected Papers (pp. 121-131). (Communications in Computer and Information Science; Vol. 1235 CCIS). Springer, Springer Nature. https://doi.org/10.1007/978-981-15-6648-6_10., 2020
[20] OOthman, S. M., Ba-Alwi, F. M., Alsohybe, N. T., & Al-Hashida, A. Y. “Intrusion detection model using machine learning algorithm on Big Data environment. â€Journal of Big Data 5(1): 34.201
[21] Awotunde J.B.,Ajagbe S.A, IdowuI.R., Ndunagu J.N. .An Enhanced Cloud-IoMT-based and Machine Learing for effective COVID-19 Diagniosis System.In :Al-TurjmanF.;Nayyar A.., Devi A., Shukla P.K.(eds) Intelligence of Things: AI-IoT Based Critical-Applications and Innovations. Springer,Cham. https://doi.org/10.1007/978-3-030-82800-4_3, 2021.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation