Network Intrusion Detection Using Supervised Machine Learning Technique

Authors

  • Kolukuluri Sri Lalitha PG scholar, Department of MCA, CDNR collage, Bhimavaram, Andhra Pradesh Author
  • K.Venkatesh (Assistant Professor), Master of Computer Applications, DNR collage, Bhimavaram, Andhra Pradesh Author

Keywords:

C 4.5 Decision Tree, DoS attack detection, IDS, KDD Dataset, Naive Bayesian classifier, Machine learning.

Abstract

In the modern computer world, use of the
internet is increasing day by day. However, the
increasing use of the internet creates some security
issues. These days, such new type of security attacks
occurs every day and it is not easy to detect and
prevent those attacks effectively. One common
method of attack involves sending large amount of
request to site or server and server will be unable to
handle such huge requests and site will be offline for
many days. This type of attack is called distributed
denial of service (DDOS) attack, which act as a
major security threat to internet services and most
critical attack for cyber security world. Detection and
prevention of Distributed Denial of Service Attack
(DDoS) becomes a crucial process for the
commercial organizations that uses the internet.
Different approaches have been adapted to process
traffic information collected by monitoring stations
(Routers and Servers) to distinguish malicious traffic
such as DDoS attack from normal traffic in Intrusion
Detection Systems (IDS). In general, Machine
learning techniques can be designed and
implemented with the intrusion systems to protect the
organizations from malicious traffic. Specifically,
supervised clustering techniques allow to effectively
distinguishing the normal traffic from malicious
traffic with good accuracy. In this paper, machine
learning algorithms are used to detect DDoS attacks
collected from “KDD cup 99 Dataset”, preprocessing
and feature selection technique is used on
the dataset to enhance the performance of the
classifiers and reduce the detection time. The
classification algorithms such as C4.5 decision tree
and Navie Bayes is applied on the training dataset
and the implementation of the algorithm is done
using spyder tool. The performance comparison of
algorithms is shown using confusion matrix and it is
found that C4.5 decision is more efficient in detection
of DDOS attack .The proposed method can be used
as DDoS defense system.

Downloads

Download data is not yet available.

References

M. Almseidin, M. Alzubi, S. Kovacs and M.

Alkasassbeh, "Evaluation of machine learning

algorithms for intrusion detection system," 2017

IEEE 15th International Symposium on Intelligent

Systems and Informatics (SISY), Subotica, 2017, pp.

000277- 000282.

[2]. Arul, Amudha & Subburathinam, Karthik &

Sivakumari, S. (2013). Classification Techniques for

Intrusion Detection an Overview. International

Journal of Computer Applications. 76. 33-40.

10.5120/13334-0928.

[3]. Performance Evaluation of Supervised Machine

Learning Algorithms for Intrusion Detection

[4]. Kanagalakshmi.R, V. Naveenantony Raj,‟

Network Intrusion Detection Using Hidden Naïve

Bayes Multiclass Classifier Model,‟ International

Journal of Science, Technology & Management

,Volume No.03, Issue No. 12, December 2014.

[5]. M. Alkasassbeh, G. Al-Naymat et.al,‛ Detecting

Distributed Denial of Service Attacks Using Data

Mining Technique,‛ (IJACSA) International Journal

of Advanced Computer Science and Applications,

Vol. 7, pp. 436-445, 2016. Science and Information

Technologies, Vol. 6 (2), pp. 1096-1099, 2015.

[6]. Jasreena Kaur Bains ,Kiran Kumar Kaki ,Kapil

Sharma,‟ Intrusion Detection System with

MultiLayer using Bayesian Networks‟ , International

Journal of Computer Applications (0975 – 8887)

Volume 67– No.5, April 2013.

[7]. Dewan Md. Farid, Nouria Harbi, Mohammad

Zahidur Rahman , Combining Naive Bayes and

Decision Tree for Adaptive Intrusion Detection, Proc.

of Intl. Journal of Network Security & Its

Applications (IJNSA), Volume 2, Number 2, 2010,

pp.12-25.

[8]. Domingos P. and Pazzani M., Beyond

Independence: Conditions for the optimality of the

simple Bayesian Classifier, In proceedings of the

13th Intnl. Conference on Machine Learning, 1996,

pp.105-110.

[9]. V. Hema and C. Emilin Shyni, ‟ DoS Attack

Detection Based on Naive Bayes Classifier, ‟

Middle-East Journal of Scientific Research 23

(Sensing, Signal Processing and Security): 398-405,

2015.

[10]. Yi-Chi Wu, Huei-Ru Tseng, Wu Yang* and

RongHong Jan,‛ DDoS detection and trackback with

decision tree and grey relational analysis‛, Int. J. Ad

Hoc and Ubiquitous Computing, Vol. 7, No. 2, 2011.

[11]. Dewan Md. Farid, Nouria Harbi, Emna Bahri,

Mohammad Zahid ur Rahman, Chowdhury Mofizur

Rahman,‟ Attacks Classification in Adaptive

Intrusion Detection using Decision Tree

‚International Journal of Computer, Electrical,

Automation, Control and Information Engineering,

Vol:4, No:3, 2010.

[12]. Quinlan, C4.5: Programs for Machine Learning,

1993, Morgan Kaufmann Publishers, San Mateo, CA.

Downloads

Published

2025-05-01

Issue

Section

Articles

How to Cite

Network Intrusion Detection Using Supervised Machine Learning Technique. (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(5), 310-317. https://ijmec.com/index.php/multidisciplinary/article/view/659

Most read articles by the same author(s)

1 2 > >>