Network Intrusion Detection Using Supervised Machine Learning Technique
Keywords:
C 4.5 Decision Tree, DoS attack detection, IDS, KDD Dataset, Naive Bayesian classifier, Machine learning.Abstract
In the modern computer world, use of the
internet is increasing day by day. However, the
increasing use of the internet creates some security
issues. These days, such new type of security attacks
occurs every day and it is not easy to detect and
prevent those attacks effectively. One common
method of attack involves sending large amount of
request to site or server and server will be unable to
handle such huge requests and site will be offline for
many days. This type of attack is called distributed
denial of service (DDOS) attack, which act as a
major security threat to internet services and most
critical attack for cyber security world. Detection and
prevention of Distributed Denial of Service Attack
(DDoS) becomes a crucial process for the
commercial organizations that uses the internet.
Different approaches have been adapted to process
traffic information collected by monitoring stations
(Routers and Servers) to distinguish malicious traffic
such as DDoS attack from normal traffic in Intrusion
Detection Systems (IDS). In general, Machine
learning techniques can be designed and
implemented with the intrusion systems to protect the
organizations from malicious traffic. Specifically,
supervised clustering techniques allow to effectively
distinguishing the normal traffic from malicious
traffic with good accuracy. In this paper, machine
learning algorithms are used to detect DDoS attacks
collected from “KDD cup 99 Dataset”, preprocessing
and feature selection technique is used on
the dataset to enhance the performance of the
classifiers and reduce the detection time. The
classification algorithms such as C4.5 decision tree
and Navie Bayes is applied on the training dataset
and the implementation of the algorithm is done
using spyder tool. The performance comparison of
algorithms is shown using confusion matrix and it is
found that C4.5 decision is more efficient in detection
of DDOS attack .The proposed method can be used
as DDoS defense system.
Downloads
References
M. Almseidin, M. Alzubi, S. Kovacs and M.
Alkasassbeh, "Evaluation of machine learning
algorithms for intrusion detection system," 2017
IEEE 15th International Symposium on Intelligent
Systems and Informatics (SISY), Subotica, 2017, pp.
000277- 000282.
[2]. Arul, Amudha & Subburathinam, Karthik &
Sivakumari, S. (2013). Classification Techniques for
Intrusion Detection an Overview. International
Journal of Computer Applications. 76. 33-40.
10.5120/13334-0928.
[3]. Performance Evaluation of Supervised Machine
Learning Algorithms for Intrusion Detection
[4]. Kanagalakshmi.R, V. Naveenantony Raj,‟
Network Intrusion Detection Using Hidden Naïve
Bayes Multiclass Classifier Model,‟ International
Journal of Science, Technology & Management
,Volume No.03, Issue No. 12, December 2014.
[5]. M. Alkasassbeh, G. Al-Naymat et.al,‛ Detecting
Distributed Denial of Service Attacks Using Data
Mining Technique,‛ (IJACSA) International Journal
of Advanced Computer Science and Applications,
Vol. 7, pp. 436-445, 2016. Science and Information
Technologies, Vol. 6 (2), pp. 1096-1099, 2015.
[6]. Jasreena Kaur Bains ,Kiran Kumar Kaki ,Kapil
Sharma,‟ Intrusion Detection System with
MultiLayer using Bayesian Networks‟ , International
Journal of Computer Applications (0975 – 8887)
Volume 67– No.5, April 2013.
[7]. Dewan Md. Farid, Nouria Harbi, Mohammad
Zahidur Rahman , Combining Naive Bayes and
Decision Tree for Adaptive Intrusion Detection, Proc.
of Intl. Journal of Network Security & Its
Applications (IJNSA), Volume 2, Number 2, 2010,
pp.12-25.
[8]. Domingos P. and Pazzani M., Beyond
Independence: Conditions for the optimality of the
simple Bayesian Classifier, In proceedings of the
13th Intnl. Conference on Machine Learning, 1996,
pp.105-110.
[9]. V. Hema and C. Emilin Shyni, ‟ DoS Attack
Detection Based on Naive Bayes Classifier, ‟
Middle-East Journal of Scientific Research 23
(Sensing, Signal Processing and Security): 398-405,
2015.
[10]. Yi-Chi Wu, Huei-Ru Tseng, Wu Yang* and
RongHong Jan,‛ DDoS detection and trackback with
decision tree and grey relational analysis‛, Int. J. Ad
Hoc and Ubiquitous Computing, Vol. 7, No. 2, 2011.
[11]. Dewan Md. Farid, Nouria Harbi, Emna Bahri,
Mohammad Zahid ur Rahman, Chowdhury Mofizur
Rahman,‟ Attacks Classification in Adaptive
Intrusion Detection using Decision Tree
‚International Journal of Computer, Electrical,
Automation, Control and Information Engineering,
Vol:4, No:3, 2010.
[12]. Quinlan, C4.5: Programs for Machine Learning,
1993, Morgan Kaufmann Publishers, San Mateo, CA.