NSL-KDD dataset Classification Using Five Classification Methods and Three Feature Selection Strategies

Jamal H. Assi, Ahmed T. Sadiq

Abstract


In this paper, five primary classification methods with three feature selection strategies have been implemented to classify the network attacks using NSL-KDD dataset. These methods are (J48 decision tree, Support Vector Machine (SVM), Decision Table (DT), Bayesian Network and Back Propagation Neural Network). The feature selection strategies are (Correlation base feature selection(CFS), Information Gain (IG) and Decision Table). Several experiments have been implemented to obtain good results using the training and testing NSL-KDD within general attack (Normal and Anomaly). These were carried out using four attack types: Denial of Service attack (DOS), User to Root attack (U2R), Remote to Local attack (R2L) and Probing attack. J48 classification method with information gain feature selection gives the best results (80.3%) using testing dataset and (93.9%) as an accuracy training dataset.

Full Text:

PDF

References


- Ghorbani Ali A., Lu Wei and Tavallaee Mahbod (2010). Network Intrusion Detection and Prevention Concepts and Techniques, Springer New York.

- Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita (2014) “Network Anomaly Detection a Machine Learning Perspective”, CRC Press Tayler & Frances group, LLC.

- Shilpa Lakhina, Sini Joseph and Bhupendra Verma (2010) “Feature Reduction using PCA for effective Anomaly-Based Intrusion detection on NSL-KDD”, International Journal of Engineering Science and Technology Vol 2(6) pp1790-1799.

- L. Dhanabal, and S. P. Shantharajah (2015) “A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms”, International Journal of Advanced Research in Computer and Communication Engineering, Vol 4, Issue 6, pp.

- Himadri Chauhan, Vipin Kumar, Sumit Pundir and Emmanuel S. Pilli (2013) “A Comparative Study of Classification Techniques for Intrusion Detection” International Symposium on Computational and Business Intelligence pp40-43.

- S. Revathi, Dr. A. Malathi (2013) “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection and Technology, IJERT Vol. 2 Issue 12 pp1848-1853.

- Hee-su Chae, Byung-oh Jo, Sang-Hyun Choi, Twae-kyung Park (2013) “Feature Selection For Intrusion Detection using NSL-KDD”, Recent Advances in Computer Science, pp184-187.

- Dr. Saurabh Mukherjee, Neelam Sharma (2012) “Intrusion Detection Using Naïve Bayes Classifier with Feature Reduction”, Procedia Technology, Vol 4 (2012), pp119-128.

- Zibusiso Dewa, Leandros Maglaras (2016) “Data Mining and Intrusion Detection Systems”, International Journal of Advanced Computer Science and Applications, Vol 7 No 1, pp61-71.

- Junyuan Shen, Jidong Wang, Hao Ai (2012) “An Improved Artificial Immune System Based Network Intrusion Detection by Using Rough Set”, Communications and Networks, (2012)4, pp41-47.

- Nils J. Nilsson (1998). Artificial Intelligence: A New Synthesis, Morgan Kaufmann Publishers, Inc., USA.

- Laura Auria and Rouslan A. Moro (2008) “Support Vector Machines as a Techniques for Solvency Analysis”, DIW Berlin Discussion Paper No. 811. http://dx.doi.org/10.2139/ssrn.1424949.


Refbacks

  • There are currently no refbacks.