Comparison and Analysis of Data Mining Techniques for Intrusion Detection
Main Article Content
Abstract
This research investigates the use of data mining techniques for intrusion detection. Decision Trees, Artificial Neural Network, Naïve Bayes and Support Vector Machine are the strategies examined. The dataset used was collected from different online repositories where they are made available as open-source data. The sample size used were 910, 10077, 10679 instances of KDDCUP’99, NSL-KDD-train and CICIDS2017 respectively, selected using random sampling technique, The Weka workbench tool was used for preprocessing and creation of the intrusion detection system. The accuracy, speed, and scalability of the techniques, among other criteria, are taken into account and contrasted. The study also examines the best method for detecting intrusions in dynamic networks and various applications. The performance of each technique in terms of accuracy, precision, recall, and F1-score is also examined in this research. The results revealed that the Decision Tree performs better with accuracy, precision, recall and F-measure of 99% than the other classifiers Support Vector Machine, ANN, NB and KNN in most of the tests on the three different datasets. Both Decision Tree and ANN classifier showed superior performance in detecting attacks. In conclusion, this paper reveals that artificial neural networks are the most accurate data mining technique for intrusion detection. However, in terms of implementation, Decision Tree classifier take a very short time to implement compared to ANN which takes a very long time to be implemented. Finally, this research recommended that employing these optimizing techniques to develop an intrusion detection model has a better accuracy rate.
Downloads
Article Details
References
Adeleke, O. (2020, March). Intrusion detection: issues, problems and solutions. In 2020 3rd International Conference on Information and Computer Technologies (ICICT) (pp. 397-402). IEEE.
Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance, 28, 24-31.
Carlin, A., Hammoudeh, M., & Aldabbas, O. (2015). Defence for distributed denial of service attacks in cloud computing. Procedia computer science, 73, 490-497.
Cherian, V., & Bindu, M. S. (2017). Heart disease prediction using Naive Bayes algorithm and Laplace Smoothing technique. Int. J. Comput. Sci. Trends Technol, 5(2), 68-73.
Dewa, Z., & Maglaras, L. A. (2016). Data mining and intrusion detection systems. International Journal of Advanced Computer Science and Applications, 7(1).
Herr, T. (2014). PrEP: A framework for malware & cyber weapons. Journal of Information Warfare, 13(1), 87-106.
Hindy, H., Brosset, D., Bayne, E., Seeam, A. K., Tachtatzis, C., Atkinson, R., & Bellekens, X. (2020). A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access, 8, 104650-104675.
Jacobson, D., & Idziorek, J. (2016). Computer security literacy: staying safe in a digital world. CRC Press.
Keegan, N., Ji, S. Y., Chaudhary, A., Concolato, C., Yu, B., & Jeong, D. H. (2016). A survey of cloud-based network intrusion detection analysis. Human-centric Computing and Information Sciences, 6(1), 1-16.
Mohan, L., Jain, S., Suyal, P., & Kumar, A. (2020, September). Data mining Classification Techniques for Intrusion Detection System. In 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 351-355). IEEE.
Ngai, E. W., Moon, K. L. K., Lam, S. S., Chin, E. S., & Tao, S. S. (2015). Social media models, technologies, and applications: an academic review and case study. Industrial Management & Data Systems.
Patel, R., Thakkar, A., & Ganatra, A. (2012). A survey and comparative analysis of data mining techniques for network intrusion detection systems. International Journal of Soft Computing and Engineering (IJSCE), 2(1), 265-260.
Parvathi, I., & Rautaray, S. (2014). Survey on data mining techniques for the diagnosis of diseases in medical domain. International Journal of Computer Science and Information Technologies, 5(1), 838-846.
Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1, 108-116.
Thakkar, A., & Lohiya, R. (2020). A review of the advancement in intrusion detection datasets. Procedia Computer Science, 167, 636-645.
Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. Ieee Access, 7, 41525-41550.
Wahono, R. S. (2015). A systematic literature review of software defect prediction. Journal of software engineering, 1(1), 1-16.
 
								