Comparison and Analysis of Data Mining Techniques for Intrusion Detection

Main Article Content

Ibrahim Adamu
Asabe Sandra Ahmadu
Usa John Guli
Peter Ezekiel

Abstract

This research investigates the use of data mining techniques for intrusion detection. Decision Trees, Artificial Neural Network, Naïve Bayes and Support Vector Machine are the strategies examined. The dataset used was collected from different online repositories where they are made available as open-source data. The sample size used were 910, 10077, 10679 instances of KDDCUP’99, NSL-KDD-train and CICIDS2017 respectively, selected using random sampling technique, The Weka workbench tool was used for preprocessing and creation of the intrusion detection system.  The accuracy, speed, and scalability of the techniques, among other criteria, are taken into account and contrasted. The study also examines the best method for detecting intrusions in dynamic networks and various applications.  The performance of each technique in terms of accuracy, precision, recall, and F1-score is also examined in this research. The results revealed that the Decision Tree performs better with accuracy, precision, recall and F-measure of 99% than the other classifiers Support Vector Machine, ANN, NB and KNN in most of the tests on the three different datasets. Both Decision Tree and ANN classifier showed superior performance in detecting attacks. In conclusion, this paper reveals that artificial neural networks are the most accurate data mining technique for intrusion detection. However, in terms of implementation, Decision Tree classifier take a very short time to implement compared to ANN which takes a very long time to be implemented. Finally, this research recommended that employing these optimizing techniques to develop an intrusion detection model has a better accuracy rate.  

Downloads

Download data is not yet available.

Article Details

How to Cite
Adamu, I., Ahmadu, A. S., Guli, U. J., & Ezekiel, P. (2023). Comparison and Analysis of Data Mining Techniques for Intrusion Detection. African Journal of Advances in Science and Technology Research, 11(1), 26–42. Retrieved from https://publications.afropolitanjournals.com/index.php/ajastr/article/view/539
Section
Articles
Author Biographies

Ibrahim Adamu, Modibbo Adama University, Yola, Nigeria.

Department of Computer Science,

Faculty of Physical Science,

Modibbo Adama University, Yola, Nigeria.

Asabe Sandra Ahmadu, Modibbo Adama University, Yola, Nigeria.

Department of Computer Science,

Faculty of Physical Science,

Modibbo Adama University, Yola, Nigeria.

Usa John Guli, Modibbo Adama University, Yola, Nigeria.

Department of Computer Science,

Faculty of Physical Science,

Modibbo Adama University, Yola, Nigeria.

Peter Ezekiel, Modibbo Adama University, Yola, Nigeria.

Department of Computer Science,

Faculty of Physical Science,

Modibbo Adama University, Yola, Nigeria.

References

Adeleke, O. (2020, March). Intrusion detection: issues, problems and solutions. In 2020 3rd International Conference on Information and Computer Technologies (ICICT) (pp. 397-402). IEEE.

Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance, 28, 24-31.

Carlin, A., Hammoudeh, M., & Aldabbas, O. (2015). Defence for distributed denial of service attacks in cloud computing. Procedia computer science, 73, 490-497.

Cherian, V., & Bindu, M. S. (2017). Heart disease prediction using Naive Bayes algorithm and Laplace Smoothing technique. Int. J. Comput. Sci. Trends Technol, 5(2), 68-73.

Dewa, Z., & Maglaras, L. A. (2016). Data mining and intrusion detection systems. International Journal of Advanced Computer Science and Applications, 7(1).

Herr, T. (2014). PrEP: A framework for malware & cyber weapons. Journal of Information Warfare, 13(1), 87-106.

Hindy, H., Brosset, D., Bayne, E., Seeam, A. K., Tachtatzis, C., Atkinson, R., & Bellekens, X. (2020). A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access, 8, 104650-104675.

Jacobson, D., & Idziorek, J. (2016). Computer security literacy: staying safe in a digital world. CRC Press.

Keegan, N., Ji, S. Y., Chaudhary, A., Concolato, C., Yu, B., & Jeong, D. H. (2016). A survey of cloud-based network intrusion detection analysis. Human-centric Computing and Information Sciences, 6(1), 1-16.

Mohan, L., Jain, S., Suyal, P., & Kumar, A. (2020, September). Data mining Classification Techniques for Intrusion Detection System. In 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 351-355). IEEE.

Ngai, E. W., Moon, K. L. K., Lam, S. S., Chin, E. S., & Tao, S. S. (2015). Social media models, technologies, and applications: an academic review and case study. Industrial Management & Data Systems.

Patel, R., Thakkar, A., & Ganatra, A. (2012). A survey and comparative analysis of data mining techniques for network intrusion detection systems. International Journal of Soft Computing and Engineering (IJSCE), 2(1), 265-260.

Parvathi, I., & Rautaray, S. (2014). Survey on data mining techniques for the diagnosis of diseases in medical domain. International Journal of Computer Science and Information Technologies, 5(1), 838-846.

Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1, 108-116.

Thakkar, A., & Lohiya, R. (2020). A review of the advancement in intrusion detection datasets. Procedia Computer Science, 167, 636-645.

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. Ieee Access, 7, 41525-41550.

Wahono, R. S. (2015). A systematic literature review of software defect prediction. Journal of software engineering, 1(1), 1-16.