Abstract

The explosive growth of Internet and technologies has resulted in better life-changing services to the society. This drastic change has invariably kept the users connected to the Internet uninterruptedly. The adversaries might exploit this “always-on” Internet connection and would jeopardize the network infrastructure through malicious activities using the networks' hardware and software vulnerabilities. However, the network traffic volume poses difficulties for the cyber analyst to monitor, detect, identify, and quickly respond to the network attacks. Therefore it is paramount to protect the integrity, availability, confidentiality of the network infrastructure, and its digital assets by deploying Intrusion Detection Systems. However, augmenting new techniques avoids overwhelming the analysts from a myriad of events. This research aims to analyze the traffic for the significant features that assist in reliable intrusion detection and minimize the resource requirements and computational complexity of the detection process. The proposed method uses Recursive Feature Elimination technique to rank features based on feature importance and Random Forest algorithm performs the attack classification. The experimental findings show these significant 21 features are useful in anomaly detection with an accuracy of 99.83% for binary attack detection, 99.69% for multiclass classification with an execution time of 20 seconds, and 39 seconds respectively on the NSL-KDD dataset.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.