Abstract

The network-based intrusion detection has become common to evaluate machine learning algorithms. Although the KDD Cup’99 Dataset has class imbalance over different intrusion classes, still it plays a significant role to evaluate machine learning algorithms. In this work, we utilize the singular valued decomposition technique for feature dimension reduction. We further reconstruct the features form reduced features and the selected eigenvectors. The reconstruction loss is used to decide the intrusion class for a given network feature. The intrusion class having the smallest reconstruction loss is accepted as the intrusion class in the network for that sample. The proposed system yield 97.90% accuracy on KDD Cup’99 dataset for the stated task. We have also analyzed the system with individual intrusion categories separately. This analysis suggests having a system with the ensemble of multiple classifiers; therefore we also created a random forest classifier. The random forest classifier performs significantly better than the SVD based system. The random forest classifier achieves 99.99% accuracy for intrusion detection on the same training and testing data set.

Highlights

  • Contribution In this work, we have tested and analyzed the two classification methods based on Singular Value Decomposition (SVD) and Random Forest (RF)

  • We have tested and analyzed the two classification methods based on Singular Value Decomposition (SVD) and Random Forest (RF)

  • The RF-based method utilizes the ensembles of decision trees to decide the true attack class

Read more

Summary

Introduction

On the other hand, are based on a set of rules of normal behavior to identify deviation of activities from this normal behavior They have the ability to detect unknown, novel, or unfamiliar attacks that have not been encountered previously; false attack rate is high. Due to the complexity and diversity of intrusions, machine learning based IDSs have the ability to process and extract features from a large volume of data 25 related to online intrusions. They became a vital solution for developing an efficient and robust intrusion detection system.

Singular Value Decomposition Algorithm
Random Forest Algorithm
Related Work
Proposed System
Experimental Datasets
Evaluation Criteria
Results and Analysis
Conclusion and Future Scope
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.