首页> 外文会议>TPC of International Conference on Innovation and Intelligence for Informatics, Computing and Technologies >Intrusion Detection System using Feature Selection With Clustering and Classification Machine Learning Algorithms on the UNSW-NB15 dataset
【24h】

Intrusion Detection System using Feature Selection With Clustering and Classification Machine Learning Algorithms on the UNSW-NB15 dataset

机译:使用特征选择的入侵检测系统,在UNSW-NB15数据集中使用聚类和分类机学习算法

获取原文

摘要

The identification of malicious network traffic through intrusion detection systems (IDS) becomes very challenging. This malicious network appears as a network protocols or normal access. In this paper, for the classification of cyberattacks, four different algorithms are used on UNSW-NB15 dataset, these methods are naive bays (NB), Random Forest (RF), J48, and ZeroR. Also, K-MEANS and Expectation Maximization (EM) clustering algorithms are used to cluster the UNSW-NB15 dataset into two clusters depending on the target attribute attack, or normal network traffic. To develop an optimal subset of features, Correlation-based Feature Selection (CFS) is used, then the mentioned classification and clustering techniques are used. The used methods gives an efficient tool for studying and analyzing intrusion detection in large networks. The result show that RF and J48 algorithms performed best results with 97.59%, and 93.78%, respectively.
机译:通过入侵检测系统(IDS)识别恶意网络流量变得非常具有挑战性。此恶意网络显示为网络协议或正常访问。在本文中,对于Cyber​​Atchs的分类,在UNSW-NB15数据集上使用了四种不同的算法,这些方法是天真托架(NB),随机林(RF),J48和零。此外,K-means和期望最大化(EM)聚类算法用于根据目标属性攻击或正常的网络流量将UNSW-NB15数据集群体聚集成两个群集。为了开发最佳特征子集,使用基于相关的特征选择(CFS),然后使用所提到的分类和聚类技术。二手方法为大型网络中的入侵检测提供了一种有效的工具,可以进行学习和分析入侵检测。结果表明,RF和J48算法分别表现出97.59%和93.78%的最佳结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号