Skip to main content

Classification Analysis of Intrusion Detection on NSL-KDD Using Machine Learning Algorithms

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11673))

Abstract

Since three decades, artificial intelligence has been evolved in order to outperform the tasks that human beings are not capable. These tasks can be any problem from our lives and one of these problems is computer networks-related tasks which huge number of privacy data is transferred even a second. Within last two decades, machine learning techniques with capabilities for prediction, optimisation, and as well as classification are developed for using to solve the real-life problems. In this paper, challenging and popular NSL-KDD dataset for intrusion detection is chosen for performed experiments, where classification and three benchmark machine learning techniques are used in order to determine optimum technique for classification domain. Experiments are performed by implementing 3-layered Back-propagation Neural Network, Support Vector Machine and Decision Tree. Thirty percent (30\(\%\)) of instances of NSL-KDD Dataset were considered that causes 25193 of total instances in experiments. Each experiment is repeated for two times by using 60\(\%\) and 70\(\%\) of instances for training and the rest for testing. Increment of training patterns or instances caused little fluctuations on accuracy rates in Decision Tree and Back-propagation but it causes more effect in Support Vector Machine which is about 1\(\%\) decrement in accuracy rate. It is seen from the performed experiments’ results that, increment or degradation of training ratio of instances in dataset does not affect the performance of the techniques directly.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kirsal Ever, Y., Dimililer, K., Sekeroglu, B.: Comparison of machine learning techniques for prediction problems. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds.) WAINA 2019. AISC, vol. 927, pp. 713–723. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-15035-8_69

    Chapter  Google Scholar 

  2. Kirsal, Y., Gemikonakli, O.: Improving kerberos security through the combined use of the timed authentication protocol and frequent key renewal. In: 6th IEEE International Conference on Cybernetic Systems 2008, pp. 153–158. Middlesex University, London (2008)

    Google Scholar 

  3. Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 2(12) (2013). ISSN 2278-0181

    Google Scholar 

  4. Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446–452 (2015)

    Google Scholar 

  5. NSL-KDD Dataset. https://www.unb.ca/cic/datasets/index.html. Accessed 28 Mar 2019

  6. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009) (2009)

    Google Scholar 

  7. Ingre, B., Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: SPACES-2015, Department of ECE, K L University (2015)

    Google Scholar 

  8. Pervez, M.S., Farid, D.Md.: Feature selection and intrusion classification in NSL-KDD Cup 99 dataset employing SVMs. In: 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), 18–20 December 2014

    Google Scholar 

  9. Ibrahim, L.M., Basheer, D.T., Mahmod, M.S.: A comparison study for intrusion database (KDD99, NSL-KDD) based on self organisation map (SOM) artificial neural network. J. Eng. Sci. Technol. 8(1), 107–119 (2013)

    Google Scholar 

  10. Sekeroglu, B., Dimililer, K., Tuncal, K.: Student performance prediction and classification using machine learning algorithms. In: 8th International Conference on Educational and Information Technology (ICEIT 2019), Cambridge, UK (2019)

    Google Scholar 

  11. Wu, J., Chang, C.: Classification of landslide features using a LiDAR DEM and back-propagation neural network. In: El-Askary, H., Lee, S., Heggy, E., Pradhan, B. (eds.) Advances in Remote Sensing and Geo Informatics Applications, AG 2019. Advances in Science, Technology & Innovation (ASTI), vol. 927, pp. 155–158. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-01440-7_36

    Chapter  Google Scholar 

  12. Chiba, Z., Abghour, N., Moussaid, K., El omri, A., Rida, M.: A new hybrid framework based on improved genetic algorithm and simulated annealing algorithm for optimization of network IDS based on BP neural network. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds.) Innovations in Smart Cities Applications. LNITI, vol. 921, 2nd edn, pp. 507–521. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11196-0_43

    Chapter  Google Scholar 

  13. Sekeroglu, B., Emirzade, E.: A computer aided diagnosis system for lung cancer detection using support vector machine. In: Third International Workshop on Pattern Recognition, vol. 10828, Jinan, China (2018)

    Google Scholar 

  14. Kim, C., Park, J., Kim, H.: An actor-critic algorithm for SVM hyperparameters. In: Kim, K.J., Baek, N. (eds.) ICISA 2018. LNEE, vol. 514, pp. 653–661. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1056-0_64

    Chapter  Google Scholar 

  15. Xin, M.: An improved support vector machine of intrusion detection system. In: Abawajy, J., Choo, K.-K.R., Islam, R., Xu, Z., Atiquzzaman, M. (eds.) ATCI 2018. AISC, vol. 842, pp. 774–780. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-98776-7_91

    Chapter  Google Scholar 

  16. Aggarwal, P., Sharma, S.K.: Analysis of KDD dataset attributes - class wise for intrusion detection. Procedia Comput. Sci. 57, 842–851 (2015)

    Article  Google Scholar 

  17. Pal, M., Mather, P.M.: Decision tree based classification of remotely sensed data. In: 22nd Asian Conference on Remote Sensing, Singapore (2001)

    Google Scholar 

  18. Eissa, M.M., Ali, A.A., Abdel-Latif, K.M., Al-Kady, A.F.: A frequency control technique based on decision tree concept by managing thermostatically controllable loads at smart grids. Int. J. Electr. Power Energy Syst. 108, 40–51 (2019)

    Article  Google Scholar 

  19. Vernuccio, F., Rosenberg, M.D., Meyer, M., Choudhury, K.R., Nelson, R.C., Marin, D.: Negative biopsy of focal hepatic lesions: decision tree model for patient management. Am. J. Roentgenol. 212(3), 677–685 (2019)

    Article  Google Scholar 

  20. Dougherty, G.: Pattern Recognition and Classification: An Introduction. Springer, Berlin (2012). https://doi.org/10.1007/978-1-4614-5323-9

    Book  MATH  Google Scholar 

  21. Ogidan, E.T., Dimililer, K., Ever, Y.K.: Machine learning for expert systems in data analysis. In: 2nd International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2018 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yoney Kirsal Ever .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ever, Y.K., Sekeroglu, B., Dimililer, K. (2019). Classification Analysis of Intrusion Detection on NSL-KDD Using Machine Learning Algorithms. In: Awan, I., Younas, M., Ünal, P., Aleksy, M. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2019. Lecture Notes in Computer Science(), vol 11673. Springer, Cham. https://doi.org/10.1007/978-3-030-27192-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-27192-3_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-27191-6

  • Online ISBN: 978-3-030-27192-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics