A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges
Keywords:
Intrusion Detection System, ML classifiers, Different IDS datasets, Evaluation matrix with accuracy, Detected assaultsAbstract
IDS aims to protect computer networks from security threats by detecting, notifying, and taking appropriate action to prevent illegal access and protect confidential information. As the globe becomes increasingly dependent on technology and automated processes, ensuring secured systems, applications, and networks has become one of the most significant problems of this era. The global web and digital technology have significantly accelerated the evolution of the modern world, necessitating the use of telecommunications and data transfer platforms. Researchers are enhancing the effectiveness of IDS by incorporating popular datasets into machine learning algorithms. IDS, equipped with machine learning classifiers, enhances security attack detection accuracy by identifying normal or abnormal network traffic. This paper explores the methods of capturing and reviewing intrusion detection systems (IDS) and evaluates the challenges existing datasets face. A deluge of research on machine learning (ML) and deep learning (DL) architecture-based intrusion detection techniques have been conducted in the past ten years on a variety of cyber security-based datasets, including KDDCUP'99, NSL-KDD, UNSW-NB15, CICIDS-2017, and CSE-CIC-IDS2018. We conducted a literature review and presented an in-depth analysis of various intrusion detection methods that use SVM, KNN, DT, LR, NB, RF, XGBOOST, Adaboost, and ANN. We have given an overview of each technique, explaining the function of the classifier mentioned above and all other algorithms used in the research. Additionally, a comprehensive analysis of each method has been provided in tabular form, emphasizing the dataset utilized, classifiers employed, assaults detected, an accurate evaluation matrix, and conclusions drawn from every technique investigated. This article provides a comprehensive overview of recent research on developing a reliable IDS using five distinct datasets for future research. This investigation was carefully analyzed and contrasted with the findings from numerous investigations.
Downloads
References
L. Buczak and E. Guven, “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection,” IEEE Commun. Surv. Tutorials, vol. 18, pp. 1153–1176, 2016, doi: 10.1109/COMST.2015.2494502.
Denning, Dorothy E. “An Intrusion-Detection Model.” IEEE Transactions on Software Engineering SE-13 (1987): 222-232.
XU, X. (2006). Adaptive intrusion detection based on machine learning: feature extraction, classifier construction, and sequential pattern prediction. International Journal of Web Services Practices, 2(1-2), 49-58.
Tripathy, S. S., & Behera, B. “PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION SYSTEM,” Journal of Biomechanical Science and Engineering, pp. 621–640, July. 2023doi: 10.17605/OSF.IO/WX6CS.
F. Sabahi and A. Movaghar, “Intrusion detection: A survey,” In 2008 Third International Conference on Systems and Networks Communications (pp. 23-26). IEEE, 2008, October.
Dhanabal, L., & Shantharajah, S. P. (2015). A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International journal of advanced research in computer and communication engineering, 4(6), 446-452.
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1-6). IEEE.
Dhanabal, L., & Shantharajah, S. P. (2015). A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International journal of advanced research in computer and communication engineering, 4(6), 446-452.
I. Sharafaldin, A. H. Lashkari, A. A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, in Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Vol. 1, 2018, pp. 108–116. doi:10.5220/0006639801080116.
Intrusion detection evaluation dataset (CIC IDS2017), https://www.unb.ca/cic/datasets/ids-2017. Html.
A. Thakkar, R. Lohiya, A review of the advancement in intrusion detection datasets, Procedia Computer Science 167 (2020) 636–645. doi:10.1016/j.procs.2020.03.330.
Meftah, Souhail, Tajje-eddine Rachidi and Nasser Assem. “Network Based Intrusion Detection Using the UNSW-NB15 Dataset.” International Journal of Computing and Digital Systems (2019): n. pag.
Y. Zhou, G. Cheng, S. Jiang, and M. Dai, “Building an efficient intrusion detection system based on feature selection and ensemble classifier,” Computer Networks, vol. 174, p. 107247, Jun. 2020, doi: 10.1016/j.comnet.2020.107247.
R. I. Farhan, A. T. Maolood, and N. F. Hassan, “Optimized deep learning with binary PSO for intrusion detection on CSE-CICIDS2018 dataset,” Journal of Al-Qadisiyah for Computer Science and Mathematics, vol. 12, no. 3, pp. 16–27, 2020, doi: https://doi.org/10.29304/jqcm.2020.12.3.706.
[“Registry of open data on AWS.” https://registry.opendata.aws/cse-cic-ids2021/ (accessed May 30, 2020”.
Canadian Institute for Cybersecurity (CIC), “CSE-CIC-IDS2018 on AWS.” https://www.unb.ca/cic/datasets/ids-2018.html (accessed May 30, 2020).
M. K. Ibraheem, I. M. A. Al- Khafaji, and S. A. Dheyab, “Network intrusion detection using deep learning based on dimensionality reduction,” REVISTA AUS, vol. 26, no. 2, pp. 168–174, 2019.
Verma P, Shadab K, Shayan A. and Sunil B. (20Network Intrusion Detection using Clustering and Gradient Boosting. International Conference on Computing, Communication and Networking Technologies (ICCCNT). (pp. 1-7). IEEE.
Dutt I. et al. (2018). Real-Time Hybrid Intrusion Detection System. International Conference on Communication, Devices and Networking (ICCDN). (pp. 885-894). Springer
Deyban P. Miguel A. A, David P. A, and Eugenio S. (2017). Intrusion detection in computer networks using hybrid machine learning techniques. XLIII Latin American Computer Conference (CLEI). (pp. 1-10). IEEE.
Maniriho et al. (2020). Detecting Intrusions in Computer Network Traffic with Machine Learning Approaches. International Journal of Intelligent Engineering and Systems. INASS. (433-445).
Iqbal, A., & Aftab, S. (2019). A Feed Forward and Pattern Recognition ANN Model for Network Intrusion Detection. International Journal of Computer Network and Information Security
M. R. Watson, A. K. Marnerides, A. Mauthe, and D. Hutchison (2016) Malware detection in cloud computing infrastructures. IEEE Transactions on Dependable and Secure Computing, 13(2):192-205.
Kaja, N., Shaout, A.K., & Ma, D. (2019). An intelligent intrusion detection system. Applied Intelligence, 49, 3235 – 3247.
M. R. Watson, A. K. Marnerides, A. Mauthe, and D. Hutchison (2016) Malware detection in cloud computing infrastructures. IEEE Transactions on Dependable and Secure Computing, 13(2):192-205.
Kasongo SM, Sun Y (2020) Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data 7:1–20.
Modi, Urvashi & Jain, Anurag. (2016). An Improved Method to Detect Intrusion Using Machine Learning Algorithms. Informatics Engineering, an International Journal. 4. 17-29. 10.5121/ieij.2016.4203.
A. A. Yilmaz, "Intrusion Detection in Computer Networks using Optimized Machine Learning Algorithms," 2022 3rd International Informatics and Software Engineering Conference (IISEC), Ankara, Turkey, 2022, pp. 1-5, doi: 10.1109/IISEC56263.2022.9998258
Ghose, Dipayan & Partho, All & Ahmed, Minhaz & Chowdhury, Md Tanvir & Hasan, Mahamudul & Ali, Md & Jabid, Taskeed & Islam, Maheen. (2023). Performance Evaluation of Intrusion Detection System Using Machine Learning and Deep Learning Algorithms. 1-6.10.1109/IBDAP58581.2023.10271964.
K. Dinesh and D. Kalaivani, "Enhancing Performance of Intrusion detection System in the NSL-KDD Dataset using Meta-Heuristic and Machine Learning Algorithms-Design thinking approach," 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), Coimbatore, India, 2023, pp. 1471-1479, doi: 10.1109/ICSCSS57650.2023.10169845.
J. Ren, J. Guo, W. Qian, H. Yuan, X. Hao, and H. Jingjing, “Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms,” Security and Communication Networks, vol. 2019, pp. 1–11, Jun. 2019, doi: 10.1155/2019/7130868.
K. -A. Tait et al., "Intrusion Detection using Machine Learning Techniques: An Experimental Comparison," 2021 International Congress of Advanced Technology and Engineering (ICOTEN), Taiz, Yemen, 2021, pp. 1-10, doi: 10.1109/ICOTEN52080.2021.9493543.
Brao, Bobba & Swathi, Kailasam. (2017). Fast kNN Classifiers for Network Intrusion Detection System. Indian Journal of Science and Technology. 10. 1-10. 10.17485/ijst/2017/v10i14/93690.
Farnaaz, Nabila & Akhil, Jabbar. (2016). Random Forest Modeling for Network Intrusion Detection System. Procedia Computer Science. 89. 213-217. 10.1016/j.procs.2016.06.047.
Lin, Wei-Chao & Ke, Shih-Wen & Tsai, Chih-Fong. (2015). CANN: An Intrusion Detection System Based on Combining Cluster Centers and Nearest Neighbors. Knowledge-Based Systems. 78. 10.1016/j.knosys.2015.01.009.
G. Yedukondalu, G. H. Bindu, J. Pavan, G. Venkatesh and A. SaiTeja, "Intrusion Detection System Framework Using Machine Learning," 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 2021, pp. 1224-1230, doi: 10.1109/ICIRCA51532.2021.9544717.
S. Waskle, L. Parashar, and U. Singh, “Intrusion Detection System Using PCA with Random Forest Approach,” in 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, Jul. 2020, pp. 803–808. doi: 10.1109/ICESC48915.2020.9155656
M. Hammad, W. El-many, and Y. Ismail, “Intrusion Detection System using Feature Selection With Clustering and Classification Machine Learning Algorithms on the UNSW-NB15 dataset,” in 2020 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Sakheer, Bahrain, Dec. 2020, pp. 1–6. doi: 10.1109/3ICT51146.2020.9312002.
A. Singhal, A. Maan, D. Chaudhary and D. Vishwakarma, "A Hybrid Machine Learning and Data Mining Based Approach to Network Intrusion Detection," 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 2021, pp. 312-318, doi: 10.1109/ICAIS50930.2021.9395918.
J. D. S. W.S. and P. B., "Machine Learning based Intrusion Detection Framework using Recursive Feature Elimination Method," 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 2020, pp. 1-4, doi: 10.1109/ICSCAN49426.2020.9262282.
F. Kamalov, S. Moussa, R. Zgheib, and O. Mashaal, “Feature selection for intrusion detection systems,” in 2020 13th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China, Dec. 2020, pp. 265–269. doi: 10.1109/ISCID51228.2020.00065.
Fang, Weijian & Tan, Xiaoling & Wilbur, Dominic. (2020). Application of intrusion detection technology in network safety based on machine learning. Safety Science. 124. 104604. 10.1016/j.ssci.2020.104604.
P. V. Pandit, S. Bhushan and P. V. Waje, "Implementation of Intrusion Detection System Using Various Machine Learning Approaches with Ensemble learning," 2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT), Gharuan, India, 2023, pp. 468-472, doi: 10.1109/InCACCT57535.2023.10141704.
Anouar Bachar, N. E. (2020). ML for Network Intrusion Detection Based on SVM Binary Classification Model. Advances in Science, Technology and Engineering Systems Journal, 638-644.
Nitu Dash, S. C. (2018). Intrusion Detection System Based on Principal Component Analysis and ML Techniques. International Journal of Engineering Development and Research, 359-367.
Kumar, G. K. (2021). Analysis of ML Algorithms with Feature Selection for Intrusion Detection Using Unsw-Nb15 Dataset. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.1, January 2021.
Khammassi, Chaouki & Krichen, Saoussen. (2017). A GA-LR Wrapper Approach for Feature Selection in Network Intrusion Detection. Computers & Security. 70. 10.1016/j.cose.2017.06.005.
G. Madhukar, G. N. (2019). An Intruder Detection System based on Feature Selection using RF Algorithm. International Journal of Engineering and Advanced Technology (IJEAT).
B. S. Bhati and C. S. Rai, ‘‘Analysis of support vector machine-based intrusion detection techniques,’’ Arabian J. Sci. Eng., vol. 45, no. 4, pp. 2371–2383, Apr. 2020.
Senthilnayaki, B., Venkatalakshmi, K., & Kannan, A. (2019). Intrusion detection system using set feature selection and modified KNN classifier. Int. Arab J. Inf. Technol., 16(4), 746-753.
Chakrawarti, A. ., & Shrivastava, S. S. . (2024). Enhancing Intrusion Detection System using Deep Q-Network Approaches based on Reinforcement Learning. International Journal of Intelligent Systems and Applications in Engineering, 12(12s), 34–45.
Soucy, P.; Mineau, G.W. A simple KNN algorithm for text categorization. In Proceedings of the 2001 IEEE International Conference on Data Mining, San Jose, CA, USA, 29 November–2 December 2001; pp. 647–648.
M. Kumar, M. Hanumanthappa and T. V. S. Kumar, "Intrusion Detection System using decision tree algorithm," 2012 IEEE 14th International Conference on Communication Technology, Chengdu, China, 2012, pp. 629-634, doi: 10.1109/ICCT.2012.6511281.
Belavagi, M. C., &Muniyal, B. (2016) “Performance evaluation of supervised machine learning algorithms for intrusion detection.” Procedia Computer Science 89(1): 117-123.
Ms.Nivedita Naidu, Dr.R.V.Dharaskar “An effective approach to network intrusion detection system using genetic algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 2, 2010.
Dini P, Elhanashi A, Begni A, Saponara S, Zheng Q, Gasmi K. Overview on ]Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity. Applied Sciences. 2023; 13(13):7507. ]https://doi.org/10.3390/app13137507.
S. S. Haykin. Neural networks and learning machines, volume 3. Pearson Upper Saddle River, NJ, USA: 2009
Chakrawarti, A. ., & Shrivastava, S. S. . (2024). Enhancing Intrusion Detection System using Deep Q-Network Approaches based on Reinforcement Learning. International Journal of Intelligent Systems and Applications in Engineering, 12(12s), 34–45.
M. Almseidin, M. Alzubi, S. Kovacs and M. Alkasassbeh, "Evaluation of machine learning algorithms for an intrusion detection system," 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia, 2017, pp. 000277-000282, doi: 10.1109/SISY.2017.8080566.
J. Manjula C. Belavagi and Balachandra Muniyal, “Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection” Twelfth International Multi-Conference on Information Processing- 2016.
Saranya, T., Sridevi, S., Deisy, C., Chung, T. D., & Khan, M. A. (2020). Performance analysis of machine learning algorithms in intrusion detection system: A review. Procedia Computer Science, 171, 1251-1260.
Mahmood, R. A. R. ., Abdi, A., & Hussin, M. . (2021). Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers. Baghdad Science Journal, 18(2(Suppl.), 0884. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0884.
M. Choubisa, R. Doshi, N. Khatri and K. Kant Hiran, "A Simple and Robust Approach of Random Forest for Intrusion Detection System in Cyber Security," 2022 International Conference on IoT and Blockchain Technology (ICIBT), Ranchi, India, 2022, pp. 1-5, doi: 10.1109/ICIBT52874.2022.9807766.
Mohammadi, Sara & Mirvaziri, H. & Ghazizadeh-Ahsaee, Mostafa & Karimipour, Hadis. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications. 44. 80-88. 10.1016/j.jisa.2018.11.007.
W. L. Al-Yaseen, Z. A. Othman, and M. Z. A. Nazri, “Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for an intrusion detection system,” Expert Systems with Applications, vol. 67, pp. 296–303, 2017.
Chua, T.-H.; Salam, I. Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset. Symmetry 2023, 15, 1251. https://doi.org/10.3390/sym15061251.
Thaseen, Sumaiya & Cherukuri, Aswani Kumar. (2016). Intrusion Detection Model Using a fusion of Chi-square feature selection and multi-class SVM. Journal of King Saud University - Computer and Information Sciences. 29. 10.1016/j.jksuci.2015.12.004.
Safura A. Mashayak, Balaji R. Bombade, (2019). Network Intrusion Detection Exploitation Machine Learning Strategies with the Utilization of Feature Elimination Mechanism. International Journal of Computer Sciences and Engineering, 7(5), 1292-1300
Bhavani T. T, Kameswara M. R and Manohar A. R. (2020). Network Intrusion Detection System using Random Forest and Decision Tree Machine Learning Techniques. International Conference on Sustainable Technologies for Computational Intelligence (ICSTCI). (pp. 637-643). Springer.
Ponthapalli R. et al. (2020). Implementation of Machine Learning Algorithms for Detection of Network Intrusion. International Journal of Computer Science Trends and Technology (IJCST). (163-169).
Lin, Wei-Chao & Ke, Shih-Wen & Tsai, Chih-Fong. (2015). CANN: An Intrusion Detection System Based on Combining Cluster Centers and Nearest Neighbors. Knowledge-Based Systems. 78. 10.1016/j.knosys.2015.01.009.
A. Aziz, Amira & Hanafi, Sanaa & Hassanien, Aboul Ella. (2016). Comparison of classification techniques applied for network intrusion detection and classification. Journal of Applied Logic. 24. 10.1016/j.jal.2016.11.018
Alkasassbeh and Almseidin. (2018). Machine Learning Methods for Network Intrusions. International Conference on Computing, Communication (ICCCNT). Arxiv.
Rasane, Komal & Bewoor, Laxmi & Meshram, Vishal. (2019). A Comparative Analysis of Intrusion Detection Techniques: Machine Learning Approach. SSRN Electronic Journal. 10.2139/ssrn.3418748.
Anwer, H.M., Farouk, M., & Abdel-Hamid, A.A. (2018). A framework for efficient network anomaly intrusion detection with features selection. 2018 9th International Conference on Information and Communication Systems (ICICS), 157-162.
Ravale, Ujwala & Marathe, Nilesh & Padiya, Puja. (2015). Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function. Procedia Computer Science. 45. 428-435. 10.1016/j.procs.2015.03.174.
Kotpalliwar MV, Wajgi R (2015) Classification of attacks using support vector machine (SVM) on KDD cup’99 IDS database. In: 2015 Fifth international conference on communication systems and network technologies. IEEE, pp 987–990
A, Anish Halimaa; Sundarakantham, K. (2019). [IEEE 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) - Tirunelveli, India (2019.4.23-2019.4.25)] 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) - Machine Learning Based Intrusion Detection System, 916–920. doi:10.1109/ICOEI.2019.8862784 .
Basheri, Mohammad & Iqbal, Javed & Raheem, A.. (2018). Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection. IEEE Access. PP. 1-1. 10.1109/ACCESS.2018.2841987.
S. Teng, N. Wu, H. Zhu, L. Teng, and W. Zhang, "SVM-DT-based adaptive and collaborative intrusion detection," in IEEE/CAA Journal of Automatica Sinica, vol. 5, no. 1, pp. 108-118, Jan. 2018, doi: 10.1109/JAS.2017.7510730.
D. Gupta, S. Singhal, S. Malik, and A. Intrusion detection system using data mining a review, "Network intrusion detection system using various data mining techniques," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-6, doi: 10.1109/RAINS.2016.7764418.
K. Goeschel, “Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis,” SoutheastCon 2016: IEEE, pp. 1–6, 2016.
S., Kumar, K., & Bhatnagar, V. (2021). Machine Learning Algorithms Performance Evaluation for Intrusion Detection. Journal of Information Technology Management, 13(1), 42-61. doi: 10.22059/jitm.2021.80024.
Aburomman, Abdulla & Reaz, Mamun Bin Ibne. (2016). Ensemble binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection. 636-640. 10.1109/IMCEC.2016.7867287.
Al-Jarrah, O. Y., Al-Hammdi, Y., Yoo, P. D., Muhaidat, S., & Al-Qutayri, M. (2018) “Semi-supervised multi-layered clustering model for intrusion detection.” Digital Communications and Networks 4(4): 277-286.
B. M. Irfan, V. Poornima, S. Mohana Kumar, U. S. Aswal, N. Krishnamoorthy and R. Maranan, "Machine Learning Algorithms for Intrusion Detection Performance Evaluation and Comparative Analysis," 2023 4th International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 2023, pp. 01-05, doi: 10.1109/ICOSEC58147.2023.10275831.
M. D. Rokade and Y. K. Sharma, “MLIDS: A Machine Learning Approach for Intrusion Detection for Real-Time Network Dataset,” in 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, Mar. 2021, pp. 533–536. doi: 10.1109/ESCI50559.2021.9396829.
S. Waskle, L. Parashar, and U. Singh, “Intrusion Detection System Using PCA with Random Forest Approach,” in 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, Jul. 2020, pp. 803–808. doi: 10.1109/ICESC48915.2020.9155656.
J. Gao, S. Chai, C. Zhang, B. Zhang and L. Cui, "A Novel Intrusion Detection System based on Extreme Machine Learning and Multi-Voting Technology," 2019 Chinese Control Conference (CCC), Guangzhou, China, 2019, pp. 8909-8914, doi: 10.23919/ChiCC.2019.8865258.
M. Zaman and C.-H. Lung, "Evaluation of machine learning techniques for network intrusion detection," NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 2018, pp. 1-5, doi: 10.1109/NOMS.2018.8406212.
Mazarbhuiya, Fokrul & Shenify, Mohamed. (2023). An Intuitionistic Fuzzy-Rough Set-Based Classification for Anomaly Detection. Applied Sciences (2023). 13. 1-21. 10.3390/app13095578.
Shen Kejia, Hamid Parvin, Sultan Noman Qasem, Bui Anh Tuan, and Kim-Hung Pho. 2020. A classification model based on SVM and fuzzy rough set for network intrusion detection. J. Intell. Fuzzy Syst. 39, 5 (2020), 6801–6817. https://doi.org/10.3233/JIFS-191621.
Sever, Hayri & Raoof Nasser, Ahmed. (2019). Host-based intrusion detection architecture based on rough set theory and machine learning. Journal of Engineering and Applied Sciences. 14. 415-422. 10.3923/jeasci.2019.415.422.
Zhang, Qiangyi & Qu, Yanpeng & Deng, Ansheng. (2018). Network Intrusion Detection Using Kernel-based Fuzzy-rough Feature Selection. 1-6. 10.1109/FUZZ-IEEE.2018.8491578.
Panigrahi, A., & Patra, M. R. (2016). Fuzzy Rough Classification Models for Network Intrusion Detection. Transactions on Engineering and Computing Sciences, 4(2), 07. https://doi.org/10.14738/tmlai.42.1882.
Kushal Jani, Punit Lalwani, Deepak Upadhyay, M.B. Potdar, Performance Evolution of Machine Learning Algorithms for Network Intrusion Detection System. International Journal of Computer Engineering and Technology, 9(5), 2018, pp. 181-189.
Kocher, Geeta & Kumar Ahuja, Dr. Gulshan. (2021). Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset. International Journal of Network Security & Its Applications. 13. 21-31. 10.5121/ijnsa.2021.13102.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.