Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An Analysis of Intrusion Detection Classification using Supervised Machine Learning Algorithms on NSL-KDD Dataset

View through CrossRef
From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity. Anomaly based intrusion detection is a type of intrusion detection system that identifies anomalies. Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. The findings reveal which method performed better in terms of accuracy and running time.
Title: An Analysis of Intrusion Detection Classification using Supervised Machine Learning Algorithms on NSL-KDD Dataset
Description:
From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity.
Anomaly based intrusion detection is a type of intrusion detection system that identifies anomalies.
Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules.
The IDS with machine learning method improves the detection accuracy of the security attacks.
To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset.
The findings reveal which method performed better in terms of accuracy and running time.

Related Results

Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
CLASSIFYING THE SUPERVISED MACHINE LEARNING AND COMPARING THE PERFORMANCES OF THE ALGORITHMS
CLASSIFYING THE SUPERVISED MACHINE LEARNING AND COMPARING THE PERFORMANCES OF THE ALGORITHMS
Supervised Learning (SL), also recognized as SML, means Supervised Machine Learning. Its a subclass of AI (Artificial Intelligence) and Machine Learning (ML). Its defined by the co...
An Efficient Network Intrusion Detection and Classification System using Machine Learning
An Efficient Network Intrusion Detection and Classification System using Machine Learning
In today's digital landscape, network security is of paramount importance, with intrusion detection systems (IDS) playing a crucial role in protecting sensitive data from maliciou...
Network Intrusion Detection System Using Machine Learning
Network Intrusion Detection System Using Machine Learning
Abstract - This document discusses the creation of an intelligent Network Intrusion Detection System (NIDS) using Machine Learning (ML) for improved security of computer networks. ...
MIDS-GAN: Minority Intrusion Data Synthesizer GAN—An ACON Activated Conditional GAN for Minority Intrusion Detection
MIDS-GAN: Minority Intrusion Data Synthesizer GAN—An ACON Activated Conditional GAN for Minority Intrusion Detection
Intrusion Detection Systems (IDS) are vital to cybersecurity but suffer from severe class imbalance in benchmark datasets such as NSL-KDD and UNSW-NB15. Conventional oversampling m...
Security of Things Intrusion Detection System for Smart Healthcare
Security of Things Intrusion Detection System for Smart Healthcare
Web security plays a very crucial role in the Security of Things (SoT) paradigm for smart healthcare and will continue to be impactful in medical infrastructures in the near future...
Optimization Of Intrusion Detection Using Likely Point PSO And Enhanced LSTM-RNN Hybrid Technique In Communication Networks
Optimization Of Intrusion Detection Using Likely Point PSO And Enhanced LSTM-RNN Hybrid Technique In Communication Networks
“Intrusion detection system (IDS)” is a significant component of maintaining secure communication networks and all network managers have embraced it to their happiness.  Several me...

Back to Top