Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Empirical Analysis of Data Streaming and Batch Learning Models for Network Intrusion Detection

View through CrossRef
Network intrusion, such as denial of service, probing attacks, and phishing, comprises some of the complex threats that have put the online community at risk. The increase in the number of these attacks has given rise to a serious interest in the research community to curb the menace. One of the research efforts is to have an intrusion detection mechanism in place. Batch learning and data streaming are approaches used for processing the huge amount of data required for proper intrusion detection. Batch learning, despite its advantages, has been faulted for poor scalability due to the constant re-training of new training instances. Hence, this paper seeks to conduct a comparative study using selected batch learning and data streaming algorithms. The batch learning and data streaming algorithms considered are J48, projective adaptive resonance theory (PART), Hoeffding tree (HT) and OzaBagAdwin (OBA). Furthermore, binary and multiclass classification problems are considered for the tested algorithms. Experimental results show that data streaming algorithms achieved considerably higher performance in binary classification problems when compared with batch learning algorithms. Specifically, binary classification produced J48 (94.73), PART (92.83), HT (98.38), and OBA (99.67), and multiclass classification produced J48 (87.66), PART (87.05), HT (71.98), OBA (82.80) based on accuracy. Hence, the use of data streaming algorithms to solve the scalability issue and allow real-time detection of network intrusion is highly recommended.
Title: Empirical Analysis of Data Streaming and Batch Learning Models for Network Intrusion Detection
Description:
Network intrusion, such as denial of service, probing attacks, and phishing, comprises some of the complex threats that have put the online community at risk.
The increase in the number of these attacks has given rise to a serious interest in the research community to curb the menace.
One of the research efforts is to have an intrusion detection mechanism in place.
Batch learning and data streaming are approaches used for processing the huge amount of data required for proper intrusion detection.
Batch learning, despite its advantages, has been faulted for poor scalability due to the constant re-training of new training instances.
Hence, this paper seeks to conduct a comparative study using selected batch learning and data streaming algorithms.
The batch learning and data streaming algorithms considered are J48, projective adaptive resonance theory (PART), Hoeffding tree (HT) and OzaBagAdwin (OBA).
Furthermore, binary and multiclass classification problems are considered for the tested algorithms.
Experimental results show that data streaming algorithms achieved considerably higher performance in binary classification problems when compared with batch learning algorithms.
Specifically, binary classification produced J48 (94.
73), PART (92.
83), HT (98.
38), and OBA (99.
67), and multiclass classification produced J48 (87.
66), PART (87.
05), HT (71.
98), OBA (82.
80) based on accuracy.
Hence, the use of data streaming algorithms to solve the scalability issue and allow real-time detection of network intrusion is highly recommended.

Related Results

Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
A Field Streaming - Potential Experiment
A Field Streaming - Potential Experiment
Abstract Streaming-potential experiments were conducted within the Muddy- and Dakota-sandstone interval of a Denver basin well. Analysis of the data shows that, f...
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Technology and its growth is considerably enormous. This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc netwo...
TELESPECTADORES E TELENOVELA NO STREAMING: UM ESTUDO EXPLORATÓRIO SOBRE O CONSUMO DE BELEZA FATAL
TELESPECTADORES E TELENOVELA NO STREAMING: UM ESTUDO EXPLORATÓRIO SOBRE O CONSUMO DE BELEZA FATAL
O trabalho se alicerça na reflexão sobre o comportamento dos telespectadores de telenovelas no streaming, com Beleza Fatal, lançada pela plataforma Max, em 2025, como ponto de anál...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...

Back to Top