Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS
DOI:
https://doi.org/10.26438/ijcse/v6i9.940943Keywords:
Network intrusion,, support vector machine, decision tree, Decision Tree, detectionAbstract
In traditional studies about the classification, there are three non-parametric classifiers, Random Forest (RF), kNearest Neighbor (kNN), and Support Vector Machine (SVM), has been said as the most classifiers at producing excessive accuracies. In this study, Tested and Compared the performances of the kNN, Naïve Baye, Decision Tree, Support Vector Machine, Random Forest, Logistic Regression and Combined model over DOS and Normal attacks. These algorithms are among the most influential data mining algorithms in the research community. The detection of fraudulent attacks is considered as a classification problem. In this experiments have performed on different classification methods with the hybrid model on KDDCup99 Dataset. Here compared classifiers using models accuracy with confusion matrix. Cross-Validation means score used for efficiency. For this experiments used python and R programming for implementation. The different types of attacks are routine, DoS, Probe attacks, R2L, and U2R attacks.
References
D.Dennin, ―An intrusion-detection model‖, IEEE Transactions on Software Engineering, 2007.
J. Frank,―Machine learning and intrusion detection: Current and future directions,‖ in Proceedings of the National 17th Computer Security Conference, Washington, D.C., 2014.
Lee, W., Stolfo, S., &Mok, K. ―A Data Mining Framework for Building Intrusion Detection Model.Proc‖. IEEE Symp. Security and Privacy, 120-132, 1999.
Amor, N. B., Benferhat, S., &Elouedi, Z., ―Naive Bayes vs. Decision Trees in Intrusion Detection Systems.Proc.‖ ACM Symp.Applied Computing, 420- 424, 2014.
Mukkamala, S., Janoski, G., &Sung, A., ―Intrusion detection using neural networks and support vector machines,‖ Paper presented at
the International Joint Conference. On Neural Networks (IJCNN), 2012.
Heba F. Eid, Ashraf Darwish, Aboul Ella Hassanien, and Ajith Abraham, ―Principal Components Analysis and Support Vector Machine based Intrusion Detection System,‖ IEEE, 2017.
T.Shon, Y. Kim, C.Lee and J.Moon, ―A Machine Learning Framework for Network Anomaly Detection using SVM and GA‖, Proceedings of the 2015 IEEE, 2015.
KyawThetKhaing (2010), Recursive Feature Elimination (RFE) and k-Nearest Neighbor (KNN) in SVM.
H. Liu and H. Motoda(1998), Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic.
N. Nanda, A. Parikh,―Classification and Technical Analysis of Network Intrusion Detection Systems,‖ International Journal of Advanced Research in Computer Science, Volume 8, No. 4, MayJune 2017.
N. Nanda, A. Parikh, ―Network Intrusion Detection System: Classification, Techniques and Datasets to Implement,‖ International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 4 Issue: 3 106 – 109,2018.
P. Tembhare, N. Shukla. ―An Integrated and Improved Scheme for Efficient Intrusion Detection in Cloud‖, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.74-78, June 2017.
P. Dehariya, ―An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System‖, International Journal of Scientific Research in Network Security and Communication, Volume-4, Issue-1, Feb- 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
