Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS

Authors

  • Nanda NB Research Scholar (Computer Science ) Gujarat Vidyapith, Ahmadabad-Gujarat, India
  • Parikh A Head Department of Computer Science Gujarat Vidyapith Ahmedabad-Gujarat, India

DOI:

https://doi.org/10.26438/ijcse/v6i9.940943

Keywords:

Network intrusion,, support vector machine, decision tree, Decision Tree, detection

Abstract

In traditional studies about the classification, there are three non-parametric classifiers, Random Forest (RF), kNearest Neighbor (kNN), and Support Vector Machine (SVM), has been said as the most classifiers at producing excessive accuracies. In this study, Tested and Compared the performances of the kNN, Naïve Baye, Decision Tree, Support Vector Machine, Random Forest, Logistic Regression and Combined model over DOS and Normal attacks. These algorithms are among the most influential data mining algorithms in the research community. The detection of fraudulent attacks is considered as a classification problem. In this experiments have performed on different classification methods with the hybrid model on KDDCup99 Dataset. Here compared classifiers using models accuracy with confusion matrix. Cross-Validation means score used for efficiency. For this experiments used python and R programming for implementation. The different types of attacks are routine, DoS, Probe attacks, R2L, and U2R attacks.

References

D.Dennin, ―An intrusion-detection model‖, IEEE Transactions on Software Engineering, 2007.

J. Frank,―Machine learning and intrusion detection: Current and future directions,‖ in Proceedings of the National 17th Computer Security Conference, Washington, D.C., 2014.

Lee, W., Stolfo, S., &Mok, K. ―A Data Mining Framework for Building Intrusion Detection Model.Proc‖. IEEE Symp. Security and Privacy, 120-132, 1999.

Amor, N. B., Benferhat, S., &Elouedi, Z., ―Naive Bayes vs. Decision Trees in Intrusion Detection Systems.Proc.‖ ACM Symp.Applied Computing, 420- 424, 2014.

Mukkamala, S., Janoski, G., &Sung, A., ―Intrusion detection using neural networks and support vector machines,‖ Paper presented at

the International Joint Conference. On Neural Networks (IJCNN), 2012.

Heba F. Eid, Ashraf Darwish, Aboul Ella Hassanien, and Ajith Abraham, ―Principal Components Analysis and Support Vector Machine based Intrusion Detection System,‖ IEEE, 2017.

T.Shon, Y. Kim, C.Lee and J.Moon, ―A Machine Learning Framework for Network Anomaly Detection using SVM and GA‖, Proceedings of the 2015 IEEE, 2015.

KyawThetKhaing (2010), Recursive Feature Elimination (RFE) and k-Nearest Neighbor (KNN) in SVM.

H. Liu and H. Motoda(1998), Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic.

N. Nanda, A. Parikh,―Classification and Technical Analysis of Network Intrusion Detection Systems,‖ International Journal of Advanced Research in Computer Science, Volume 8, No. 4, MayJune 2017.

N. Nanda, A. Parikh, ―Network Intrusion Detection System: Classification, Techniques and Datasets to Implement,‖ International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 4 Issue: 3 106 – 109,2018.

P. Tembhare, N. Shukla. ―An Integrated and Improved Scheme for Efficient Intrusion Detection in Cloud‖, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.74-78, June 2017.

P. Dehariya, ―An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System‖, International Journal of Scientific Research in Network Security and Communication, Volume-4, Issue-1, Feb- 2016.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i9.940943
Published: 2025-11-15

How to Cite

[1]
N. B. Nanda and A. Parikh, “Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS”, Int. J. Comp. Sci. Eng., vol. 6, no. 9, pp. 940–943, Nov. 2025.

Issue

Section

Research Article