4.5 Article

Machine learning approaches to network intrusion detection for contemporary internet traffic

Journal

COMPUTING
Volume 104, Issue 5, Pages 1061-1076

Publisher

SPRINGER WIEN
DOI: 10.1007/s00607-021-01050-5

Keywords

Machine learning; Network intrusion detection system; CSE-CIC-IDS2018; Malware

Funding

  1. University of Jeddah, Jeddah, Saudi Arabia [UJ-02-011-DR]

Ask authors/readers for more resources

This article discusses the importance of network intrusion detection systems in protecting computing infrastructure from external attacks, and presents five different Machine Learning classifiers developed using the CSE-CIC-IDS2018 dataset. The article points out that the significant Internet trends of the last two decades demand a reevaluation and redevelopment of intrusion detectors.
All organizations, be they businesses, governments, infrastructure or utility providers, depend on the availability and functioning of their computers, computer networks and data centers for all or part of their operations. Network intrusion detection systems are the first line of defense that protect computing infrastructure from external attacks. In this study we develop five different Machine Learning classifiers for a number of attacks. We used the CSE-CIC-IDS2018 dataset, developed in a collaborative effort between the Communications Security Establishment and the Canadian Institute for Cybersecurity. It is an extensive network traffic trace dataset that captures multiple attacks and has become available relatively recently. The previous major dataset used for the development of network intrusion detection systems is the KDD Cup'99 dataset, now going on 22 years, which predates mobile computing, Web 2.0/3.0, social media, streaming video and widespread use of SSL. These significant Internet trends of the last two decades demand a reevaluation and redevelopment of intrusion detectors. Prior studies that designed Machine Learning classifiers using the CSE-CIC-IDS2018 dataset use a large and rich set of features, of which at least one is not dataset-invariant. Almost none have explored the appropriateness of using all available features with datasets containing only a few hundred attack class samples. The classifiers developed in this study rely on a justifiable number of features and their performance is reviewed for stability and generalization by reporting not just average performance over 10 fold cross-validation but also the degree of variation from one fold to the next.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available