##plugins.themes.bootstrap3.article.main##

The research work titled “Smart Intrusion Detection System Comprised of Machine Learning and Deep Learning” was published in European Journal for Engineering and Technology Research (EJERS) online journal in the October edition where a smart IDS model was proposed. In this present work, validation of the IDS model is conducted.

KDD Cup'99 intrusion detection dataset was used to build the IDS model. A unique method is incorporated to test the performance of the model. Here, training is conducted by using the KDD'99 dataset. But testing is done through the NSL-KDD dataset. Testing is conducted in three-stage. In the first stage, using generic 41 features the accuracy, sensitivity, and FPR of detecting attack was 95.240%, 93.103%, 1.936% respectively for Random Forest and for MLP it is 87.811%, 90.065%, and 15.168% respectively. In the second stage selective 15 features are used where accuracy, sensitivity, and FPR of detecting attack is 70.808%, 81.992%, 43.971% respectively for Random Forest and for MLP it is 67.637%, 87.660%, 54.266% respectively. In the third stage selective 22 features are used where accuracy, sensitivity, and FPR of detecting attack is 97.001%, 96.643%, 2.272% for Random Forest respectively and for MLP it is 85.442%, 82.350 and 10.472 respectively. Total 3,11,021 record is used for training and 22,544 record is used for testing purpose.

The final accuracy, sensitivity and FPR of the model can be resulted as 95.24%, 70.808%, 96.988% for 41 features, 93.103%, 87.68%, 97.233% for 15 features, 1.936%, 43.97%, 3.36% for 22 features. Therefore, the IDS model is efficient and effective.

Downloads

Download data is not yet available.

References

  1. Brij B. Gupta and Michael Sheng, "Machine Learning for Computer and Cyber Security," CRC Press. Preface.
     Google Scholar
  2. Clarence Chio & David Freeman, "Machine Learning & Security," O'REILLY.P-12-13.
     Google Scholar
  3. Shah Md. Istiaque, Asif Iqbal Khan, Sahhad Waheed, "Smart Intrusion Detection System Comprised of Machine Learning and Deep Learning," EJERS, European Journal of Engineering and Technology Research, Vol. 5, No. 10, October 2020. P-4.
     Google Scholar
  4. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html/Accessed on 10 December 2020.
     Google Scholar
  5. https://www.unb.ca/cic/datasets/nsl.html /Accessed on 10 December 2020.
     Google Scholar
  6. https://towardsdatascience.com/understanding-random-forest-58381e0602d2/Accessed on 25 Aug 2020.
     Google Scholar
  7. https://medium.com/@xzz201920/multi-layer-perceptron-mlp-4e5c020fd28a/Accessed on 25 Aug 2020.
     Google Scholar
  8. https://jupyternotebook.readthedocs.io/en/stable/examples/Notebook/What%20is%20the%20Jupyter%20Notebook.html Accessed on 10 December 2020.
     Google Scholar
  9. Shah Md. Istiaque, Asif Iqbal Khan, Sahhad Waheed, "Smart Intrusion Detection System Comprised of Machine Learning and Deep Learning," EJERS, European Journal of Engineering and Technology Research, Vol. 5, No. 10, October 2020. P-4.
     Google Scholar
  10. Shah Md. Istiaque, Asif Iqbal Khan, Sahhad Waheed, "Smart Intrusion Detection System Comprised of Machine Learning and Deep Learning," EJERS, European Journal of Engineering and Technology Research, Vol. 5, No. 10, October 2020. P-4-5.
     Google Scholar