INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIII, Issue X, October 2024
www.ijltemas.in Page 191
The implementation of the models made use of forty-four (44) features from the dataset. The nine categories of network
intrusions in the UNSW NB15 dataset are Analysis, Backdoor, DoS, Exploits, Fuzzers, Generic, Reconnaissance, Shellcode, and
Worms. The classifiers were trained and tested using the percentage split (80:20), five-fold, and ten-fold cross-validation. The 10-
fold cross-validation produced the model with the highest prediction accuracy, which is why it is preferred in this research.
Accuracy, precision, recall, and F-measure were employed as performance indicators for evaluation. The network intrusion
detection models were created using the Weka Machine Learning workbench.
According to the findings obtained, J48 performed the best and had an average execution time. The execution time for RF was the
longest. KNN's execution time was the quickest, and its performance results were marginally worse than those of J48 and RF. In
conclusion, J48 offers the optimum balance between execution speed and performance.
Research Limitations
The project has limitations, even though this study presented and examined network intrusion detection models utilizing machine
learning techniques such as KNN, J48, RF, and Bayes Net. Based on research done by [13] features in the UNSW NB15 dataset
were chosen. Without examining how the chosen features may impact the developed models' accuracy of detection and recall,
they were used. Since smaller datasets are simpler to analyze, feature reduction poses a compromise between accuracy and
simplicity, the research used relatively little feature selection (dimensionality reduction).
Future Works
Future studies may expand the model construction to take into account additional techniques like neural networks and support
vector machines. Additionally, a distinct dataset can be utilized to train and test the models, ensuring that they can recognize
intrusions.
Conflicts of Interest
The authors declare that there are no conflicts of interest on the manuscript.
References
1. W. Steingartner, D. Galinec, and A. Kozina, “Threat defense: Cyber deception approach and education for resilience in
hybrid threats model,” Symmetry (Basel)., vol. 13, no. 4, pp. 1–25, 2021, doi: 10.3390/sym13040597.
2. A. V. Jatti and V. J. K. K. Sonti, “Intrusion Detection Systems: A Review,” Restaur. Bus., vol. 118, no. 7, pp. 50–58,
2019, doi: 10.26643/rb.v118i7.7246.
3. P. Panagiotou, N. Mengidis, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris, “Host-based Intrusion Detection Using
Signature-based and AI-driven Anomaly Detection Methods,” Inf. Secur. An Int. J., vol. 50, no. x, pp. 37–48, 2021, doi:
10.11610/isij.5016.
4. J. Ferdous, R. Islam, A. Mahboubi, and M. Z. Islam, “A Review of State-of-the-Art Malware Attack Trends and Defense
Mechanisms,” IEEE Access, vol. 11, no. October 2023, pp. 121118–121141, 2023, doi:
10.1109/ACCESS.2023.3328351.
5. B. Lampe and W. Meng, “Intrusion Detection in the Automotive Domain: A Comprehensive Review,” IEEE Commun.
Surv. Tutorials, vol. 25, no. 4, pp. 2356–2426, 2023, doi: 10.1109/COMST.2023.3309864.
6. T. U. Sheikh, H. Rahman, H. S. Al-Qahtani, T. Kumar Hazra, and N. U. Sheikh, “Countermeasure of Attack Vectors
using Signature-Based IDS in IoT Environments,” 2019 IEEE 10th Annu. Inf. Technol. Electron. Mob. Commun. Conf.
IEMCON 2019, pp. 1130–1136, 2019, doi: 10.1109/IEMCON.2019.8936231.
7. Stefanos Kiourkoulis, “DDoS Dataset - Use of machine learning to analyse intrusion detection performance,” Lulea
Univ. Technol., p. 81, 2020, [Online]. Available: https://www.kaggle.com/devendra416/ddos-datasets/data
8. M. Zakariah, S. A. AlQahtani, and M. S. Al-Rakhami, “Machine Learning-Based Adaptive Synthetic Sampling
Technique for Intrusion Detection,” Appl. Sci., vol. 13, no. 11, 2023, doi: 10.3390/app13116504.
9. J. P. Bharadiya, “A Tutorial on Principal Component Analysis for Dimensionality Reduction in Machine Learning,” Int.
J. Innov. Res. Sci. Eng. Technol., vol. 8, no. 5, pp. 2028–2032, 2023, doi: 10.5281/zenodo.8002436.
10. N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-
NB15 network data set),” 2015 Mil. Commun. Inf. Syst. Conf. MilCIS 2015 - Proc., pp. 1–6, 2015, doi:
10.1109/MilCIS.2015.7348942.
11. I. Almomani and M. Alenezi, “Efficient Denial of Service Attacks Detection in Wireless Sensor Networks,” J. Inf. Sci.
Eng., vol. 34, no. 4, pp. 977–1000, 2018, doi: 10.6688/JISE.201807_34(4).0011.
12. V. Kumar, A. K. Das, and D. Sinha, “UIDS: a unified intrusion detection system for IoT environment,” Evol. Intell., no.
0123456789, 2019, doi: 10.1007/s12065-019-00291-w.
13. U. Matthew, J. Kazaure, and N. Okafor, “Contemporary Development in E-Learning Education, Cloud Computing
Technology & Internet of Things,” EAI Endorsed Trans. Cloud Syst., vol. 7, no. 20, p. 169173, 2021, doi:
10.4108/eai.31-3-2021.169173.
14. D. Singh and B. Singh, “Investigating the impact of data normalization on classification performance,” Appl. Soft
Comput., vol. 97, no. xxxx, p. 105524, 2020, doi: 10.1016/j.asoc.2019.105524.