1. Machine learning for misuse-based network intrusion detection: overview, unified evaluation and feature choice comparison framework
- Author
-
Nele Mentens, Toon Goedemé, and Laurens Le Jeune
- Subjects
General Computer Science ,Computer science ,Feature extraction ,02 engineering and technology ,security ,Machine learning ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,General Materials Science ,Intrusion detection ,Network packet ,business.industry ,Deep learning ,General Engineering ,020206 networking & telecommunications ,neural networks ,Telecommunications network ,TK1-9971 ,Workflow ,machine learning ,020201 artificial intelligence & image processing ,Anomaly detection ,Artificial intelligence ,Electrical engineering. Electronics. Nuclear engineering ,business ,Wireless sensor network ,computer - Abstract
Network Intrusion detection systems are essential for the protection of advanced communication networks. Originally, these systems were hard-coded to identify specific signatures, patterns and rule violations; now artificial intelligence and machine learning algorithms provide promising alternatives. However, in the literature, various outdated datasets as well as a plethora of different evaluation metrics are used to prove algorithm efficacy. To enable a global comparison, this study compiles algorithms for different configurations to create common ground and proposes two new evaluation metrics. These metrics, the detection score and the identification score, together reliably present the performance of a network intrusion detection system to allow for practical comparison on a large scale. Additionally, we present a workflow to process raw packet flows into input features for machine learning. This framework quickly implements different algorithms for the various datasets and allows systematic performance comparison between those algorithms. Our experimental results, matching and surpassing the state-of-the-art, indicate the potential of this approach. As raw traffic input features are much easier and cheaper to extract when compared to traditional features, they show promise for application in real-time deep learning-based systems. ispartof: Ieee Access vol:9 pages:63995-64015 status: published
- Published
- 2022