With the tremendous growth of the Internet and the continuous increase in malicious attacks on corporate networks, Intrusion Detection Systems (IDS) have been designed and adopted by organizations to accurately detect intrusion and other malicious activities. But these IDSs still suffer from setbacks such as False Positives (FP), low detection accuracy and False Negatives (FN). To enhance the performance of IDSs, machine learning classifiers are used to aid detection accuracy and greatly reduce the false positive and false negative rate. In this research we have evaluated six classifiers such as Decision Tree (J48), Random Forest (RF), K-Nearest Neighbor (K-NN), Nave Bayes (NB), Support Vector Machine (SVM) and Artificial Neural Networks (ANN) on three different types of datasets such as NSL-KDD, UNSW-NB15 and Phishing dataset. Our results show that K-NN and J48 are the best performing classifiers when it comes to detection accuracy, testing time and false positive rate.
|Publication status||Published - 30 Oct 2018|
|Event||28th International Conference on Computer Theory and Applications - Alexandria, Egypt|
Duration: 30 Oct 2018 → 1 Nov 2018
|Conference||28th International Conference on Computer Theory and Applications|
|Abbreviated title||ICCTA 2018|
|Period||30/10/18 → 1/11/18|