IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i3p530-d744493.html
   My bibliography  Save this article

An Efficient Network Intrusion Detection and Classification System

Author

Listed:
  • Iftikhar Ahmad

    (Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia)

  • Qazi Emad Ul Haq

    (Center of Excellence in Cybercrime and Digital Forensics (CoECDF), Naif Arab University for Security Sciences (NAUSS), Riyadh 14812, Saudi Arabia)

  • Muhammad Imran

    (School of Engineering, Information Technology and Physical Science, Federation University, Brisbane 4000, Australia)

  • Madini O. Alassafi

    (Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia)

  • Rayed A. AlGhamdi

    (Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia)

Abstract

Intrusion detection in computer networks is of great importance because of its effects on the different communication and security domains. The detection of network intrusion is a challenge. Moreover, network intrusion detection remains a challenging task as a massive amount of data is required to train the state-of-the-art machine learning models to detect network intrusion threats. Many approaches have already been proposed recently on network intrusion detection. However, they face critical challenges owing to the continuous increase in new threats that current systems do not understand. This paper compares multiple techniques to develop a network intrusion detection system. Optimum features are selected from the dataset based on the correlation between the features. Furthermore, we propose an AdaBoost-based approach for network intrusion detection based on these selected features and present its detailed functionality and performance. Unlike most previous studies, which employ the KDD99 dataset, we used a recent and comprehensive UNSW-NB 15 dataset for network anomaly detection. This dataset is a collection of network packets exchanged between hosts. It comprises 49 attributes, including nine types of threats such as DoS, Fuzzers, Exploit, Worm, shellcode, reconnaissance, generic, and analysis Backdoor. In this study, we employ SVM and MLP for comparison. Finally, we propose AdaBoost based on the decision tree classifier to classify normal activity and possible threats. We monitored the network traffic and classified it into either threats or non-threats. The experimental findings showed that our proposed method effectively detects different forms of network intrusions on computer networks and achieves an accuracy of 99.3% on the UNSW-NB15 dataset. The proposed system will be helpful in network security applications and research domains.

Suggested Citation

  • Iftikhar Ahmad & Qazi Emad Ul Haq & Muhammad Imran & Madini O. Alassafi & Rayed A. AlGhamdi, 2022. "An Efficient Network Intrusion Detection and Classification System," Mathematics, MDPI, vol. 10(3), pages 1-15, February.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:3:p:530-:d:744493
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/3/530/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/3/530/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Yali Yuan & Liuwei Huo & Yachao Yuan & Zhixiao Wang, 2019. "Semi-supervised tri-Adaboost algorithm for network intrusion detection," International Journal of Distributed Sensor Networks, , vol. 15(6), pages 15501477198, June.
    2. Ariyaluran Habeeb, Riyaz Ahamed & Nasaruddin, Fariza & Gani, Abdullah & Targio Hashem, Ibrahim Abaker & Ahmed, Ejaz & Imran, Muhammad, 2019. "Real-time big data processing for anomaly detection: A Survey," International Journal of Information Management, Elsevier, vol. 45(C), pages 289-307.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Dusmurod Kilichev & Wooseong Kim, 2023. "Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO," Mathematics, MDPI, vol. 11(17), pages 1-31, August.
    2. Rashid Ali & Hyung Seok Kim, 2022. "Applied Mathematics for 5th Generation (5G) and beyond Communication Systems," Mathematics, MDPI, vol. 10(16), pages 1-2, August.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ransome Epie Bawack & Samuel Fosso Wamba & Kevin Daniel André Carillo & Shahriar Akter, 2022. "Artificial intelligence in E-Commerce: a bibliometric study and literature review," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 297-338, March.
    2. Ramin Moghaddass & Yongtao Guan, 2022. "Optimal Frameworks for Detecting Anomalies in Sensor-Intensive Heterogeneous Networks," INFORMS Journal on Computing, INFORMS, vol. 34(5), pages 2583-2610, September.

    More about this item

    Keywords

    AdaBoost; network intrusion; decision tree; SVM; MLP; UNSW-NB15;
    All these keywords.

    JEL classification:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:3:p:530-:d:744493. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.