Open Access   Article Go Back

Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS

Nilesh B. Nanda1 , Ajay Parikh2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 940-943, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.940943

Online published on Sep 30, 2018

Copyright © Nilesh B. Nanda , Ajay Parikh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nilesh B. Nanda , Ajay Parikh, “Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.940-943, 2018.

MLA Style Citation: Nilesh B. Nanda , Ajay Parikh "Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS." International Journal of Computer Sciences and Engineering 6.9 (2018): 940-943.

APA Style Citation: Nilesh B. Nanda , Ajay Parikh, (2018). Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS. International Journal of Computer Sciences and Engineering, 6(9), 940-943.

BibTex Style Citation:
@article{Nanda_2018,
author = {Nilesh B. Nanda , Ajay Parikh},
title = {Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {940-943},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2967},
doi = {https://doi.org/10.26438/ijcse/v6i9.940943}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.940943}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2967
TI - Experimental Analysis of k-Nearest Neighbor, Decision Tree, Naive Baye, Support Vector Machine, Logistic Regression and Random Forest Classifiers with Combined Classifier Approach for NIDS
T2 - International Journal of Computer Sciences and Engineering
AU - Nilesh B. Nanda , Ajay Parikh
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 940-943
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
447 291 downloads 219 downloads
  
  
           

Abstract

In traditional studies about the classification, there are three non-parametric classifiers, Random Forest (RF), k-Nearest Neighbor (kNN), and Support Vector Machine (SVM), has been said as the most classifiers at producing excessive accuracies. In this study, Tested and Compared the performances of the kNN, Naïve Baye, Decision Tree, Support Vector Machine, Random Forest, Logistic Regression and Combined model over DOS and Normal attacks. These algorithms are among the most influential data mining algorithms in the research community. The detection of fraudulent attacks is considered as a classification problem. In this experiments have performed on different classification methods with the hybrid model on KDDCup99 Dataset. Here compared classifiers using models accuracy with confusion matrix. Cross-Validation means score used for efficiency. For this experiments used python and R programming for implementation. The different types of attacks are routine, DoS, Probe attacks, R2L, and U2R attacks.

Key-Words / Index Term

Network intrusion, support vector machine, decision tree, Decision Tree, detection

References

[1] D.Dennin, “An intrusion-detection model”, IEEE Transactions on Software Engineering, 2007.
[2] J. Frank,“Machine learning and intrusion detection: Current and future directions,” in Proceedings of the National 17th Computer Security Conference, Washington, D.C., 2014.
[3] Lee, W., Stolfo, S., &Mok, K. “A Data Mining Framework for Building Intrusion Detection Model.Proc”. IEEE Symp. Security and Privacy, 120-132, 1999.
[4] Amor, N. B., Benferhat, S., &Elouedi, Z., “Naive Bayes vs. Decision Trees in Intrusion Detection Systems.Proc.” ACM Symp.Applied Computing, 420- 424, 2014.
[5] Mukkamala, S., Janoski, G., &Sung, A., “Intrusion detection using neural networks and support vector machines,” Paper presented at the International Joint Conference. On Neural Networks (IJCNN), 2012.
[6] Heba F. Eid, Ashraf Darwish, Aboul Ella Hassanien, and Ajith Abraham, “Principal Components Analysis and Support Vector Machine based Intrusion Detection System,” IEEE, 2017.
[7] T.Shon, Y. Kim, C.Lee and J.Moon, “A Machine Learning Framework for Network Anomaly Detection using SVM and GA”, Proceedings of the 2015 IEEE, 2015.
[8] KyawThetKhaing (2010), Recursive Feature Elimination (RFE) and k-Nearest Neighbor (KNN) in SVM.
[9] H. Liu and H. Motoda(1998), Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic.
[10] N. Nanda, A. Parikh,“Classification and Technical Analysis of Network Intrusion Detection Systems,” International Journal of Advanced Research in Computer Science, Volume 8, No. 4, May-June 2017.
[11] N. Nanda, A. Parikh, “Network Intrusion Detection System: Classification, Techniques and Datasets to Implement,” International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 4 Issue: 3 106 – 109,2018.
[12] P. Tembhare, N. Shukla. “An Integrated and Improved Scheme for Efficient Intrusion Detection in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.74-78, June 2017.
[13] P. Dehariya, “An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System”, International Journal of Scientific Research in Network Security and Communication, Volume-4, Issue-1, Feb- 2016.