Abstract
Data has been increasing exponentially over the past few years. This has introduced a variety of anomalies and security threats in the field of networking. Because of this, Intrusion Detection Systems (IDS) have become popular. An IDS is a network trafficking monitoring system that detects any suspicious activity and alerts the administrator when it is found. An IDS is generally prone to false alarms. Therefore, there is a need to fine-tune them. Using Machine Learning and Deep Learning techniques, one can build such systems which are accurate in detection of malicious activities. Previously, KDDCUP99 dataset has been used for most of the research purposes. However, the dataset is old and doesn’t justify the intrusions and malicious activities that occur now. Therefore, we have made the use of UNSW-NB15dataset (Moustafa and Slay, 2015 Military communications and information systems conference (MilCIS), 2015) which is an upgraded version of KDDCUP99 dataset and is more uniform and balanced. We have used various machine learning and deep learning algorithms like Logistic Regression (LR), Decision Trees (DT), Random Forest (RF), Naïve Bayes (NB), Support Vector Machine (SVM) and Artificial Neural Networks (ANN) to classify whether it was a network intrusion or not. It has been found that SVM, DT, ANN and NB gave a hundred percent accuracy whereas the Random Forest model gave an accuracy of 99.9%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
N. Moustafa, J. Slay, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), in 2015 Military Communications and Information Systems Conference (MilCIS) (2015)
K. Ee, L.I. Zhichun, G. Jiang, L. Korts-Parn, Z. Wu, Y. Sun, Host level detect mechanism for malicious DNS activities, in Host Level Detect Mechanism for Malicious DNS Activities. U.S. Patent Appl. 15, vol. 644 (2018)
S.S. Soniya, S.M.C. Vigila, Intrusion detection system: classification and techniques, in 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (2016)
E. Spafford, D. Zamboni, Data collection mechanisms for intrusion detection systems, in CERIAS Technical Report (Center for Education and Research in Information Assurance and Security, West Lafayette, 2000), pp. 41315–47907
S.M. Kasongo, Y. Sun, Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J. Big Data 7(1) (2020)
I. Ahmad, Q.E. Ul Haq, M. Imran, M.O. Alassafi, R.A. AlGhamdi, An efficient network intrusion detection and classification system. Mathematics 10(3), 530 (2022)
D. **g, H.-B. Chen, SVM based network intrusion detection for the UNSW-NB15 dataset, in 2019 IEEE 13th International Conference on ASIC (ASICON) (2019)
N. Sharma, N.S. Yadav, Ensemble learning based classification of UNSW-NB15 dataset using exploratory data analysis, in 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) (2021)
B.S. Bhati, C.S. Rai, B. Balamurugan, F. Al-Turjman, An intrusion detection scheme based on the ensemble of discriminant classifiers. Comput. Electr. Eng. 86(106742), 106742 (2020)
S. Choudhary, N. Kesswani, Analysis of KDD-cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Comput. Sci. 167, 1561–1573 (2020)
S. Naseer et al., Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231–48246 (2018)
I.H. Sarker, Y.B. Abushark, F. Alsolami, A.I. Khan, IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry (Basel) 12(5), 754 (2020)
J. Ren, J. Guo, W. Qian, H. Yuan, X. Hao, H. **g**g, Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Secur. Commun. Netw. 2019, 1–11 (2019)
J. Tarun, et al., Machine learning techniques for prediction of mental health, in 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA) (IEEE, 2021)
T. Jain, P. Garg, N. Chalil, A. Sinha, V.K. Verma, R. Gupta, SMS spam classification using machine learning techniques, in 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2022), pp. 273–279. https://doi.org/10.1109/Confluence52989.2022.9734128
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jain, T., Kalra, N., Panwar, D., Sinha, A. (2023). Security Attack Detection Using Machine Learning and Deep Learning. In: Bhardwaj, T., Upadhyay, H., Sharma, T.K., Fernandes, S.L. (eds) Artificial Intelligence in Cyber Security: Theories and Applications. Intelligent Systems Reference Library, vol 240. Springer, Cham. https://doi.org/10.1007/978-3-031-28581-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-28581-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28580-6
Online ISBN: 978-3-031-28581-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)