Feature Selection-Based Evaluation for Network Intrusion Detection System with Machine Learning Methods on CICIDS2017

  • Conference paper
  • First Online:
Communication and Intelligent Systems (ICCIS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 969))

Included in the following conference series:

  • 35 Accesses

Abstract

Network attacks endanger the privacy and security of information. As a consequence of this, an effective mechanism is required for identifying network attacks. In this study, we show NIDS to increase classification accuracy by using the feature selection method, using various machine learning techniques, and comparing our model with various algorithms to improve features, a filter method as information gains importance is used and classified with machine learning methods like DT, RF, NB,LR, and KNN, and comparative analysis shows among algorithms. The simulation demonstrates that the proposed system outperforms baseline accuracy, precision, recall, and F-measure methods. For the CICIDS2017 dataset, the detection rate and false alarm rate of various forms of assault were higher than average. The analysis shows that our analysis has an impressive level of accuracy in classifying the NIDS with the CICIDS2017 dataset. Among all algorithms, Random Forest performed best with 95% accuracy and 93% F1-score.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Venkatesan S (2023) Design an intrusion detection system based on feature selection using ml algorithms. Math Stat Eng Appl 72(1):702–710

    Google Scholar 

  2. Sinclair C, Pierce L, Matzner S (1999) An application of machine learning to network intrusion detection. In: Proceedings 15th annual computer security applications conference (ACSAC’99). IEEE, pp 371–377

    Google Scholar 

  3. Patgiri R, Varshney U, Akutota T, Kunde R (2018) An investigation on intrusion detection system using machine learning. In: 2018 IEEE symposium series on computational intelligence (SSCI). IEEE, pp 1684–1691

    Google Scholar 

  4. Vaidya TS (2023) Identifying inappropriate access points using machine learning algorithms randomforest and knn. Ph.D. dissertation, Dublin, National College of Ireland

    Google Scholar 

  5. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108–116

    Google Scholar 

  6. Hossain MA, Islam MS (2023) Ensuring network security with a robust intrusion detection system using ensemble-based machine learning. Array 100306

    Google Scholar 

  7. Abdulganiyu OH, Ait Tchakoucht T, Saheed YK (2023) A systematic literature review for network intrusion detection system (ids). In: International journal of information security, pp 1–38

    Google Scholar 

  8. Thakkar A, Lohiya R (2023) Attack classification of imbalanced intrusion data for iot network using ensemble learning-based deep neural network. IEEE IoT J

    Google Scholar 

  9. Quinlan JR (1986) Induction of decision trees. Mach Learn 1:81–106

    Article  Google Scholar 

  10. Belavagi MC, Muniyal B (2016) Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput Sci 89:117–123

    Article  Google Scholar 

  11. Biau G, Scornet E (2016) A random forest guided tour. Test 25:197–227

    Article  MathSciNet  Google Scholar 

  12. Bhatia N, et al (2010) Survey of nearest neighbor techniques. Ar**v preprint ar**v:1007.0085

  13. Brewer WF (2009) Naïve theories of observational astronomy: Review, analysis, and theoretical implications. In: International handbook of research on conceptual change, pp 183–232

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lav Upadhyay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Upadhyay, L., Tripathi, M., Grover, J. (2024). Feature Selection-Based Evaluation for Network Intrusion Detection System with Machine Learning Methods on CICIDS2017. In: Sharma, H., Shrivastava, V., Tripathi, A.K., Wang, L. (eds) Communication and Intelligent Systems. ICCIS 2023. Lecture Notes in Networks and Systems, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-97-2082-8_24

Download citation

Publish with us

Policies and ethics

Navigation