An Empirical Internet Protocol Network Intrusion Detection using Isolation Forest and One-Class Support Vector Machines
dc.contributor.author | Shu Fuhnwi, Gerard | |
dc.contributor.author | Adedoyin, Victoria | |
dc.contributor.author | Agbaje, Janet O. | |
dc.date.accessioned | 2023-11-06T23:28:48Z | |
dc.date.available | 2023-11-06T23:28:48Z | |
dc.date.issued | 2023-01 | |
dc.description.abstract | With the increasing reliance on web-based applications and services, network intrusion detection has become a critical aspect of maintaining the security and integrity of computer networks. This study empirically investigates internet protocol network intrusion detection using two machine learning techniques: Isolation Forest (IF) and One-Class Support Vector Machines (OC-SVM), combined with ANOVA F-test feature selection. This paper presents an empirical study comparing the effectiveness of two machine learning algorithms, Isolation Forest (IF) and One-Class Support Vector Machines (OC-SVM), with ANOVA F-test feature selection in detecting network intrusions using web services. The study used the NSL-KDD dataset, encompassing hypertext transfer protocol (HTTP), simple mail transfer protocol (SMTP), and file transfer protocol (FTP) web services attacks and normal traffic patterns, to comprehensively evaluate the algorithms. The performance of the algorithms is evaluated based on several metrics, such as the F1-score, detection rate (recall), precision, false alarm rate (FAR), and Area Under the Receiver Operating Characteristic (AUCROC) curve. Additionally, the study investigates the impact of different hyper-parameters on the performance of both algorithms. Our empirical results demonstrate that while both IF and OC-SVM exhibit high efficacy in detecting network intrusion attacks using web services of type HTTP, SMTP, and FTP, the One-Class Support Vector Machines outperform the Isolation Forest in terms of F1-score (SMTP), detection rate(HTTP, SMTP, and FTP), AUCROC, and a consistent low false alarm rate (HTTP). We used the t-test to determine that OCSVM statistically outperforms IF on DR and FAR. | en_US |
dc.identifier.citation | Fuhnwi, G. S., Adedoyin, V., & Agbaje, J. O. (2023). An Empirical Internet Protocol Network Intrusion Detection using Isolation Forest and One-Class Support Vector Machines. International Journal of Advanced Computer Science and Applications, 14(8). | en_US |
dc.identifier.issn | 2156-5570 | |
dc.identifier.uri | https://scholarworks.montana.edu/handle/1/18188 | |
dc.language.iso | en_US | en_US |
dc.publisher | The Science and Information Organization | en_US |
dc.rights | cc-by | en_US |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | en_US |
dc.subject | HTTP | en_US |
dc.subject | SMTP | en_US |
dc.subject | FTP | en_US |
dc.subject | ANOVA F-test | en_US |
dc.subject | AUCROC | en_US |
dc.subject | OC-SVMs | en_US |
dc.subject | FAR | en_US |
dc.subject | DR | en_US |
dc.subject | IF | en_US |
dc.title | An Empirical Internet Protocol Network Intrusion Detection using Isolation Forest and One-Class Support Vector Machines | en_US |
dc.type | Article | en_US |
mus.citation.extentfirstpage | 1 | en_US |
mus.citation.extentlastpage | 6 | en_US |
mus.citation.issue | 8 | en_US |
mus.citation.journaltitle | International Journal of Advanced Computer Science and Applications | en_US |
mus.citation.volume | 14 | en_US |
mus.identifier.doi | 10.14569/IJACSA.2023.0140801 | en_US |
mus.relation.college | College of Engineering | en_US |
mus.relation.department | Computer Science. | en_US |
mus.relation.university | Montana State University - Bozeman | en_US |
Files
Original bundle
1 - 1 of 1
- Name:
- fuhnwi-machines-2023.pdf
- Size:
- 220.09 KB
- Format:
- Adobe Portable Document Format
- Description:
- Internet protocol network
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: