An Empirical Internet Protocol Network Intrusion Detection using Isolation Forest and One-Class Support Vector Machines

dc.contributor.authorShu Fuhnwi, Gerard
dc.contributor.authorAdedoyin, Victoria
dc.contributor.authorAgbaje, Janet O.
dc.date.accessioned2023-11-06T23:28:48Z
dc.date.available2023-11-06T23:28:48Z
dc.date.issued2023-01
dc.description.abstractWith the increasing reliance on web-based applications and services, network intrusion detection has become a critical aspect of maintaining the security and integrity of computer networks. This study empirically investigates internet protocol network intrusion detection using two machine learning techniques: Isolation Forest (IF) and One-Class Support Vector Machines (OC-SVM), combined with ANOVA F-test feature selection. This paper presents an empirical study comparing the effectiveness of two machine learning algorithms, Isolation Forest (IF) and One-Class Support Vector Machines (OC-SVM), with ANOVA F-test feature selection in detecting network intrusions using web services. The study used the NSL-KDD dataset, encompassing hypertext transfer protocol (HTTP), simple mail transfer protocol (SMTP), and file transfer protocol (FTP) web services attacks and normal traffic patterns, to comprehensively evaluate the algorithms. The performance of the algorithms is evaluated based on several metrics, such as the F1-score, detection rate (recall), precision, false alarm rate (FAR), and Area Under the Receiver Operating Characteristic (AUCROC) curve. Additionally, the study investigates the impact of different hyper-parameters on the performance of both algorithms. Our empirical results demonstrate that while both IF and OC-SVM exhibit high efficacy in detecting network intrusion attacks using web services of type HTTP, SMTP, and FTP, the One-Class Support Vector Machines outperform the Isolation Forest in terms of F1-score (SMTP), detection rate(HTTP, SMTP, and FTP), AUCROC, and a consistent low false alarm rate (HTTP). We used the t-test to determine that OCSVM statistically outperforms IF on DR and FAR.en_US
dc.identifier.citationFuhnwi, G. S., Adedoyin, V., & Agbaje, J. O. (2023). An Empirical Internet Protocol Network Intrusion Detection using Isolation Forest and One-Class Support Vector Machines. International Journal of Advanced Computer Science and Applications, 14(8).en_US
dc.identifier.issn2156-5570
dc.identifier.urihttps://scholarworks.montana.edu/handle/1/18188
dc.language.isoen_USen_US
dc.publisherThe Science and Information Organizationen_US
dc.rightscc-byen_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_US
dc.subjectHTTPen_US
dc.subjectSMTPen_US
dc.subjectFTPen_US
dc.subjectANOVA F-testen_US
dc.subjectAUCROCen_US
dc.subjectOC-SVMsen_US
dc.subjectFARen_US
dc.subjectDRen_US
dc.subjectIFen_US
dc.titleAn Empirical Internet Protocol Network Intrusion Detection using Isolation Forest and One-Class Support Vector Machinesen_US
dc.typeArticleen_US
mus.citation.extentfirstpage1en_US
mus.citation.extentlastpage6en_US
mus.citation.issue8en_US
mus.citation.journaltitleInternational Journal of Advanced Computer Science and Applicationsen_US
mus.citation.volume14en_US
mus.identifier.doi10.14569/IJACSA.2023.0140801en_US
mus.relation.collegeCollege of Engineeringen_US
mus.relation.departmentComputer Science.en_US
mus.relation.universityMontana State University - Bozemanen_US

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
fuhnwi-machines-2023.pdf
Size:
220.09 KB
Format:
Adobe Portable Document Format
Description:
Internet protocol network

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:
Copyright (c) 2002-2022, LYRASIS. All rights reserved.