Abstract
In recent years, numerous machine learning classifiers have been applied to improve network infiltration. Due to the exponential growth of data, new technologies are needed to handle such massive amounts of data in a timely manner. The machine learning classifiers are trained on datasets for intrusion detection. In this study, we used the feature selection technique to choose the best dataset characteristics for machine learning and then performed binary classification to distinguish the intrusive traffic from the normal one using four machine learning algorithms, including Decision Tree, Support Vector Machine, Random Forest, and Naive Bayes in the UNSW-NB15 data set on Apache Spark framework. The performance of classifiers is evaluated in terms of accuracy, precision, recall, and F1-score for a comparative analysis of the various machine learning classifiers.
Original language | American English |
---|---|
Title of host publication | IEEE 13th Annual Computing and Communication Workshop and Conference, CCWC 2023 |
Editors | Rajashree Paul |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 1260-1266 |
Number of pages | 7 |
ISBN (Electronic) | 9798350332865 |
DOIs | |
State | Published - Apr 18 2023 |
Event | IEEE Annual Computing and Communication Workshop and Conference - Virtual, Online Duration: Mar 8 2023 → Mar 11 2023 Conference number: 13 https://ieeexplore.ieee.org/servlet/opac?punumber=10099037 |
Publication series
Name | IEEE Annual Computing and Communication Workshop and Conference (CCWC) Proceedings |
---|
Conference
Conference | IEEE Annual Computing and Communication Workshop and Conference |
---|---|
Abbreviated title | CCWC |
Period | 03/8/23 → 03/11/23 |
Internet address |
Scopus Subject Areas
- Artificial Intelligence
- Computer Networks and Communications
- Computer Science Applications
- Computer Vision and Pattern Recognition
- Information Systems and Management
- Control and Optimization
- Instrumentation
Disciplines
- Computer Sciences
Keywords
- Big Data
- Botnet
- Cluster computing
- Conferences
- Intrusion detection
- Machine learning algorithms
- Support vector machines