Mengoptimalkan Deteksi Intrusi Jaringan: Perbandingan SVM dan KNN Menggunakan Dataset KddCup99
Abstract
Network security is becoming increasingly critical with the rising complexity of cyber attacks. Intrusion Detection Systems (IDS) play a crucial role in monitoring and identifying suspicious activities in real-time. This study compares two machine learning algorithms, Support Vector Machine (SVM) and K-Nearest Neighbors (KNN), in detecting attacks using the KDD Cup 99 dataset. The experimental results show that KNN outperforms SVM in terms of accuracy, precision, recall, and F1-score. KNN is more effective in classifying overall data, while SVM is efficient in managing false positives and handling high-dimensional data. Both algorithms have their respective strengths and weaknesses, so the choice of algorithm should be tailored to the specific characteristics of the data and detection requirements. This research provides valuable insights into selecting the appropriate algorithm to enhance the effectiveness of network intrusion detection in the future.
Keywords
Full Text:
PDFReferences
Guijarro, E. (2023). Network Infrastructure Security: Challenges and Protection Strategies. Revista VICTEC. https://doi.org/10.61395/victec.v4i7.127.
Louvieris, P., Clewley, N., & Liu, X. (2013). Effects-based feature identification for network intrusion detection. Neurocomputing, 121, 265-273. https://doi.org/10.1016/j.neucom.2013.04.038.
G. G. Liu, “Intrusion detection systems,” in Applied Mechanics and Materials, vol. 596. Trans Tech Publ, 2014, pp. 852–855.
C. Chio and D. Freeman, Machine Learning and Security: Protecting Systems with Data and Algorithms. ” O’Reilly Media, Inc.”, 2018.
Liu, H., & Lang, B. (2019). Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Applied Sciences. https://doi.org/10.3390/app9204396.
Vigneswaran, R. K., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, July). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication and networking technologies (ICCCNT) (pp. 1-6). IEEE.
Yang, L., Shami, A., Stevens, G., & De Rusett, S. (2022, December). LCCDE: a decision-based ensemble framework for intrusion detection in the internet of vehicles. In GLOBECOM 2022-2022 IEEE Global Communications Conference (pp. 3545-3550). IEEE.
Abrar, I., Ayub, Z., Masoodi, F., & Bamhdi, A. M. (2020, September). A machine learning approach for intrusion detection system on NSL-KDD dataset. In 2020 international conference on smart electronics and communication (ICOSEC) (pp. 919-924). IEEE.
KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, Ocotber 2007.
S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Costbased modeling for fraud and intrusion detection: Results from the jam project,” discex, vol. 02, p. 1130, 2000.
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, “Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation,” discex, vol. 02, p. 1012, 2000.
Siddiqui, M., & Naahid, S. (2013). Analysis of KDD CUP 99 Dataset using Clustering based Data Mining. International journal of database theory and application, 6, 23-34. https://doi.org/10.14257/IJDTA.2013.6.5.03.
N. Japkowicz, “Why question machine learning evaluation methods,” in AAAI workshop on evaluation methods for machine learning, 2006, pp. 6–11.
M. A. Hall, “Correlation-based feature selection for machine learning,” 1999.
J. Brownlee, How to Calculate Precision, Recall, and F-Measure for Imbalanced Classification, 2020.
M. Doring, ¨ The Case Against Precision as a Model Selection Criterion, 2018.
D. Hand and P. Christen, “A note on using the f-measure for evaluating record linkage algorithms,” Statistics and Computing, vol. 28, no. 3, pp. 539–547, 2018.
D. A. Cieslak and N. V. Chawla, “A framework for monitoring classifiers’ performance: when and why failure occurs?” Knowledge and Information Systems, vol. 18, no. 1, pp. 83–108, 2009.
Stolfo, S., Fan, W. and Lee, W., KDD-CUP-99 Task Description. 1999- 10-28)[2009-05-08]. http://KDD. ics. uci. edu/databases/kddcup99/task, html.
M. R. Al-Hadidi, A. Alarabeyyat and M. Alhanahnah, ” Breast Cancer Detection Using K-Nearest Neighbor Machine Learning Algorithm,” 2016 9th International Conference on Developments in eSystems Engineering (DeSE), Liverpool, 2016.
K. Jothi A. and P. Mohan, "A Comparison between KNN and SVM for Breast Cancer Diagnosis Using GLCM shape and LBP Features," 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 2020, pp. 1058-1062, doi: 10.1109/ICSSIT48917.2020.9214235. keywords: {Feature extraction;Support vector machines;Mammography;Breast cancer;Shape;Conferences;SVM;KNN;GLCM;LBP},
P. Brata Chanda and S. Kumar Sarkar, ”Detection And Classification Technique Of Breast Cancer Using Multi Kernal SVM Classifier Approach,” 2018 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, India, 2018.
Refbacks
- There are currently no refbacks.