Enhancing Intrusion Detection Systems Through Dimensionality Reduction - A Comparative Study of Machine Learning Techniques For Cyber Security
Enhancing Intrusion Detection Systems Through Dimensionality Reduction - A Comparative Study of Machine Learning Techniques For Cyber Security
a r t i c l e i n f o a b s t r a c t
Keywords: Our research aims to improve automated intrusion detection by developing a highly accurate classifier with min-
Cyber security imal false alarms. The motivation behind our work is to tackle the challenges of high dimensionality in intrusion
Intrusion detection system detection and enhance the classification performance of classifiers, ultimately leading to more accurate and ef-
Supervised machine learning
ficient detection of intrusions. To achieve this, we conduct experiments using the NSL-KDD data set, a widely
Anomaly detection
used benchmark in this domain. This data set comprises approximately 126,000 samples of normal and abnormal
PCA
Random projection network traffic for training and 23,000 samples for testing. Initially, we employ the entire feature set to train clas-
sifiers, and the outcomes are promising. Among the classifiers tested, the J48 tree achieves the highest reported
accuracy of 79.1 percent. To enhance classifier performance, we explore two projection approaches: Random
Projection and PCA. Random Projection yields notable improvements, with the PART algorithm achieving the
best-reported accuracy of 82.0 %, outperforming the original feature set. Moreover, random projection proves
to be more time-efficient than PCA across most classifiers. Our findings demonstrate the effectiveness of random
projection in improving intrusion detection accuracy while reducing training time. This research contributes
valuable insights to the cybersecurity field and fosters potential advancements in intrusion detection systems.
https://doi.org/10.1016/j.csa.2023.100033
Received 4 August 2023; Received in revised form 28 November 2023; Accepted 14 December 2023
Available online 11 January 2024
2772-9184/© 2023 The Authors. Publishing Services by Elsevier B.V. on behalf of KeAi Communications Co., Ltd. This is an open access article under the CC BY
license (http://creativecommons.org/licenses/by/4.0/)
F. Nabi and X. Zhou Cyber Security and Applications 2 (2024) 100033
Anomaly-based IDSs learn normal behavior using machine learning NSL-KDD dataset, covering four attack types (DOS, Probe, user to root,
(ML) algorithms with various data instances characterizing network traf- root to local). Reported accuracy results are 84 % (logistic regression),
fic. ML techniques are divided into unsupervised (no labeled classes) 79 % (naïve Bayes), 75 % (SVM), and 99 % (random forest). Random for-
and supervised (labeled classes) learning, with the latter being common est’s near-perfect accuracy raises overfitting concerns. In [7], the same
in anomaly detection. Supervised algorithms utilize labeled data sets problem was addressed with cross-validation as the validation method
representing normal and anomaly behaviors as features, training a clas- and feature selection applied before feeding the data to three classifiers:
sification model to detect new attack patterns and raise alarms [1]. j48, naïve Bayes, and REPTREE. Feature selection proved effective in
Many anomaly-based IDSs employing ML algorithms have been pro- enhancing classification performance. In [8], SVM and k-nearest neigh-
posed (e.g., [6–14]). However, a key challenge is the high dimension- bor were tested on the KDD CUP99 dataset (32,000 samples) for normal
ality of data sets used for training the classification models, leading to and four attack types. Two experiments were conducted: one using the
increased training time. This is crucial for the effectiveness of online full feature set and the other with PCA for dimensionality reduction.
IDSs. Additionally, redundant information may exist, reducing classifi- PCA improved accuracy to around 90 % in both cases. Similarly, in [9],
cation accuracy and increasing false alarms. To address this, dimension- SVM with different kernels was experimented for intrusion detection.
ality reduction approaches are used, transforming the high-dimensional PCA was effective in enhancing classification performance, with the RBF
feature space into a lower-dimensional space. Techniques like Principal kernel SVM achieving over 99 % accuracy, though overfitting concerns
Component Analysis (PCA) preserve variance between data instances, remain. A similar approach was applied in [10], yielding improved clas-
while faster solutions like random projection (RP) use a random matrix sification performance with PCA.
based on a certain distribution, such as Gaussian, to reduce dimension- In [11], the authors focused on detecting distributed DOS attacks
ality [9]. (DDOS) using machine learning algorithms on the CICIDS2017 dataset.
This paper aims to investigate the performance of common super- Feature selection reduced the feature set from 85 to 12 features, and ran-
vised machine learning algorithms for anomaly-based intrusion detec- dom forest achieved the best results with around 96 % accuracy. High
tion (IDs). Additionally, the impact of two dimensionality reduction training time raised concerns. In [12], SVM and artificial neural net-
techniques, namely Principal Component Analysis (PCA) and Random works were experimented for intrusion detection on the UNSW-NB-15
Projection (RP), on classification performance is explored. While PCA dataset. Feature reduction methods (categorization, univariate feature
is a well-known method in this domain, its time-consuming nature selection, PCA) were employed, and categorization yielded the best re-
prompts us to assess the performance of RP, which offers a faster alter- sults with over 90 % accuracy, outperforming PCA. In [13], k-means
native. As a result, the main contributions of this work are as follows: clustering with feature selection was proposed for intrusion prediction
on the KYOTO dataset. Clustering significantly improved classification
• Analyzing the performance of commonly used supervised machine
performance, achieving very high accuracy rates.
learning algorithms for anomaly-based intrusion detection. This
In [14], a different approach using random projection for intrusion
analysis involves training a classification model using approximately
detection based on Apache web server log data was explored. The ap-
126,000 samples of normal and anomaly patterns from the NSL-KDD
proach showed potential for effective intrusion identification through
data set.
visualization. Lastly, in [15], an end-to-end system was proposed for in-
• Examining the effect of applying PCA dimensionality reduction al-
trusion detection using novel data sets simulating intrusion in LAN and
gorithm on classification performance.
cloud environments. Decision tree and regression showed good results
• Examining the effect of applying RP dimensionality reduction algo-
in LAN and cloud environments, respectively.
rithm on classification performance.
In [19], the authors used the KDD’99 and the NSL-KDD datasets to
• Comparing the classification performance achieved by PCA and RP
train decision tree (DT), multi-layer perceptron (MLP), random forest
to identify potential advantages and trade-offs of each approach.
(RF), and a stacked autoencoder (SAE) model for detecting network in-
By addressing these aspects, this study seeks to provide valuable in- trusion. In their comparative study, they claimed that the random forest
sights into the effectiveness of supervised machine learning algorithms classifier showed the most consistent and accurate results. Similarly, the
for anomaly-based intrusion detection and the impact of dimensional- authors of [21] also used the benchmarking dataset NSL-KDD to conduct
ity reduction techniques on classification performance. The findings will a comparative study for intrusion detection using four ML techniques in-
contribute to a better understanding of which methods are more suitable cluding Random Forest, J48, ZeroR, and Naïve Bayes. However, they did
for efficient and accurate intrusion detection in practical applications. not involve the data dimensions reduction techniques in their study.
The remainder of this paper is structured as follows: Section 2 re-
views related work in this field. Section 3 discusses the methodology Summary for identifying the research gaps
employed in this study. Section 4 delves into the experimental findings.
Finally, Section 5 concludes the paper and makes recommendations for The problem of intrusion detection and supervised learning has gar-
future research. nered global attention, leading to numerous studies using various ML
algorithms and validation methods. Notably, the choice of validation
Related work method can significantly impact classification performance, with cross-
validation often providing better results than independent testing data
The area of supervised learning and intrusion detection has garnered sets. Additionally, the size of the testing data set has a bearing on the
significant attention among cyber security researchers. Numerous stud- classification outcomes. While some works report very high classifica-
ies focus on applying common supervised ML techniques and evaluat- tion results, concerns arise about potential overfitting issues. Moreover,
ing their performance on popular intrusion datasets. Examples of these it is observed that normal behavior yields better accuracy measures com-
techniques include decision trees, random forests, Bayes methods, sup- pared to intrusion behaviors, an aspect often overlooked in overall ac-
port vector machines (SVM), neural networks, ensemble classifiers, and curacy reporting across all classes.
more. Feature selection and PCA are frequently utilized to reduce dimen-
sionality and generally enhance classification performance. However,
Supervised ML for intrusion detection PCA comes with a substantial training time cost due to matrix calcula-
tions. In contrast, our work proposes a novel approach by employing
Recently, the authors in [6] experimented with four supervised random projection combined with machine learning for intrusion de-
machine-learning algorithms for intrusion detection: logistic regression, tection, a highly efficient and rapid method in comparison to PCA. The
SVM, naïve Bayes, and random forest. Training was conducted on the results demonstrate the superiority of the random projection approach
2
F. Nabi and X. Zhou Cyber Security and Applications 2 (2024) 100033
3
F. Nabi and X. Zhou Cyber Security and Applications 2 (2024) 100033
Table 2
Description of the features.
Feature Description
Content features
count number of connections to the same host as the current connection in the past two seconds
serror_rate % of connections that have “SYN’’ errors
rerror_rate % of connections that have ”REJ’’ errors
same_srv_rate % of connections to the same service
diff_srv_rate % of connections to different services
srv_count number of connections to the same service as the current connection in the past two seconds
srv_serror_rate % of connections that have “SYN’’ errors
srv_rerror_rate % of connections that have “REJ’’ errors
srv_diff_host_rate % of connections to different hosts
testing data set (separate data set from training data set). Classification Table 3
accuracy is calculated on the tested data as the ratio between correctly Algorithm’s classification results before dimensionality reduction.
classified samples divided by the total number of tested samples. An- Classification Algorithm Accuracy (%) FPR (%)
other performance evaluation measure is the false positive rate (FPR)
Bayes-Net 71.4 25.5
which calculates the rate of false-positive and is calculated as the num-
Naïve Bayes 73.1 23.5
ber of false positives divided by the total number of true negatives and J48 79.1 18.5
false positives. PART 73.9 24.0
Random Forest 77.8 20.1
Experiment 1: experiments using the full training data set rows represent the ground truth classes and the columns represent the
predicted classes.
In this experiment, the five supervised learning algorithms discussed It is noted from each of these tables that the normal instances are
earlier are utilized to build the classifier using the full feature set of 41 classified correctly with a higher percentage than that of anomaly in-
features from the training data set. Subsequently, the model is tested stances, which we refer to as true positive rate. As it is clear from the
on the testing data set. Table 3 displays the accuracy and FPR results above table, the true positive rate for the normal class is (=9240/9711)
obtained from the five supervised machine learning algorithms before that is 94.6 % compared to (=8602/12833) is 67.0 % true positive rate
any dimensionality reduction is applied. for the anomaly class, which indicates the difficulty in predicting new
It is clear from Table 4 that the highest accuracy and the lowest FPR intrusions.
are obtained using the J48 classification algorithm with an accuracy
of (79.1 %) and a false positive rate of (18.5 %). Generally, accuracy Experiment 2: experiments using classifiers after PCA
and FPR results are stable across the five algorithms with no dramatic
changes. For further analysis of the performance results of the best clas- In this experiment, we applied PCA to the data set to reduce its di-
sifier (J48), Table 4 presents the confusion matrix for this classifier. The mensionality, and then we assessed the performance of the five classi-
4
F. Nabi and X. Zhou Cyber Security and Applications 2 (2024) 100033
Table 6
Confusion matrix for Naïve Bayes classifier.
a B ← classified as
Fig. 1. The PCA projection of 3000 samples from the Normal class (circles) and
3000 samples from the Anomaly class (triangles).
Table 5
Algorithm’s classification results after projecting the data with PCA.
Classification Algorithm Accuracy (%) FPR (%) Fig. 4. A random projection of 3000 samples from the Normal class, represented
by circles, and 3000 samples from the Anomaly class, represented by triangles.
Bayes-Net 76.2 21.5
Naïve Bayes 78.8 19.0
J48 76.7 21.0
PART 77.0 20.5 Bayes algorithm). For a visual representation of the effect of applying
Random Forest 74.1 24.0 PCA across the five classifiers, refer to Fig. 3.
5
F. Nabi and X. Zhou Cyber Security and Applications 2 (2024) 100033
Table 8
Confusion matrix for PART classifier.
a B ← classified as
Table 9
Precision, recall, and F1 measures for PART classifier.
Fig. 5. Classification accuracy results across five dimensions with random pro-
jection.
Table 7
Algorithm’s classification results after random projection.
Classification Algorithm Accuracy (%) FPR (%) Accuracy (%) FPR (%)
Table 10
sian matrix compared to the Sparse matrix. Additionally, the Gaussian Comparison between PCA and Random projection accuracy results.
matrix outperforms the Sparse matrix in terms of false-positive rates, a Classification Algorithm PCA (%) Random projection (%)
crucial metric for intrusion detection systems, ensuring fewer normal
Bayes-Net 76.2 78.4
instances are misclassified as anomalies. In the absence of the Gaussian
Naïve Bayes 78.8 77.3
matrix, the alternate option is to use the Sparse matrix for dimension- J48 76.7 79.6
ality reduction. However, this choice may come with drawbacks. The PART 77.0 82.0
Sparse matrix might not perform as effectively as the Gaussian matrix, Random Forest 74.1 77.5
leading to less accurate classification and reduced ability to discrimi-
nate between normal and anomalous instances. The clustering of data
points in the lower-dimensional space could result in a loss of relevant The high precision rate for the anomaly class (97.1 %) indicates that
information, hindering effective data representation. among all predicted instances classified as intrusions, 97.1 % are gen-
Furthermore, using the Sparse matrix may increase the risk of over- uine intrusions. Conversely, the high recall measure for the normal class
fitting, particularly with high-dimensional data. The Gaussian matrix’s (97.2 %) indicates that 97.2 % of the instances in the normal class are
capacity to provide a more generalized representation helps mitigate correctly classified as normal. The overall F1 measure shows a balanced
this risk, while the Sparse matrix might struggle to maintain generaliza- performance for both classes.
tion capability. Comparing the results after random projection (Gaussian) with the
In conclusion, the Gaussian matrix emerges as the preferred option original data set, we observe that it has effectively enhanced the major-
for enhancing intrusion detection systems and cyber security due to its ity of classifiers with improvements ranging from 0.5 % to 8.1 %. These
ability to retain essential data characteristics, improve accuracy, and enhancements are illustrated in Fig. 6, demonstrating the efficacy of ran-
reduce false-positive rates. On the other hand, using the Sparse matrix dom projection in improving classification performance across various
might result in decreased classification performance and increased risk classifiers.
of overfitting. The selection of the Gaussian matrix ensures a more ro-
bust and reliable intrusion detection system, making it a valuable dimen- Experiment 4: comparison between PCA and random projection
sionality reduction technique for practical implementation. Therefore,
for further comparison with the original high-dimensional data set and Table 10 presents a comparison of accuracy results after applying
PCA results, we will consider the outcomes associated with the Gaussian two projection techniques, PCA and random projection (Gaussian), on
matrix projection. the NSL-KDD data set. The table showcases the impact of these dimen-
Table 7 highlights that the PART algorithm achieved the highest re- sionality reduction methods on the classification performance of various
ported accuracy of 82.0 %, making it the best-performing approach in supervised machine learning algorithms. The accuracy values for each
this study. The associated confusion matrix in Table 8 allows us to cal- algorithm are reported, allowing for a direct comparison between the
culate precision, recall, and F1 measures. Precision is calculated by di- two projection approaches.
viding true positives by the sum of true positives and false positives, From the table, it can be observed how PCA and random projection
while recall is the ratio of true positives to the sum of true positives and (Gaussian) influence the performance of the classifiers. The comparison
false negatives. The F1 measure is calculated as the harmonic mean of provides insights into the effectiveness of each technique in enhancing
precision and recall. Table 9 presents these measures for both classes. the accuracy of intrusion detection systems. The results shed light on
6
F. Nabi and X. Zhou Cyber Security and Applications 2 (2024) 100033
which dimensionality reduction approach yields better performance for Conclusion and future work
each specific classifier, enabling the selection of the most suitable tech-
nique based on the desired classification outcome. Overall, this com- In this paper, we addressed the problem of automated intrusion de-
parison aids in understanding the trade-offs and benefits of using PCA tection and utilized the widely used NSL-KDD data set, which contains
and random projection (Gaussian) for intrusion detection tasks, offer- approximately 126,000 instances for training and 23,000 samples for
ing valuable guidance for building robust and efficient cyber security testing. We applied five popular classification algorithms to the full
systems. training data set, namely Bayes Net, Naïve Bayes, J48, PART, and Ran-
From the table, several noteworthy observations can be made: dom Forest. The best-reported results were achieved with the J48 algo-
rithm, attaining a relatively good accuracy of 79.1 %.
- Random projection (Gaussian) outperforms PCA: Across the major- To tackle the high dimensionality issue of the 41-dimensional feature
ity of the classification algorithms, random projection yields better vector, we experimented with two projection approaches: PCA and ran-
accuracy results compared to PCA. This suggests that random projec- dom projection. PCA demonstrated effectiveness in enhancing the per-
tion is more effective in preserving the essential data characteristics formance of three out of the five tested classifiers, resulting in improve-
and improving classification performance for intrusion detection. ments ranging from 3.1 % to 5.7 %. The success of PCA can be attributed
- PART classifier with random projection achieves the highest accu- to its ability to transform the feature space into a lower-dimensional sub-
racy: Among all the experiments conducted, the best-reported accu- space while retaining crucial information through feature selection. This
racy on the data set is achieved by the PART classifier after applying led to a more efficient and informative data representation, thereby im-
random projection. This highlights the effectiveness of random pro- proving classifier performance. Moreover, PCA’s noise reduction capa-
jection in enhancing the performance of this specific classifier for bility contributed to more accurate and robust classifiers by emphasizing
intrusion detection. essential data patterns while reducing noise and irrelevant information.
- Encouraging results for random projection: The results indicate that Additionally, PCA’s ability to prevent overfitting was valuable for high-
random projection is a promising dimensionality reduction tech- dimensional datasets, as it provided a more generalized representation
nique for intrusion detection. Its simplicity, power, and faster im- of the data. Furthermore, the computational efficiency gained through
plementation make it a viable alternative to PCA in enhancing the PCA was beneficial, as it reduced the computational burden on clas-
accuracy of classifiers for cyber security tasks. sifiers, making them suitable for real-time or large-scale applications.
Additionally, we found that random projection was also effective, im-
Overall, the comparison demonstrates that random projection is a proving the performance of the majority of classifiers compared to the
valuable technique for improving the performance of intrusion detec- original data set. The best-reported accuracy after applying random pro-
tion systems. Its advantages over PCA in terms of accuracy and compu- jection was 82.0 %, outperforming the accuracy achieved before using
tational efficiency make it an appealing choice for real-world applica- this technique. Moreover, random projection proved to be more efficient
tions. The encouraging results from these experiments further motivate than PCA, requiring less training time for most classifiers.
researchers and practitioners to explore and leverage random projection For future work, we intend to explore other dimensionality reduc-
as an effective tool in the field of cyber security and intrusion detection. tion techniques, such as LDA and Kernel PCA and other start-of-the-art
methods, such as the new method developed in [20], to assess their
Experiments summary impact on classification performance. Conducting experiments on var-
ious data sets will allow us to identify the most effective approach for
In summary, the experiments reveal the following key points: enhancing intrusion detection systems’ accuracy and efficiency. A com-
bination of supervised, unsupervised, and semi-supervised techniques
- The full training data set demonstrates effectiveness for classifica- can be employed to enhance the overall effectiveness of the intrusion
tion, achieving 79.1 % accuracy and 18.5 % false-positive rate (FPR) detection system in a dynamic and evolving cyber threat landscape in
on the testing data set using the J48 algorithm. However, due to its the future work as well. Recently, deep learning methods are also ap-
large size (around 126,000 instances), training with the full data set plied to intrusion detection [22,23]. In the future, deep learning will
requires a significant amount of time. be explored to facilitate intrusion detection systems. By gaining insights
- PCA has been effective in enhancing the performance of three clas- into the strengths and limitations of different techniques, we aim to de-
sifiers, showing promise in reducing dimensionality and improving velop more robust and reliable intrusion detection systems capable of
classification results. However, the best-reported accuracy achieved effectively countering evolving cyber threats in practical scenarios.
using the full data set surpasses the accuracy attained with PCA.
- Random projection is highly effective in enhancing the performance Declaration of competing interest
of the majority of classifiers, with accuracy improvements of more
than 8.0 % observed with the PART algorithm. The authors declare the following financial interests/personal rela-
- Applying random projection to the data set provides better accuracy tionships which may be considered as potential competing interests
results when compared to using the full training data set, offering a Faisal Nabi reports financial support and writing assistance were pro-
more efficient dimensionality reduction technique. vided by University of Southern Queensland. Faisal nabi reports a rela-
- Random projection outperforms PCA with the majority of classifiers tionship with usq that includes: non-financial support. Faisal nabi has
and requires much less time for computation, making it a more fa- patent pending to n/a. n/a
vorable option in terms of both accuracy and efficiency.
CRediT authorship contribution statement
These findings suggest that while the full training data set demon-
strates strong classification performance, its large size poses computa- Faisal Nabi: Writing – original draft. Xujuan Zhou: Formal analysis,
tional challenges. PCA and random projection provide effective dimen- Supervision.
sionality reduction techniques, with random projection showing partic-
ular promise in achieving improved accuracy and efficiency across var- References
ious classifiers. As a result, random projection emerges as a viable and
valuable approach for intrusion detection systems and cyber security [1] A. Verma, V. Ranga, Machine learning based intrusion detection systems for IoT
applications, Wirel. Person. Commun. 111 (4) (2020) 2287–2310.
applications, offering a powerful alternative to the traditional methods [2] A. Thakkar, R. Lohiya, A review of the advancement in intrusion detection datasets,
for enhancing classification performance. Procedia Comput. Sci. 167 (2020) 636–645.
7
F. Nabi and X. Zhou Cyber Security and Applications 2 (2024) 100033
[3] A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, Survey of intrusion detection [13] F. Salo, M. Injadat, A. Moubayed, A.B. Nassif, A. Essex, Clustering enabled classifica-
systems: techniques, datasets and challenges, Cyber Secur. 2 (1) (2019) 1–22. tion using ensemble feature selection for intrusion detection, in: 2019 International
[4] R. Bace, P Mell, NIST Special Publication On Intrusion Detection Systems, Booz-Allen Conference on Computing, Networking and Communications (ICNC), IEEE, 2019,
And Hamilton Inc, Mclean VA, 2001. pp. 276–281.
[5] H. Liu, B. Lang, Machine learning and deep learning methods for intrusion detection [14] A. Juvonen, T. Hamalainen, An efficient network log anomaly detection system using
systems: a survey, Appl. Sci. 9 (20) (2019) 4396. random projection dimensionality reduction, in: 2014 6th international conference
[6] M.C. Belavagi, B. Muniyal, Performance evaluation of supervised machine learning on new technologies, mobility and security (NTMS), IEEE, 2014, pp. 1–5.
algorithms for intrusion detection, Procedia Comput. Sci. 89 (2016) 117–123. [15] G.D.C. Bertoli, L.A.P. Júnior, O. Saotome, A.L. Dos Santos, F.A.N. Verri, C.A.C. Mar-
[7] K. Kumar, J.S. Batth, Network intrusion detection with feature selection techniques condes, . . . J.M.P De Oliveira, An end-to-end framework for machine learning-based
using machine-learning algorithms, Int. J. Comput. Appl. 150 (12) (2016). network intrusion detection system, IEEE Access 9 (2021) 106790–106805.
[8] I. Kumar, N. Mohd, C. Bhatt, S.K. Sharma, Development of IDS using supervised ma- [16] https://www.unb.ca/cic/datasets/nsl.html, Accessed 29-4-2021
chine learning, in: Soft computing: Theories and Applications, Springer, Singapore, [17] C.M. Bishop, Pattern Recognition and Machine Learning, springer, 2006.
2020, pp. 565–577. [18] Witten, I.H., & Frank, E. (2002). Data mining: practical machine learning tools and
[9] P. Nskh, M.N. Varma, R.R. Naik, Principle component analysis based intrusion detec- techniques with Java implementations.
tion system using support vector machine, in: 2016 IEEE International Conference on [19] A. Devarakonda, N. Sharma, P. Saha, S. Ramya, Network intrusion detection: a com-
Recent Trends in Electronics, Information & Communication Technology (RTEICT), parative study of four classifiers using the NSL-KDD and KDD’99 datasets, Journal
IEEE, 2016, pp. 1344–1350. of Physics: Conference Series, 2161, IOP Publishing, 2022.
[10] S. Waskle, L. Parashar, U. Singh, Intrusion detection system using PCA with random [20] S. Anita, S.M. Hadi, N.H. Nosrati, Network intrusion detection using data dimensions
forest approach, in: 2020 International Conference on Electronics and Sustainable reduction techniques, J. Big Data 10 (1) (2023).
Communication Systems (ICESC), IEEE, 2020, pp. 803–808. [21] K. Arunesh, M. Manoj Kumar, A comparative study of classification techniques for
[11] N. Bindra, M. Sood, Detecting DDoS attacks using machine learning techniques intrusion detection using Nsl-Kdd data sets, Int. J. Adv. Technol. Eng. Sci. 5 (2)
and contemporary intrusion detection dataset, Autom. Control Comput. Sci. 53 (5) (2017).
(2019) 419–428. [22] L. Ashiku, C. Dagli, Network intrusion detection system using deep learning, Proce-
[12] N. Aboueata, S. Alrasbi, A. Erbad, A. Kassler, D. Bhamare, Supervised machine dia Comput. Sci. 185 (2021) 239–247.
learning techniques for efficient network intrusion detection, in: 2019 28th Interna- [23] Z. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah, F. Ahmad, Network intru-
tional Conference on Computer Communication and Networks (ICCCN), IEEE, 2019, sion detection system: a systematic study of machine learning and deep learning
pp. 1–8. approaches, Transact. Emerg. Telecommun. Technolog. 32 (1) (2021) e4150.