Analysis of Intrusion Detection Systems in UNSW-NB15 and NSL-KDD Datasets with Machine Learning Algorithms
Abstract
Keywords
References
- [1] S. Moualla, K. Khorzom, and A. Jafar, “Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset,” Comput Intell Neurosci, vol. 2021, pp. 5557577, 2021, doi: 10.1155/2021/5557577.
- [2] S. Choudhary and N. Kesswani, “Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT,” Procedia Comput Sci, vol. 167, pp. 1561–1573, Jan. 2020, doi: 10.1016/J.PROCS.2020.03.367.
- [3] B. M. Serinelli, A. Collen, and N. A. Nijdam, “Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System,” Procedia Comput Sci, vol. 175, pp. 560–565, Jan. 2020, doi: 10.1016/J.PROCS.2020.07.080.
- [4] N. v. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: Synthetic Minority Over-sampling Technique,” Journal of Artificial Intelligence Research, vol. 16, pp. 321–357, Jun. 2002, doi: 10.1613/JAIR.953.
- [5] P. Geurts, D. Ernst, and L. Wehenkel, “Extremely randomized trees,” Machine Learning 2006 63:1, vol. 63, no. 1, pp. 3–42, Mar. 2006, doi: 10.1007/S10994-006-6226-1.
- [6] A. Basati and M. M. Faghih, “PDAE: Efficient network intrusion detection in IoT using parallel deep auto-encoders,” Inf Sci (N Y), vol. 598, pp. 57–74, Jun. 2022, doi: 10.1016/J.INS.2022.03.065.
- [7] A. E. Cil, K. Yildiz, and A. Buldu, “Detection of DDoS attacks with feed forward based deep neural network model,” Expert Syst Appl, vol. 169, p. 114520, May 2021, doi: 10.1016/J.ESWA.2020.114520.
- [8] G. C. Amaizu, C. I. Nwakanma, S. Bhardwaj, J. M. Lee, and D. S. Kim, “Composite and efficient DDoS attack detection framework for B5G networks,” Computer Networks, vol. 188, p. 107871, Apr. 2021, doi: 10.1016/J.COMNET.2021.107871.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Authors
Fuat Türk
*
0000-0001-8159-360X
Türkiye
Early Pub Date
June 27, 2023
Publication Date
June 27, 2023
Submission Date
January 22, 2023
Acceptance Date
April 24, 2023
Published in Issue
Year 2023 Volume: 12 Number: 2
Cited By
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
International Journal of Cognitive Computing in Engineering
https://doi.org/10.1016/j.ijcce.2024.07.005Enhanced IDS Using BBA and SMOTE-ENN for Imbalanced Data for Cybersecurity
SN Computer Science
https://doi.org/10.1007/s42979-024-03229-xIOT NETWORK INTRUSION DETECTION USING MACHINE LEARNING ON UNSW-NB15 DATASET
Herald of the Kazakh-British technical university
https://doi.org/10.55452/1998-6688-2024-21-3-48-57Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
Future Internet
https://doi.org/10.3390/fi16120481A hybrid AI based framework for enhancing security in satellite based IoT networks using high performance computing architecture
Scientific Reports
https://doi.org/10.1038/s41598-024-78262-0Enhanced Hybrid Deep Learning Models-Based Anomaly Detection Method for Two-Stage Binary and Multi-Class Classification of Attacks in Intrusion Detection Systems
Algorithms
https://doi.org/10.3390/a18020069Adaptive Semi-Supervised Algorithm for Intrusion Detection and Unknown Attack Identification
Applied Sciences
https://doi.org/10.3390/app15041709A novel hyperparameter tuning method for enhanced intrusion detection in network security
Turkish Journal of Engineering
https://doi.org/10.31127/tuje.1624366Long short-term memory-based intrusion detection system using hybrid grid search and sequential chimp optimization algorithm-based hyperparameter tuning
Intelligent Decision Technologies
https://doi.org/10.1177/18724981241291422Robust Intrusion Detection System Using an Improved Hybrid Deep Learning Model for Binary and Multi-Class Classification in IoT Networks
Technologies
https://doi.org/10.3390/technologies13030102Enhancing network security with memory-augmented visual attention networks and predator–prey optimization models
Iran Journal of Computer Science
https://doi.org/10.1007/s42044-025-00249-5Leveraging stacking machine learning models and optimization for improved cyberattack detection
Scientific Reports
https://doi.org/10.1038/s41598-025-01052-9AE-DTNN: Autoencoder–Dense–Transformer Neural Network Model for Efficient Anomaly-Based Intrusion Detection Systems
Machine Learning and Knowledge Extraction
https://doi.org/10.3390/make7030078Twined ensemble framework for network security: integrating Random Forest, AdaBoost, and Gradient Boosting for enhanced intrusion detection
Discover Internet of Things
https://doi.org/10.1007/s43926-025-00199-1A GAN-Based Approach for enhancing security in satellite based IoT networks using MPI enabled HPC
PLOS One
https://doi.org/10.1371/journal.pone.0331019Internet of cybersecurity things in the third decade of the 21st century: A forward vision
Computers & Security
https://doi.org/10.1016/j.cose.2025.104747Modelo predictivo para la detección anticipada de ciberataques en entornos de IoT
Arcana Scientific Journal
https://doi.org/10.65305/asj.v3n1.2025.27Hybrid approach for traffic flow detection using metaheuristics optimization and machine learning algorithms
Journal of the Chinese Institute of Engineers
https://doi.org/10.1080/02533839.2025.2594516A High-Precession Cybersecurity Model with Stacked Ensemble Learning
Savunma Bilimleri Dergisi
https://doi.org/10.17134/khosbd.1852311A Weighted Average-Based Heterogeneous Datasets Integration Framework for Intrusion Detection Using a Hybrid Transformer–MLP Model
Technologies
https://doi.org/10.3390/technologies14030180