TY - JOUR
T1 - Empirical Exploration of Machine Learning Techniques for Detection of Anomalies Based on NIDS
AU - Vallejo-Huanga, Diego
AU - Ambuludi, Marco
AU - Morillo, Paulina
N1 - Publisher Copyright:
© 2003-2012 IEEE.
PY - 2021/5
Y1 - 2021/5
N2 - Computer crimes and attacks on data networks have increased significantly, so it has become necessary to implement techniques that detect these threats and safeguard the information of organizations. Network Intrusion Detection Systems (NIDS) allow detecting anomalies and attacks in real time, by analyzing the local and outgoing traffic of the network. At present, to improve its performance, it has been chosen to use Machine Learning (ML) techniques that automate these processes and improve the detection of an anomaly. This paper implements ML techniques through the use of datasets, in the context of a NIDS, for the detection and prediction of anomalies on networks. Tests were performed with non-supervised and supervised learning algorithms on NSL-KDD and UNSW-NB15 datasets. An exploratory analysis of data together with dimensionality reduction techniques allowed us to understand the nature of the data, prior to the modeling. The results show that the methodology can be extrapolated for real scenarios with different network configurations.
AB - Computer crimes and attacks on data networks have increased significantly, so it has become necessary to implement techniques that detect these threats and safeguard the information of organizations. Network Intrusion Detection Systems (NIDS) allow detecting anomalies and attacks in real time, by analyzing the local and outgoing traffic of the network. At present, to improve its performance, it has been chosen to use Machine Learning (ML) techniques that automate these processes and improve the detection of an anomaly. This paper implements ML techniques through the use of datasets, in the context of a NIDS, for the detection and prediction of anomalies on networks. Tests were performed with non-supervised and supervised learning algorithms on NSL-KDD and UNSW-NB15 datasets. An exploratory analysis of data together with dimensionality reduction techniques allowed us to understand the nature of the data, prior to the modeling. The results show that the methodology can be extrapolated for real scenarios with different network configurations.
KW - Machine Learning
KW - nids
UR - http://www.scopus.com/inward/record.url?scp=85111022350&partnerID=8YFLogxK
U2 - 10.1109/TLA.2021.9448311
DO - 10.1109/TLA.2021.9448311
M3 - Article
AN - SCOPUS:85111022350
SN - 1548-0992
VL - 19
SP - 772
EP - 779
JO - Ieee Latin America Transactions
JF - Ieee Latin America Transactions
IS - 5
M1 - 9448311
ER -