Performance Analysis of Machine Learning Techniques in Intrusion Detection

Praiya Tungjaturasopon, K. Piromsopa
{"title":"Performance Analysis of Machine Learning Techniques in Intrusion Detection","authors":"Praiya Tungjaturasopon, K. Piromsopa","doi":"10.1145/3301326.3301335","DOIUrl":null,"url":null,"abstract":"This paper presents the performance analysis of machine learning techniques in intrusion detection. We analyze time to build (and to retrain) the models used by Intrusion Detection System. Machine Learning is a branch of computer science that allows computer to learn by themselves without programming sequence. These techniques can be applied to detect new threat that has never seen before. Due to the large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing the accuracy of IDS becomes an important open problem that is receiving attentions from the research community. However, the performance (time and space required) is usually ignored. Our study allows administrators work to make better decisions about how to select the proper hardware for intrusion detection in various environments. We proposed the models for estimating the time to build each model and the vector equation of the cut-off point is provided for determining the minimum number of CPU required for building Decision tree model and support vector machine model.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3301326.3301335","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

This paper presents the performance analysis of machine learning techniques in intrusion detection. We analyze time to build (and to retrain) the models used by Intrusion Detection System. Machine Learning is a branch of computer science that allows computer to learn by themselves without programming sequence. These techniques can be applied to detect new threat that has never seen before. Due to the large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing the accuracy of IDS becomes an important open problem that is receiving attentions from the research community. However, the performance (time and space required) is usually ignored. Our study allows administrators work to make better decisions about how to select the proper hardware for intrusion detection in various environments. We proposed the models for estimating the time to build each model and the vector equation of the cut-off point is provided for determining the minimum number of CPU required for building Decision tree model and support vector machine model.
机器学习技术在入侵检测中的性能分析
本文介绍了机器学习技术在入侵检测中的性能分析。我们分析了构建(和重新训练)入侵检测系统所使用的模型的时间。机器学习是计算机科学的一个分支,它允许计算机在没有编程序列的情况下自行学习。这些技术可以用于检测以前从未见过的新威胁。由于安全审计数据量大,入侵行为具有复杂性和动态性,优化入侵检测的准确性成为研究领域关注的重要开放性问题。然而,性能(所需的时间和空间)通常被忽略。我们的研究使管理员能够更好地决定如何在各种环境中为入侵检测选择合适的硬件。我们提出了估算每个模型构建时间的模型,并提供了截断点向量方程来确定构建决策树模型和支持向量机模型所需的最小CPU数量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信