{"title":"Performance Analysis of Machine Learning Techniques in Intrusion Detection","authors":"Praiya Tungjaturasopon, K. Piromsopa","doi":"10.1145/3301326.3301335","DOIUrl":null,"url":null,"abstract":"This paper presents the performance analysis of machine learning techniques in intrusion detection. We analyze time to build (and to retrain) the models used by Intrusion Detection System. Machine Learning is a branch of computer science that allows computer to learn by themselves without programming sequence. These techniques can be applied to detect new threat that has never seen before. Due to the large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing the accuracy of IDS becomes an important open problem that is receiving attentions from the research community. However, the performance (time and space required) is usually ignored. Our study allows administrators work to make better decisions about how to select the proper hardware for intrusion detection in various environments. We proposed the models for estimating the time to build each model and the vector equation of the cut-off point is provided for determining the minimum number of CPU required for building Decision tree model and support vector machine model.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3301326.3301335","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper presents the performance analysis of machine learning techniques in intrusion detection. We analyze time to build (and to retrain) the models used by Intrusion Detection System. Machine Learning is a branch of computer science that allows computer to learn by themselves without programming sequence. These techniques can be applied to detect new threat that has never seen before. Due to the large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing the accuracy of IDS becomes an important open problem that is receiving attentions from the research community. However, the performance (time and space required) is usually ignored. Our study allows administrators work to make better decisions about how to select the proper hardware for intrusion detection in various environments. We proposed the models for estimating the time to build each model and the vector equation of the cut-off point is provided for determining the minimum number of CPU required for building Decision tree model and support vector machine model.