2019
DOI: 10.1002/spy2.91
|View full text |Cite
|
Sign up to set email alerts
|

Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset

Abstract: This paper uses a hybrid feature selection process and classification techniques to classify cyber‐attacks in the UNSW‐NB15 dataset. A combination of k‐means clustering, and a correlation‐based feature selection, were used to come up with an optimum subset of features and then two classification techniques, one probabilistic, Naïve Bayes (NB), and a second, based on decision trees (J48), were employed. Our results show that this hybrid feature selection method in combination with the NB model was able to impro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
5

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(32 citation statements)
references
References 22 publications
0
25
0
5
Order By: Relevance
“…Cybersecurity data analysis is very important to indicate vulnerabilities and unveil security breaches, such as via detecting network inconsistencies. Examples of applying feature selection before anomaly detection include a hierarchical feature selection for DDoS mitigation [71], an ensemble feature selection for intrusion detection [72], and clustering and correlation-based feature selection for intrusion detection [73]. Hence, our proposed cooperative co-evolutionbased feature selection with the proposed random feature grouping (CCFSRFG) can be applied in any domain of Big Data.…”
Section: Performance Evaluation Of Classifiers With Ccfsrfgmentioning
confidence: 99%
“…Cybersecurity data analysis is very important to indicate vulnerabilities and unveil security breaches, such as via detecting network inconsistencies. Examples of applying feature selection before anomaly detection include a hierarchical feature selection for DDoS mitigation [71], an ensemble feature selection for intrusion detection [72], and clustering and correlation-based feature selection for intrusion detection [73]. Hence, our proposed cooperative co-evolutionbased feature selection with the proposed random feature grouping (CCFSRFG) can be applied in any domain of Big Data.…”
Section: Performance Evaluation Of Classifiers With Ccfsrfgmentioning
confidence: 99%
“…Sikha Bagui et al proposed in their study [11] a method to detect cyber-attacks based on the Naïve Bayes and Decision Tree (J48) machine learning algorithms. The team [11] used these two algorithms in turn for classifying components of cyber-attacks in the UNSW-NB15 dataset.…”
Section: Related Workmentioning
confidence: 99%
“…In this case, the data set UNSW-NB15 [39], [40], which is widely used in cybersecurity [41]- [44] and considered as a benchmark data set [45], was chosen. The choice of this data set is motivated by several factors: the validity of the attacks the labeling of these, and the classification of the data, similar to that presented in the previous section.…”
Section: Data Set Understudymentioning
confidence: 99%
“…Furthermore, some recent researches have studied the current datasets and most of them have done an evaluation of machine learning techniques such as [49], where the UNSW-NB15 was evaluated by different machine learning algorithms such as Decision Trees, Naïve Bayes and Support Vector Machine, obtaining the best accuracy by Decision Trees (C5.0) of 85.41%. Also, in [41] the authors present a feature selection for rare cyber-attacks, where they propose an evaluation of multiples algorithms with the objective to detect the best accuracy for multi class classification, obtaining an accuracy in the best case (for worms attacks) of 99.94%. Table 8 shows a representation of different related researches and their comparison with the results presented in this article.…”
Section: F Comparison Between Multiples Researches Approachesmentioning
confidence: 99%