Comparison Analysis of Classification Algorithms for Intrusion Detection
dc.contributor.author | Saha, Binita | |
dc.description.abstract | As the Internet of Things becomes more prevalent in our lives, we are confronted with more security concerns. Network attacks have become more common in the cyber world these days. Denial of service, Prove, Remote to Local attacks, and other types of attacks are on the rise. In our research, we used five machine learning classifiers and conducted a comparison analysis to see which one performed better in predicting network anomalies. Since the dataset we used is unbalanced, we experimented with oversampling and under sampling techniques for the minority and majority groups to improve the model's prediction. Then, in order to test and compare our models, we measured accuracy, F1 ranking, and confusion matrix. | en_US |
dc.publisher | North Dakota State University | en_US |
dc.rights | NDSU policy 190.6.2 | en_US |
dc.title | Comparison Analysis of Classification Algorithms for Intrusion Detection | en_US |
dc.type | Master's paper | en_US |
dc.date.accessioned | 2021-08-19T18:15:24Z | |
dc.date.available | 2021-08-19T18:15:24Z | |
dc.date.issued | 2021 | |
dc.identifier.uri | https://hdl.handle.net/10365/32037 | |
dc.subject | Intrusion detection. | en_US |
dc.subject | IDS. | en_US |
dc.subject | Machine learning classifier. | en_US |
dc.subject | NSL-KDD dataset. | en_US |
dc.subject | Random forest. | en_US |
dc.subject | Decision tree. | en_US |
dc.subject | Binary search algorithm. | en_US |
dc.rights.uri | https://www.ndsu.edu/fileadmin/policy/190.pdf | en_US |
ndsu.degree | Master of Science (MS) | en_US |
ndsu.college | Engineering | en_US |
ndsu.department | Computer Science | en_US |
ndsu.program | Computer Science | en_US |
ndsu.advisor | Ludwig, Simone |