Comparison Analysis of Classification Algorithms for Intrusion Detection

dc.contributor.authorSaha, Binita
dc.date.accessioned2021-08-19T18:15:24Z
dc.date.available2021-08-19T18:15:24Z
dc.date.issued2021
dc.description.abstractAs the Internet of Things becomes more prevalent in our lives, we are confronted with more security concerns. Network attacks have become more common in the cyber world these days. Denial of service, Prove, Remote to Local attacks, and other types of attacks are on the rise. In our research, we used five machine learning classifiers and conducted a comparison analysis to see which one performed better in predicting network anomalies. Since the dataset we used is unbalanced, we experimented with oversampling and under sampling techniques for the minority and majority groups to improve the model's prediction. Then, in order to test and compare our models, we measured accuracy, F1 ranking, and confusion matrix.en_US
dc.identifier.urihttps://hdl.handle.net/10365/32037
dc.publisherNorth Dakota State Universityen_US
dc.rightsNDSU policy 190.6.2en_US
dc.rights.urihttps://www.ndsu.edu/fileadmin/policy/190.pdfen_US
dc.subjectIntrusion detection.en_US
dc.subjectIDS.en_US
dc.subjectMachine learning classifier.en_US
dc.subjectNSL-KDD dataset.en_US
dc.subjectRandom forest.en_US
dc.subjectDecision tree.en_US
dc.subjectBinary search algorithm.en_US
dc.titleComparison Analysis of Classification Algorithms for Intrusion Detectionen_US
dc.typeMaster's paperen_US
ndsu.advisorLudwig, Simone
ndsu.collegeEngineeringen_US
ndsu.degreeMaster of Science (MS)en_US
ndsu.departmentComputer Scienceen_US
ndsu.programComputer Scienceen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Comparison Analysis of Classification Algorithms for Intrusion Detection.pdf
Size:
654.71 KB
Format:
Adobe Portable Document Format
Description:
Comparison Analysis of Classification Algorithms for Intrusion Detection

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed to upon submission
Description: