Work place: Department Of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh
E-mail: sadmanxp@gmail.com
Website:
Research Interests: Computer systems and computational processes, Artificial Intelligence, Computational Learning Theory, Data Structures and Algorithms
Biography
Shadman Latif is born in Bangladesh on 25th December 1999. He did his BSc in Computer Science and Engineering from American International University-Bangladesh in 2022. His research focus is on the applications of Machine Learning Algorithms and Artificial Intelligence. His future target is to achieve a prestigious Masters and PhD degree in the field of Machine Learning and Artificial Intelligence.
By Shadman Latif Faria Farzana Dola MD. Mahir Afsar Ishrat Jahan Esha Dip Nandi
DOI: https://doi.org/10.5815/ijieeb.2022.02.01, Pub. Date: 8 Apr. 2022
Network intrusion is an increasing major concern as we are rapidly advancing in technology. To detect network intrusion, Intrusion Detection Systems are required. Among the wide range of intrusion detection technologies, machine learning methods are the most appropriate. In this paper we investigated different machine learning techniques using NSL-KDD dataset, with steps of building a model. We used Decision Tree, Support Vector Machine, Random Forest, Naïve Bayes, Neural network, adaBoost machine leaning algorithms. At step one, one-hot-encoding is applied to convert categorical to numeric features. At step two, different feature scaling techniques, including normalization and standardization, are applied on these six selected machine learning algorithms with the encoded dataset. Further in this step, for each of the six machine learning algorithms, the better scaling technique application outcome is selected for the comparison in the next step. We considered six pairs of better scaling technique with each machine learning algorithm. Among these six scaling-machine learning pairs, one pair (Naïve Bayes) is dropped for having inferior performance. Hence, the outcome of this step is five scaling-machine learning pairs. At step three, different feature reduction techniques, including low variance filter, high correlation filter, Random Forest, Incremental PCA, are applied to the five scaling-machine learning pairs from step two. Further in this step, for each of the five scaling-machine learning pairs, the better feature reduction technique application outcome is selected for the comparison in the next step. The outcome of this step is five feature reduced scaling-machine learning pairs. At step four, different sampling techniques, including SMOTE, Borderline-SMOTE, ADASYN are applied to the five feature reduced scaling-machine learning pairs. The outcome of this step is five over sampled, feature reduced scaling-machine learning pairs. This outcome is then finally compared to find the best pairs to be used for intrusion detection system.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals