SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
Abstract
A novel supervised machine learning system is developed to classify network traffic whether it is
malicious or benign. To find the best model considering detection success rate, combination of
supervised learning algorithm and feature selection method have been used. Through this study,
it is found that Artificial Neural Network (ANN) based machine learning with wrapper feature
selection outperform support vector machine (SVM) technique while classifying network traffic.
To evaluate the performance, NSL-KDD dataset is used to classify network traffic using SVM
and ANN supervised machine learning techniques. Comparative study shows that the proposed
model is efficient than other existing models with respect to intrusion detection success rate.
Existing System:
While network IDS that works based on signature have seen commercial success and widespread
adoption by the technology based organization throughout the globe, anomaly based network
IDS have not gained success in the same scale. Due to that reason in the field of IDS, currently
anomaly based detection is a major focus area of research and development and before going to
any wide scale deployment of anomaly based intrusion detection system, key issues remain to be
solved. But the literature today is limited when it comes to compare on how intrusion detection
performs when using supervised machine learning techniques.
Proposed System:
The promise and the contribution machine learning did till today are fascinating. There are many
real life applications we are using today offered by machine learning. It seems that machine
learning will rule the world in coming days. Hence we came out into a hypothesis that the
challenge of identifying new attacks or zero day attacks facing by the technology enabled
organizations today can be overcome using machine learning techniques. Here we developed a
supervised machine learning model that can classify unseen network traffic based on what is
learnt from the seen traffic. We used both SVM and ANN learning algorithm to find the best
classifier with higher accuracy and success rate.
System Architecture:
The system proposed is composed of feature selection and learning algorithm show in Figure.
Feature selection component are responsible to extract most relevant features or attributes to
identify the instance to a particular group or class. The learning algorithm component builds the
necessary intelligence or knowledge using the result found from the feature selection component.
Using the training dataset, the model gets trained and builds its intelligence. Then the learned
intelligences are applied to the testing dataset to measure the accuracy of home much the model
correctly classified on unseen data.
Modules:
Feature Selection:
Feature selection is an important part in machine learning to reduce data dimensionality and
extensive research carried out for a reliable feature selection method. For feature selection filter
method and wrapper method have been used. In filter method, features are selected on the basis
of their scores in various statistical tests that measure the relevance of features by their
correlation with dependent variable or outcome variable. Wrapper method finds a subset of
features by measuring the usefulness of a subset of feature with the dependent variable. Hence
filter methods are independent of any machine learning algorithm whereas in wrapper method
the best feature subset selected depends on the machine learning algorithm used to train the
model.
Building Machine Intelligence:
Based on the best features found in the feature selection process, learning models are developed.
To develop the learning model, machine learning algorithm is used. Training dataset is used to
train the algorithm with the selected features. In supervised machine learning, each instance in
the training dataset has the class it belongs to. The algorithm build the learning model based on
which machine learning algorithm is being used.
Support Vector Machine (SVM):
In SVM a separating hyper plane defines the classifier depending on the type of problem and
available datasets. In case where dataset is one dimensional, the hyper plane is a point, for two
dimensional data it is a separating line as shown in below Figure.
Artificial Neural Network (ANN):
Artificial Neural Network is another tool used in machine learning. As it name suggests, ANN is
a system inspired by human brain system and replicate the learning system of human brain. It
consists of input and output layers with one or more hidden layers in most cases as shown in
Figure. The ANN uses a technique called back propagation to adjust the outcome with the
expected result or class.
SYSTEM CONFIGURATION:
Hardware requirements:
Processer : Any Update Processer
Ram : Min 4 GB
Hard Disk : Min 100 GB
Software requirements:
Operating System : Windows family
Technology : Python 3.6
IDE : PyCharm
Front-End : PyQt5

More Related Content

PPTX
Lecture 10 intruders
PDF
Feature selection
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PPT
IDS and IPS
PPT
PPTX
Intrusion Prevention System
PPTX
05 Clustering in Data Mining
PPT
Intrusion detection system ppt
Lecture 10 intruders
Feature selection
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
IDS and IPS
Intrusion Prevention System
05 Clustering in Data Mining
Intrusion detection system ppt

What's hot (20)

PPT
Hive(ppt)
PDF
Crop Recommendation System Using Machine Learning
PPTX
K nearest neighbor
PDF
Cyber security and demonstration of security tools
PPTX
PCA and LDA in machine learning
PPSX
Intrusion detection system
PDF
Cyber Security
PDF
Weak supervised learning - Kristina Khvatova
PPTX
Community detection algorithms
PPTX
Carcinoma of Stomach
PPTX
Digital certificates
PDF
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Presentation on K-Means Clustering
PPT
Clustering
PPTX
IBM QRadar WinCollector - Managed Vs Stand Alone
PPT
Data Mining
PPT
K means Clustering Algorithm
PPTX
Classification techniques in data mining
PPTX
Intrusion detection system
Hive(ppt)
Crop Recommendation System Using Machine Learning
K nearest neighbor
Cyber security and demonstration of security tools
PCA and LDA in machine learning
Intrusion detection system
Cyber Security
Weak supervised learning - Kristina Khvatova
Community detection algorithms
Carcinoma of Stomach
Digital certificates
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Intrusion Detection Systems and Intrusion Prevention Systems
Presentation on K-Means Clustering
Clustering
IBM QRadar WinCollector - Managed Vs Stand Alone
Data Mining
K means Clustering Algorithm
Classification techniques in data mining
Intrusion detection system
Ad

Similar to Network intrusion detection using supervised machine learning technique with feature selection (20)

PDF
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
PDF
PDF
Machine Learning_Unit 2_Full.ppt.pdf
PDF
Top 10 Machine Learning Algorithms in 2025.pdf
PDF
A survey of modified support vector machine using particle of swarm optimizat...
PDF
Top 10 Machine Learning Algorithms in 2025.pdf
PDF
IRJET- Intrusion Detection using IP Binding in Real Network
PPTX
Eckovation Machine Learning
PPTX
Covid Detectioin via X-ray Image Processing
PPTX
MACHINE LEARNING MODELS. pptx
PDF
Progress of Machine Learning in the Field of Intrusion Detection Systems
PDF
PROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYSTEMS
PDF
PROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYSTEMS
PDF
Progress of Machine Learning in the Field of Intrusion Detection Systems
PDF
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
PDF
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
PDF
IRJET - Survey on Malware Detection using Deep Learning Methods
PPTX
INTRODUCTIONTOML2024 for graphic era.pptx
PDF
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Machine Learning_Unit 2_Full.ppt.pdf
Top 10 Machine Learning Algorithms in 2025.pdf
A survey of modified support vector machine using particle of swarm optimizat...
Top 10 Machine Learning Algorithms in 2025.pdf
IRJET- Intrusion Detection using IP Binding in Real Network
Eckovation Machine Learning
Covid Detectioin via X-ray Image Processing
MACHINE LEARNING MODELS. pptx
Progress of Machine Learning in the Field of Intrusion Detection Systems
PROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYSTEMS
PROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYSTEMS
Progress of Machine Learning in the Field of Intrusion Detection Systems
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
IRJET - Survey on Malware Detection using Deep Learning Methods
INTRODUCTIONTOML2024 for graphic era.pptx
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
Ad

More from CloudTechnologies (20)

DOCX
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
DOCX
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
DOCX
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
DOCX
Machine Learning Classification to predict water purity based on Viruses and ...
DOCX
iot based safety and health monitoring for construction workers
DOCX
Intelligent neonatal monitoring system based on android application using mul...
DOCX
An iot based smart garden with weather station system
DOCX
A deep learning facial expression recognition based scoring system for restau...
DOCX
Diabetes prediction using different machine learning approaches
DOCX
machine learning based predictive analytics of student academic performance i...
DOCX
Image based estimation of real food size for accurate food calorie estimation
DOCX
Io t projects
DOCX
Cloud computing projects
DOCX
Data mining projects
DOCX
Python IEEE 2019 Projects List
DOCX
Machine learning projects
DOCX
Raspberry Pi based voice-operated personal assistant (Neobot)
DOCX
Automation in Agriculture and IoT
DOCX
Gas Leakage Detection Based on IOT
DOCX
The Internet-of-Things based hand gestures using wearable sensors for human m...
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
Machine Learning Classification to predict water purity based on Viruses and ...
iot based safety and health monitoring for construction workers
Intelligent neonatal monitoring system based on android application using mul...
An iot based smart garden with weather station system
A deep learning facial expression recognition based scoring system for restau...
Diabetes prediction using different machine learning approaches
machine learning based predictive analytics of student academic performance i...
Image based estimation of real food size for accurate food calorie estimation
Io t projects
Cloud computing projects
Data mining projects
Python IEEE 2019 Projects List
Machine learning projects
Raspberry Pi based voice-operated personal assistant (Neobot)
Automation in Agriculture and IoT
Gas Leakage Detection Based on IOT
The Internet-of-Things based hand gestures using wearable sensors for human m...

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PDF
Basic Mud Logging Guide for educational purpose
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
01-Introduction-to-Information-Management.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Cell Types and Its function , kingdom of life
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Sports Quiz easy sports quiz sports quiz
Complications of Minimal Access Surgery at WLH
Basic Mud Logging Guide for educational purpose
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
STATICS OF THE RIGID BODIES Hibbelers.pdf
Final Presentation General Medicine 03-08-2024.pptx
TR - Agricultural Crops Production NC III.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
01-Introduction-to-Information-Management.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Cell Types and Its function , kingdom of life
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Cell Structure & Organelles in detailed.
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Sports Quiz easy sports quiz sports quiz

Network intrusion detection using supervised machine learning technique with feature selection

  • 1. Abstract A novel supervised machine learning system is developed to classify network traffic whether it is malicious or benign. To find the best model considering detection success rate, combination of supervised learning algorithm and feature selection method have been used. Through this study, it is found that Artificial Neural Network (ANN) based machine learning with wrapper feature selection outperform support vector machine (SVM) technique while classifying network traffic. To evaluate the performance, NSL-KDD dataset is used to classify network traffic using SVM and ANN supervised machine learning techniques. Comparative study shows that the proposed model is efficient than other existing models with respect to intrusion detection success rate. Existing System: While network IDS that works based on signature have seen commercial success and widespread adoption by the technology based organization throughout the globe, anomaly based network IDS have not gained success in the same scale. Due to that reason in the field of IDS, currently anomaly based detection is a major focus area of research and development and before going to any wide scale deployment of anomaly based intrusion detection system, key issues remain to be solved. But the literature today is limited when it comes to compare on how intrusion detection performs when using supervised machine learning techniques. Proposed System: The promise and the contribution machine learning did till today are fascinating. There are many real life applications we are using today offered by machine learning. It seems that machine learning will rule the world in coming days. Hence we came out into a hypothesis that the challenge of identifying new attacks or zero day attacks facing by the technology enabled organizations today can be overcome using machine learning techniques. Here we developed a supervised machine learning model that can classify unseen network traffic based on what is learnt from the seen traffic. We used both SVM and ANN learning algorithm to find the best classifier with higher accuracy and success rate.
  • 2. System Architecture: The system proposed is composed of feature selection and learning algorithm show in Figure. Feature selection component are responsible to extract most relevant features or attributes to identify the instance to a particular group or class. The learning algorithm component builds the necessary intelligence or knowledge using the result found from the feature selection component. Using the training dataset, the model gets trained and builds its intelligence. Then the learned intelligences are applied to the testing dataset to measure the accuracy of home much the model correctly classified on unseen data.
  • 3. Modules: Feature Selection: Feature selection is an important part in machine learning to reduce data dimensionality and extensive research carried out for a reliable feature selection method. For feature selection filter method and wrapper method have been used. In filter method, features are selected on the basis of their scores in various statistical tests that measure the relevance of features by their correlation with dependent variable or outcome variable. Wrapper method finds a subset of features by measuring the usefulness of a subset of feature with the dependent variable. Hence filter methods are independent of any machine learning algorithm whereas in wrapper method the best feature subset selected depends on the machine learning algorithm used to train the model. Building Machine Intelligence: Based on the best features found in the feature selection process, learning models are developed. To develop the learning model, machine learning algorithm is used. Training dataset is used to train the algorithm with the selected features. In supervised machine learning, each instance in the training dataset has the class it belongs to. The algorithm build the learning model based on which machine learning algorithm is being used. Support Vector Machine (SVM): In SVM a separating hyper plane defines the classifier depending on the type of problem and available datasets. In case where dataset is one dimensional, the hyper plane is a point, for two dimensional data it is a separating line as shown in below Figure.
  • 4. Artificial Neural Network (ANN): Artificial Neural Network is another tool used in machine learning. As it name suggests, ANN is a system inspired by human brain system and replicate the learning system of human brain. It consists of input and output layers with one or more hidden layers in most cases as shown in Figure. The ANN uses a technique called back propagation to adjust the outcome with the expected result or class.
  • 5. SYSTEM CONFIGURATION: Hardware requirements: Processer : Any Update Processer Ram : Min 4 GB Hard Disk : Min 100 GB Software requirements: Operating System : Windows family Technology : Python 3.6 IDE : PyCharm Front-End : PyQt5