Event Details

Intrusion Detection Using the WEKA Machine Learning Tool

Presenter: Sadiq Ali
Supervisor:

Date: Mon, December 13, 2021
Time: 08:00:00 - 09:00:00
Place: via Zoom - please see link below

ABSTRACT

Zoom Meeting Link: https://uvic.zoom.us/j/87959566063?pwd=ZmZXblUvaE03MkozNnZKRSszOW9qdz09

Meeting ID: 879 5956 6063

Password: 351817

Note: Please log in to Zoom via SSO and your UVic Netlink ID.

Abstract: The internet has become essential for data sharing, so it must be secure. Data encryption and authentication are not sufficient for internet security, and firewalls are unable to detect fragmented malicious packets. Further attackers are constantly modifying their techniques and tools to produce devastating consequences such as productivity loss, financial loss and brand damage. Thus, it has become crucial to implement an efficient intrusion detection system, which is a very difficult challenge. The CSE-CIC-IDS2018 dataset consists of 14 network attacks and benign traffic with 80 features. In this report, data for seven network attacks and benign data are used. Principal Components Analysis (PCA) is employed to extract the ten most relevant features. The Machine Learning (ML) algorithms studied are Multi-Layer Perceptron (MLP), Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Random Forest (RF) and Bayesian Network (BayesNet). The experiments are performed using the Waikato Environment for Knowledge Analysis (WEKA) tool with five-fold and ten-fold cross-validation. The performance measures employed are accuracy, precision, recall, F measure, and execution time. The results obtained show that RF outperforms the other algorithms in accuracy, precision, recall, and F-measure.