Comprehensive Model Comparison for Intrusion Detection in UNR-IDD Dataset: Evaluating Naïve Bayes, Decision Tree, Random Forest, K-Neighbors, and LSTM

Authors

DOI:

https://doi.org/10.21015/vtcs.v12i2.1929

Abstract

This paper compares the efficiency of five supervised learning algorithms, Namely Naïve Bayes, Decision Tree, Random Forest, K-Neighbors (KNN), and Long Short-Term Memory (LSTM) on intrusion detection using the UNR-IDD dataset. We analysed the results of the models considering the accuracy, precision, and F1-score. The Decision Tree, Random Forest, and LSTM models were also shown to be the best performers with scores of 1 for accuracy, F1-score, and area under the curve on the testing set. The Naïve Bayes yielded low standard error of 0.038165 but the precise values of precision at 0.773218 and F1-score at 0.872107 depict how the model contributed slightly fewer true positives but more false positives. From such outcomes obtained above, it is evident that Decision Tree, Random Forest and LSTM have high accuracy and appropriateness for this intrusion detection problem, although the accuracies of 100\% are questionable because of the possibilities of over fitting. In terms of classification too, K-Neighbors has very good results and rarely misclassifies patterns. Despite this, Naïve Bayes is not the most suitable method in the present case for this particular dataset. This analysis also demonstrates the specific advantages and disadvantages of each model and gives the understanding of real-world usability of intrusion detection systems.

References

M. S., "DDoS botnet attack on IoT devices," Kaggle, 2020. Available at: https://www.kaggle.com/datasets/siddharthm1698/ddos-botnet-attack-on-iot-devices.

T. Das, "UNR-IDD Intrusion Detection Dataset," Kaggle. Available at: https://www.kaggle.com/datasets/tapadhirdas/unridd-intrusion-detection-dataset.

"Attacks and targeted layers in IoT," ResearchGate, 2021. Available at: https://www.researchgate.net/figure/Attacks-and-Targeted-Layers-in-IoT_fig3_350595140.

R. Vishwakarma and A. K. Jain, "A survey of DDoS attacking techniques and defence mechanisms in the IoT network," Telecommunication Systems, Springer US, 2019. Available at: https://link.springer.com/article/10.1007/s11235-019-00599-z.

N. Tripathi, et al., "Application layer denial-of-service attacks and Defense Mechanisms: A Survey," ACM Computing Surveys, vol. 54, no. 4, 2022. Available at: https://dl.acm.org/doi/abs/10.1145/3448291.

B. Gupta, P. Chaudhary, X. Xiaojun, and N. Nedjah, "Smart defense against distributed denial of service attack in IoT networks using supervised learning classifiers," Computers & Electrical Engineering, vol. 2022. Available at: https://www.sciencedirect.com/science/article/abs/pii/S0045790622000404.

C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer, vol. 50, no. 7, pp. 80-84, 2017. https://doi.org/10.1109/MC.2017.201.

O. Osanaiye, K. K. R. Choo, and M. Dlodlo, "Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework," Journal of Network and Computer Applications, vol. 67, pp. 147-165, 2016. https://doi.org/10.1016/j.jnca.2016.01.001.

K. B. Adedeji, A. M. Abu-Mahfouz, and A. M. Kurien, "DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges," Journal of Sensors and Actuator Networks, vol. 12, no. 4, pp. 51, 2024.

R. Bensaid, N. Labraoui, A. A. Abba Ari, L. Maglaras, H. Saidi, A. M. Abdu Lwahhab, and S. Benfriha, "Toward a real-time TCP SYN Flood DDoS mitigation using adaptive neuro-fuzzy classifier and SDN assistance in fog computing," Security and Communication Networks, vol. 2024, pp. 1–20, 2024. https://doi.org/10.1155/2024/6651584.

S. Khozam, G. Blanc, S. Tixeuil, and E. Totel, "DDoS mitigation while preserving QoS: A deep reinforcement learning-based approach," in 2024 IEEE 10th International Conference on Network Softwarization (NetSoft), pp. 369–374, 2024.

T. Wang, X. Xie, L. Zhang, C. Wang, L. Zhang, and Y. Cui, "ShieldGPT: An LLM-based Framework for DDoS Mitigation," in Proceedings of the 8th Asia-Pacific Workshop on Networking, pp. 108–114, 2024.

X. Xia, F. Chen, Q. He, R. Luo, B. Liu, C. Chua, R. Buyya, and Y. Yang, "EdgeShield: Enabling collaborative DDoS mitigation at the edge," IEEE Transactions on Mobile Computing, vol. PP(99), pp. 1–12, 2024. https://doi.org/10.1109/tmc.2024.3443260.

Z. Zhao, Z. Liu, H. Chen, F. Zhang, Z. Song, and Z. Li, "Effective DDoS mitigation via ML-driven in-network traffic shaping," IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 4271–4289, July-August 2024. https://doi.org/10.1109/tdsc.2023.3349180.

Y. Zhou, G. Cheng, Z. Ouyang, and Z. Chen, "Resource-efficient low-rate DDoS mitigation with moving target defense in edge clouds," IEEE Transactions on Network and Service Management, vol. PP(99), pp. 1–1, 2024. https://doi.org/10.1109/tnsm.2024.3413685.

M. Banoula, "Naive Bayes classifier - machine learning [updated]," Simplilearn, 2023. Available at: https://www.simplilearn.com/tutorials/machine-learning-tutorial/naive-bayes-classifier.

Downloads

Published

2024-12-31

How to Cite

Hasan, M. Z., Hussain, M. Z., Mustafa, M., Yaqub, M. A., Umar, H., & Yousaf, H. F. (2024). Comprehensive Model Comparison for Intrusion Detection in UNR-IDD Dataset: Evaluating Naïve Bayes, Decision Tree, Random Forest, K-Neighbors, and LSTM. VAWKUM Transactions on Computer Sciences, 12(2), 311–325. https://doi.org/10.21015/vtcs.v12i2.1929