Intrusion Detection: Machine Learning Baseline Calculations for Image Classification

11/03/2021
by   Erik Larsen, et al.
21

Cyber security can be enhanced through application of machine learning by recasting network attack data into an image format, then applying supervised computer vision and other machine learning techniques to detect malicious specimens. Exploratory data analysis reveals little correlation and few distinguishing characteristics between the ten classes of malware used in this study. A general model comparison demonstrates that the most promising candidates for consideration are Light Gradient Boosting Machine, Random Forest Classifier, and Extra Trees Classifier. Convolutional networks fail to deliver their outstanding classification ability, being surpassed by a simple, fully connected architecture. Most tests fail to break 80 present low F1 scores, indicating more sophisticated approaches (e.g., bootstrapping, random samples, and feature selection) may be required to maximize performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 6

page 10

research
11/03/2021

Virus-MNIST: Machine Learning Baseline Calculations for Image Classification

The Virus-MNIST data set is a collection of thumbnail images that is sim...
research
04/02/2019

An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier

Since Internet is so popular and prevailing in human life, countering cy...
research
07/01/2021

Overhead-MNIST: Machine Learning Baselines for Image Classification

Twenty-three machine learning algorithms were trained then scored to est...
research
01/17/2020

Cyber Attack Detection thanks to Machine Learning Algorithms

Cybersecurity attacks are growing both in frequency and sophistication o...
research
05/26/2018

Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques

Network security engineers work to keep services available all the time ...
research
11/03/2022

Reliable Malware Analysis and Detection using Topology Data Analysis

Increasingly, malwares are becoming complex and they are spreading on ne...
research
11/25/2022

OOG- Optuna Optimized GAN Sampling Technique for Tabular Imbalanced Malware Data

Cyberspace occupies a large portion of people's life in the age of moder...

Please sign up or login with your details

Forgot password? Click here to reset