Network Intrusion Detection Based on Machine Learning Strategies: Performance Comparisons on Imbalanced Wired, Wireless, and Software-Defined Networking (SDN) Network Traffics
Loading...
Date
2024
Journal Title
Journal ISSN
Volume Title
Publisher
Turkiye Klinikleri
Open Access Color
GOLD
Green Open Access
Yes
OpenAIRE Downloads
39
OpenAIRE Views
129
Publicly Funded
No
Abstract
The rapid growth of computer networks emphasizes the urgency of addressing security issues. Organizations rely on network intrusion detection systems (NIDSs) to protect sensitive data from unauthorized access and theft. These systems analyze network traffic to detect suspicious activities, such as attempted breaches or cyberattacks. However, existing studies lack a thorough assessment of class imbalances and classification performance for different types of network intrusions: wired, wireless, and software-defined networking (SDN). This research aims to fill this gap by examining these networks’ imbalances, feature selection, and binary classification to enhance intrusion detection system efficiency. Various techniques such as SMOTE, ROS, ADASYN, and SMOTETomek are used to handle imbalanced datasets. Additionally, eXtreme Gradient Boosting (XGBoost) identifies key features, and an autoencoder (AE) assists in feature extraction for the classification task. The study evaluates datasets such as AWID, UNSW, and InSDN, yielding the best results with different numbers of selected features. Bayesian optimization fine-tunes parameters, and diverse machine learning algorithms (SVM, kNN, XGBoost, random forest, ensemble classifiers, and autoencoders) are employed. The optimal results, considering F1-measure, overall accuracy, detection rate, and false alarm rate, have been achieved for the UNSW-NB15, preprocessed AWID, and InSDN datasets, with values of [0.9356, 0.9289, 0.9328, 0.07597], [0.997, 0.9995, 0.9999, 0.0171], and [0.9998, 0.9996, 0.9998, 0.0012], respectively. These findings demonstrate that combining Bayesian optimization with oversampling techniques significantly enhances classification performance across wired, wireless, and SDN networks when compared to previous research conducted on these datasets. © 2024 Elsevier B.V., All rights reserved.
Description
Keywords
Bayesian Optimization, Class Imbalance, Deep Learning, Network Anomaly Detection, Network Intrusion Detection Systems (Nids), Software-Defined Networking (Sdn), Anomaly Detection, Classification (Of Information), Computer Crime, Deep Learning, Feature Extraction, Intrusion Detection, Learning Algorithms, Sensitive Data, Support Vector Machines, Bayesian Optimization, Class Imbalance, Classification Performance, Network Anomaly Detection, Network Intrusion Detection System, Network Intrusion Detection Systems, Network Traffic, Software-Defined Networking, Software-Defined Networkings, Software Defined Networking, network anomaly detection, Network intrusion detection systems (NIDS), class imbalance, deep learning, Bayesian opti- mization, software-defined networking (SDN), Class imbalance, Deep, Software-defined networking (SDN), Network anomaly detection
Fields of Science
Citation
WoS Q
Q3
Scopus Q
Q2

OpenCitations Citation Count
4
Source
Turkish Journal of Electrical Engineering and Computer Sciences
Volume
32
Issue
4
Start Page
623
End Page
640
URI
https://doi.org/10.55730/1300-0632.4091
https://search.trdizin.gov.tr/en/yayin/detay/1252385/network-intrusion-detection-based-on-machine-learning-strategies-performance-comparisons-on-imbalanced-wired-wireless-and-software-defined-networking-sdn-network-traics
https://hdl.handle.net/20.500.12573/4272
https://search.trdizin.gov.tr/en/yayin/detay/1252385/network-intrusion-detection-based-on-machine-learning-strategies-performance-comparisons-on-imbalanced-wired-wireless-and-software-defined-networking-sdn-network-traics
https://hdl.handle.net/20.500.12573/4272
PlumX Metrics
Citations
CrossRef : 5
Scopus : 6
Captures
Mendeley Readers : 25
SCOPUS™ Citations
6
checked on Mar 06, 2026
Page Views
2
checked on Mar 06, 2026
Downloads
5
checked on Mar 06, 2026
Google Scholar™


