Network Intrusion Detection Based on Machine Learning Strategies: Performance Comparisons on Imbalanced Wired, Wireless, and Software-Defined Networking (SDN) Network Traffics
| dc.contributor.author | Hacilar, Hilal | |
| dc.contributor.author | Aydin, Zafer | |
| dc.contributor.author | Güngör, Vehbi Çağrı | |
| dc.date.accessioned | 2025-09-25T10:53:08Z | |
| dc.date.available | 2025-09-25T10:53:08Z | |
| dc.date.issued | 2024 | |
| dc.description.abstract | The rapid growth of computer networks emphasizes the urgency of addressing security issues. Organizations rely on network intrusion detection systems (NIDSs) to protect sensitive data from unauthorized access and theft. These systems analyze network traffic to detect suspicious activities, such as attempted breaches or cyberattacks. However, existing studies lack a thorough assessment of class imbalances and classification performance for different types of network intrusions: wired, wireless, and software-defined networking (SDN). This research aims to fill this gap by examining these networks’ imbalances, feature selection, and binary classification to enhance intrusion detection system efficiency. Various techniques such as SMOTE, ROS, ADASYN, and SMOTETomek are used to handle imbalanced datasets. Additionally, eXtreme Gradient Boosting (XGBoost) identifies key features, and an autoencoder (AE) assists in feature extraction for the classification task. The study evaluates datasets such as AWID, UNSW, and InSDN, yielding the best results with different numbers of selected features. Bayesian optimization fine-tunes parameters, and diverse machine learning algorithms (SVM, kNN, XGBoost, random forest, ensemble classifiers, and autoencoders) are employed. The optimal results, considering F1-measure, overall accuracy, detection rate, and false alarm rate, have been achieved for the UNSW-NB15, preprocessed AWID, and InSDN datasets, with values of [0.9356, 0.9289, 0.9328, 0.07597], [0.997, 0.9995, 0.9999, 0.0171], and [0.9998, 0.9996, 0.9998, 0.0012], respectively. These findings demonstrate that combining Bayesian optimization with oversampling techniques significantly enhances classification performance across wired, wireless, and SDN networks when compared to previous research conducted on these datasets. © 2024 Elsevier B.V., All rights reserved. | en_US |
| dc.identifier.doi | 10.55730/1300-0632.4091 | |
| dc.identifier.issn | 1303-6203 | |
| dc.identifier.issn | 1300-0632 | |
| dc.identifier.scopus | 2-s2.0-85200202768 | |
| dc.identifier.uri | https://doi.org/10.55730/1300-0632.4091 | |
| dc.identifier.uri | https://search.trdizin.gov.tr/en/yayin/detay/1252385/network-intrusion-detection-based-on-machine-learning-strategies-performance-comparisons-on-imbalanced-wired-wireless-and-software-defined-networking-sdn-network-traics | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12573/4272 | |
| dc.language.iso | en | en_US |
| dc.publisher | Turkiye Klinikleri | en_US |
| dc.relation.ispartof | Turkish Journal of Electrical Engineering and Computer Sciences | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Bayesian Optimization | en_US |
| dc.subject | Class Imbalance | en_US |
| dc.subject | Deep Learning | en_US |
| dc.subject | Network Anomaly Detection | en_US |
| dc.subject | Network Intrusion Detection Systems (Nids) | en_US |
| dc.subject | Software-Defined Networking (Sdn) | en_US |
| dc.subject | Anomaly Detection | en_US |
| dc.subject | Classification (Of Information) | en_US |
| dc.subject | Computer Crime | en_US |
| dc.subject | Deep Learning | en_US |
| dc.subject | Feature Extraction | en_US |
| dc.subject | Intrusion Detection | en_US |
| dc.subject | Learning Algorithms | en_US |
| dc.subject | Sensitive Data | en_US |
| dc.subject | Support Vector Machines | en_US |
| dc.subject | Bayesian Optimization | en_US |
| dc.subject | Class Imbalance | en_US |
| dc.subject | Classification Performance | en_US |
| dc.subject | Network Anomaly Detection | en_US |
| dc.subject | Network Intrusion Detection System | en_US |
| dc.subject | Network Intrusion Detection Systems | en_US |
| dc.subject | Network Traffic | en_US |
| dc.subject | Software-Defined Networking | en_US |
| dc.subject | Software-Defined Networkings | en_US |
| dc.subject | Software Defined Networking | en_US |
| dc.title | Network Intrusion Detection Based on Machine Learning Strategies: Performance Comparisons on Imbalanced Wired, Wireless, and Software-Defined Networking (SDN) Network Traffics | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication | |
| gdc.author.scopusid | 57205573679 | |
| gdc.author.scopusid | 7003852510 | |
| gdc.author.scopusid | 10739803300 | |
| gdc.bip.impulseclass | C4 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C4 | |
| gdc.coar.access | open access | |
| gdc.coar.type | text::journal::journal article | |
| gdc.collaboration.industrial | true | |
| gdc.description.department | Abdullah Gül University | en_US |
| gdc.description.departmenttemp | [Hacilar] Hilal, Department of Computer Engineering, Abdullah Gül Üniversitesi, Kayseri, Turkey; [Aydin] Zafer, Department of Computer Engineering, Abdullah Gül Üniversitesi, Kayseri, Turkey; [Güngör] Vehbi Çağrı, Turkcell Technology, Istanbul, Turkey | en_US |
| gdc.description.endpage | 640 | en_US |
| gdc.description.issue | 4 | en_US |
| gdc.description.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | Q2 | |
| gdc.description.startpage | 623 | en_US |
| gdc.description.volume | 32 | en_US |
| gdc.description.wosquality | Q3 | |
| gdc.identifier.openalex | W4401141877 | |
| gdc.identifier.trdizinid | 1252385 | |
| gdc.index.type | Scopus | |
| gdc.index.type | TR-Dizin | |
| gdc.oaire.accesstype | GOLD | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.downloads | 39 | |
| gdc.oaire.impulse | 5.0 | |
| gdc.oaire.influence | 2.871131E-9 | |
| gdc.oaire.isgreen | true | |
| gdc.oaire.keywords | network anomaly detection | |
| gdc.oaire.keywords | Network intrusion detection systems (NIDS) | |
| gdc.oaire.keywords | class imbalance | |
| gdc.oaire.keywords | deep learning | |
| gdc.oaire.keywords | Bayesian opti- mization | |
| gdc.oaire.keywords | software-defined networking (SDN) | |
| gdc.oaire.keywords | Class imbalance | |
| gdc.oaire.keywords | Deep | |
| gdc.oaire.keywords | Software-defined networking (SDN) | |
| gdc.oaire.keywords | Network anomaly detection | |
| gdc.oaire.popularity | 6.2094814E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.views | 129 | |
| gdc.openalex.collaboration | International | |
| gdc.openalex.fwci | 1.8316 | |
| gdc.openalex.normalizedpercentile | 0.86 | |
| gdc.openalex.toppercent | TOP 10% | |
| gdc.opencitations.count | 4 | |
| gdc.plumx.crossrefcites | 5 | |
| gdc.plumx.mendeley | 25 | |
| gdc.plumx.scopuscites | 6 | |
| gdc.scopus.citedcount | 6 | |
| gdc.virtual.author | Hacılar, Hilal | |
| gdc.virtual.author | Aydın, Zafer | |
| relation.isAuthorOfPublication | ac461e50-4a71-4e82-b19b-0ae02f5d683a | |
| relation.isAuthorOfPublication | a26c06af-eae3-407c-a21a-128459fa4d2f | |
| relation.isAuthorOfPublication.latestForDiscovery | ac461e50-4a71-4e82-b19b-0ae02f5d683a | |
| relation.isOrgUnitOfPublication | 665d3039-05f8-4a25-9a3c-b9550bffecef | |
| relation.isOrgUnitOfPublication | 52f507ab-f278-4a1f-824c-44da2a86bd51 | |
| relation.isOrgUnitOfPublication | ef13a800-4c99-4124-81e0-3e25b33c0c2b | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 665d3039-05f8-4a25-9a3c-b9550bffecef |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Network intrusion detection based on machine learning strategies_.pdf
- Size:
- 805.58 KB
- Format:
- Adobe Portable Document Format
- Description:
- Makale
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.44 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
