Network Intrusion Detection Based on Machine Learning Strategies: Performance Comparisons on Imbalanced Wired, Wireless, and Software-Defined Networking (SDN) Network Traffics

dc.contributor.author Hacilar, Hilal
dc.contributor.author Aydin, Zafer
dc.contributor.author Güngör, Vehbi Çağrı
dc.date.accessioned 2025-09-25T10:53:08Z
dc.date.available 2025-09-25T10:53:08Z
dc.date.issued 2024
dc.description.abstract The rapid growth of computer networks emphasizes the urgency of addressing security issues. Organizations rely on network intrusion detection systems (NIDSs) to protect sensitive data from unauthorized access and theft. These systems analyze network traffic to detect suspicious activities, such as attempted breaches or cyberattacks. However, existing studies lack a thorough assessment of class imbalances and classification performance for different types of network intrusions: wired, wireless, and software-defined networking (SDN). This research aims to fill this gap by examining these networks’ imbalances, feature selection, and binary classification to enhance intrusion detection system efficiency. Various techniques such as SMOTE, ROS, ADASYN, and SMOTETomek are used to handle imbalanced datasets. Additionally, eXtreme Gradient Boosting (XGBoost) identifies key features, and an autoencoder (AE) assists in feature extraction for the classification task. The study evaluates datasets such as AWID, UNSW, and InSDN, yielding the best results with different numbers of selected features. Bayesian optimization fine-tunes parameters, and diverse machine learning algorithms (SVM, kNN, XGBoost, random forest, ensemble classifiers, and autoencoders) are employed. The optimal results, considering F1-measure, overall accuracy, detection rate, and false alarm rate, have been achieved for the UNSW-NB15, preprocessed AWID, and InSDN datasets, with values of [0.9356, 0.9289, 0.9328, 0.07597], [0.997, 0.9995, 0.9999, 0.0171], and [0.9998, 0.9996, 0.9998, 0.0012], respectively. These findings demonstrate that combining Bayesian optimization with oversampling techniques significantly enhances classification performance across wired, wireless, and SDN networks when compared to previous research conducted on these datasets. © 2024 Elsevier B.V., All rights reserved. en_US
dc.identifier.doi 10.55730/1300-0632.4091
dc.identifier.issn 1303-6203
dc.identifier.issn 1300-0632
dc.identifier.scopus 2-s2.0-85200202768
dc.identifier.uri https://doi.org/10.55730/1300-0632.4091
dc.identifier.uri https://search.trdizin.gov.tr/en/yayin/detay/1252385/network-intrusion-detection-based-on-machine-learning-strategies-performance-comparisons-on-imbalanced-wired-wireless-and-software-defined-networking-sdn-network-traics
dc.identifier.uri https://hdl.handle.net/20.500.12573/4272
dc.language.iso en en_US
dc.publisher Turkiye Klinikleri en_US
dc.relation.ispartof Turkish Journal of Electrical Engineering and Computer Sciences en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Bayesian Optimization en_US
dc.subject Class Imbalance en_US
dc.subject Deep Learning en_US
dc.subject Network Anomaly Detection en_US
dc.subject Network Intrusion Detection Systems (Nids) en_US
dc.subject Software-Defined Networking (Sdn) en_US
dc.subject Anomaly Detection en_US
dc.subject Classification (Of Information) en_US
dc.subject Computer Crime en_US
dc.subject Deep Learning en_US
dc.subject Feature Extraction en_US
dc.subject Intrusion Detection en_US
dc.subject Learning Algorithms en_US
dc.subject Sensitive Data en_US
dc.subject Support Vector Machines en_US
dc.subject Bayesian Optimization en_US
dc.subject Class Imbalance en_US
dc.subject Classification Performance en_US
dc.subject Network Anomaly Detection en_US
dc.subject Network Intrusion Detection System en_US
dc.subject Network Intrusion Detection Systems en_US
dc.subject Network Traffic en_US
dc.subject Software-Defined Networking en_US
dc.subject Software-Defined Networkings en_US
dc.subject Software Defined Networking en_US
dc.title Network Intrusion Detection Based on Machine Learning Strategies: Performance Comparisons on Imbalanced Wired, Wireless, and Software-Defined Networking (SDN) Network Traffics en_US
dc.type Article en_US
dspace.entity.type Publication
gdc.author.scopusid 57205573679
gdc.author.scopusid 7003852510
gdc.author.scopusid 10739803300
gdc.bip.impulseclass C4
gdc.bip.influenceclass C5
gdc.bip.popularityclass C4
gdc.coar.access open access
gdc.coar.type text::journal::journal article
gdc.collaboration.industrial true
gdc.description.department Abdullah Gül University en_US
gdc.description.departmenttemp [Hacilar] Hilal, Department of Computer Engineering, Abdullah Gül Üniversitesi, Kayseri, Turkey; [Aydin] Zafer, Department of Computer Engineering, Abdullah Gül Üniversitesi, Kayseri, Turkey; [Güngör] Vehbi Çağrı, Turkcell Technology, Istanbul, Turkey en_US
gdc.description.endpage 640 en_US
gdc.description.issue 4 en_US
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality Q2
gdc.description.startpage 623 en_US
gdc.description.volume 32 en_US
gdc.description.wosquality Q3
gdc.identifier.openalex W4401141877
gdc.identifier.trdizinid 1252385
gdc.index.type Scopus
gdc.index.type TR-Dizin
gdc.oaire.accesstype GOLD
gdc.oaire.diamondjournal false
gdc.oaire.downloads 39
gdc.oaire.impulse 5.0
gdc.oaire.influence 2.871131E-9
gdc.oaire.isgreen true
gdc.oaire.keywords network anomaly detection
gdc.oaire.keywords Network intrusion detection systems (NIDS)
gdc.oaire.keywords class imbalance
gdc.oaire.keywords deep learning
gdc.oaire.keywords Bayesian opti- mization
gdc.oaire.keywords software-defined networking (SDN)
gdc.oaire.keywords Class imbalance
gdc.oaire.keywords Deep
gdc.oaire.keywords Software-defined networking (SDN)
gdc.oaire.keywords Network anomaly detection
gdc.oaire.popularity 6.2094814E-9
gdc.oaire.publicfunded false
gdc.oaire.views 129
gdc.openalex.collaboration International
gdc.openalex.fwci 1.8316
gdc.openalex.normalizedpercentile 0.86
gdc.openalex.toppercent TOP 10%
gdc.opencitations.count 4
gdc.plumx.crossrefcites 5
gdc.plumx.mendeley 25
gdc.plumx.scopuscites 6
gdc.scopus.citedcount 6
gdc.virtual.author Hacılar, Hilal
gdc.virtual.author Aydın, Zafer
relation.isAuthorOfPublication ac461e50-4a71-4e82-b19b-0ae02f5d683a
relation.isAuthorOfPublication a26c06af-eae3-407c-a21a-128459fa4d2f
relation.isAuthorOfPublication.latestForDiscovery ac461e50-4a71-4e82-b19b-0ae02f5d683a
relation.isOrgUnitOfPublication 665d3039-05f8-4a25-9a3c-b9550bffecef
relation.isOrgUnitOfPublication 52f507ab-f278-4a1f-824c-44da2a86bd51
relation.isOrgUnitOfPublication ef13a800-4c99-4124-81e0-3e25b33c0c2b
relation.isOrgUnitOfPublication.latestForDiscovery 665d3039-05f8-4a25-9a3c-b9550bffecef

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Network intrusion detection based on machine learning strategies_.pdf
Size:
805.58 KB
Format:
Adobe Portable Document Format
Description:
Makale

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.44 KB
Format:
Item-specific license agreed upon to submission
Description: