Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{163247,
author = {K.RAMESH},
title = {Evaluating ML Algorithms for Network Intrusion Detection Insights from CICIDS2017 Dataset},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {10},
number = {11},
pages = {1024-1030},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=163247},
abstract = {The main aim of this study is to investigate the effectiveness of machine learning (ML) models in detecting network intrusions using the CICIDS2017 dataset. This dataset contains various instances of network traffic, encompassing different types of cyber-attacks. The study begins by consolidating and refining multiple datasets to create a unified dataset for analysis. Subsequently, an exploratory analysis reveals the distribution patterns of different attacks within the dataset. Data preparation involves optimizing the dataset for modeling by applying feature scaling and selection techniques. Several ML algorithms, such as Logistic Regression, Naive Bayes, and Decision Tree classifiers, are trained and rigorously evaluated using cross-validation methods. The evaluation metrics include accuracy measures and cross-validation mean scores, providing a comprehensive assessment of the models' performance. Moreover, the study employs the Random Forest classifier to identify and prioritize significant features aiding in intrusion detection. This research endeavors to contribute significantly to the field of cyber security by showcasing the potential of ML algorithms in detecting and categorizing diverse network intrusions. The findings highlight the feasibility of deploying robust ML-based intrusion detection systems, strengthening real-time network security applications and fortifying defenses against evolving cyber threats.},
keywords = {CICIDS2017, Intrusion detection, Logistic Regression, Naive Bayes, and Decision Tree classifiers.},
month = {},
}
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry