Research Article

Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques

Table 12

R2L attack evaluated with hybrid NID-Shield NIDS approach.
(a)

Total instances13,658
Correctly classified instances13,648
Incorrectly classified instances10
Execution time1.92 seconds
Kappa measures0.9758
MAE0.0005
RMSE0.0118
RAE7.3124%
RRSE20.4253%

(b)

AccuracyTP rateFP ratePrecisionRecall-measureMCCROC areaPRC areaClass

100%1.0000.0191.0001.0001.0000.9781.0001.000normal
100%1.0000.0001.0001.0001.0001.0001.0001.000ftp_write
100%1.0000.0000.8751.0000.9330.9351.0000.982imap
100%1.0000.0000.9001.0000.9470.9491.0001.000phf
100%1.0000.0001.0001.0001.0001.0001.0001.000multihop
100%1.0000.0001.0001.0001.0001.0001.0001.000warezmaster
97.4%0.9740.0000.9740.9740.9740.9741.0000.999warezclient
91.7%0.9170.0001.0000.9170.9570.9571.0000.969spy
100%1.0000.0001.0001.0001.0001.0001.0001.000gess_passwd
Weighted Avg.99.99%0.9990.0190.9990.9990.9990.9781.0001.000

(c)

Confusion matrix

1344400000000
050000000
007000000
000900000
000060000
0000012000
00000015000
0010200110
000102404

—classified as normal, —classified as ftp_write, —classified as imap, —classified as phf, —classified as multihop, —classified as warezmaster, —classified as warezclient, —classified as spy, —classified as guess_passwd.