Research Article

Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques

Table 13

UNSW-NB15 dataset evaluated with hybrid NID-Shield NIDS approach.
(a)

Total instances1,75,341
Correctly classified instances1, 75,183 (99.91%)
Incorrectly classified instances158
Execution time318.15 seconds
Kappa measures0.9835
MAE0.0007
RMSE0.0121
RAE6.3124%
RRSE18.4253%

(b)

AccuracyTP rateFP ratePrecisionRecall-measureMCCROC areaPRC areaClass

100%1.0000.0001.0001.0001.0001.0001.0001.000Normal
99.45%0.9940.0070.9960.9980.9970.9950.9990.999Reconnaissance
99.71%0.9970.0060.9980.9990.9990.9991.0001.000Backdoor
99.10%0.9910.0070.9950.9910.9970.9971.0001.000DoS
98.70%0.9870.0080.9930.9820.9820.9930.9940.993Exploits
99.20%0.9920.0070.9890.9930.9960.9981.0001.000Analysis
90.14%0.9010.0120.9170.9410.9620.9720.9710.978Fuzzers
100%1.0000.0001.0001.0001.0001.0001.0001.000Worms
99.61%0.9960.0060.9970.9990.9970.9971.0001.000Shellcode
99.70%0.9970.0040.9980.9980.9990.9971.0001.000Generic
Weighted Avg.99.89%0.9980.0060.9990.9980.9970.9921.0001.000

(c)

Confusion matrix

56000000000000
01048800000000
0017400000002
00012260000000
02003338300003
0000019930000
00337018177048
000003013000
0100307011290
00310400039987

—classified as Normal, —classified as Reconnaissance, —classified as Backdoor, —classified as DoS, —classified as Exploits, —classified as Analysis, —classified as Fuzzers, —classified as Worms, —classified as Shellcode, and —classified as Generic.