Research Article

Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques

Table 9

Probe attack evaluated with hybrid NID-Shield NIDS approach without stacking.
(a)

Total instances15,738
Correctly classified instances15,685
Incorrectly classified instances53
Execution time4.23 seconds
Kappa measures0.9872
MAE0.0034
RMSE0.0343
RAE3.1818%
RRSE14.9173%

(b)

AccuracyTP rateFP ratePrecisionRecall-measureMCCROC areaPRC areaClass

99.9%0.9990.0160.9970.9990.9980.9881.0001.000normal
99.3%0.9930.0001.0000.9930.9970.9960.9990.998portsweep
96.8%0.9680.0000.9990.9680.9830.9820.9990.996satan
99.3%0.9930.0010.9890.9930.9910.9901.0000.996ipsweep
95.3%0.9530.0000.9760.9530.9650.9640.9980.992nmap
Weighted Avg.99.7%0.9970.0140.9970.9970.9970.9881.0000.999

(c)

Confusion matrix

134410103
2593000
4067912
2007182
0003287

—classified as normal, —classified as portsweep, —classified as satan, —classified as ipsweep, and —classified as nmap.