Evaluation of Machine Learning Algorithms for Anomaly Detection

Nebrase Elmrabit, Feixiang Zhou, Fengyin Li, Huiyu Zhou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

146 Citations (Scopus)

Abstract

Malicious attack detection is one of the critical cyber-security challenges in the peer-to-peer smart grid platforms due to the fact that attackers' behaviours change continuously over time. In this paper, we evaluate twelve Machine Learning (ML) algorithms in terms of their ability to detect anomalous behaviours over the networking practice. The evaluation is performed on three publicly available datasets: CICIDS-2017, UNSW-NB15 and the Industrial Control System (ICS) cyber-attack datasets. The experimental work is performed through the ALICE high-performance computing facility at the University of Leicester. Based on these experiments, a comprehensive analysis of the ML algorithms is presented. The evaluation results verify that the Random Forest (RF) algorithm achieves the best performance in terms of accuracy, precision, Recall, F1-Score and Receiver Operating Characteristic (ROC) curves on all these datasets. It is worth pointing out that other algorithms perform closely to RF and that the decision regarding which ML algorithm to select depends on the data produced by the application system.

Original languageEnglish
Title of host publicationInternational Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages8
ISBN (Electronic)9781728164281
DOIs
Publication statusPublished - 13 Jul 2020
Externally publishedYes
Event2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020 - Virtual, Online, Ireland
Duration: 15 Jun 202019 Jun 2020

Publication series

NameInternational Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020

Conference

Conference2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020
Country/TerritoryIreland
CityVirtual, Online
Period15/06/202019/06/2020

Bibliographical note

Funding Information:
This work was funded by EU Horizon 2020 DOMINOES Project (Grant Number: 771066).

Publisher Copyright:
© 2020 IEEE.

Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.

Keywords

  • anomaly detection
  • Cyber Security
  • deep learning
  • intrusion detection
  • machine learning
  • smart grid

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Artificial Intelligence
  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Evaluation of Machine Learning Algorithms for Anomaly Detection'. Together they form a unique fingerprint.

Cite this