Performance Comparison of Supervised Classifiers in Intrusion Detection Systems

Authors

  • Onesinus Tamba Universitas Nusa Mandiri

Keywords:

Intrusion Detection System, Supervised Learning, Machine Learning, Classification, Deep Learning

Abstract

Intrusion Detection System (IDS) is an essential component in network security to detect and respond to cyber attacks. This study explores the use of several supervised classifier algorithms to classify attacks using the KDDTest-21 dataset from NSL-KDD. This dataset was chosen because of its improvement over the KDD'99 dataset that reduces bias due to duplication and uneven data distribution. The algorithms used include Logistic Regression, KNearest Neighbors (KNN), Gaussian Naive Bayes, Support Vector Machine (SVM), Decision Treem, Random Fores  and Deep Feedforward Neural Network. Each algorithm is applied to a normalized dataset using RobustScaler. Performance assessment is carried out based on metrics such as accuracy, precision, recall, and F1-score to determine
the best algorithm in detecting various types of attacks. The results show that several algorithms, especially Random Forest, have better performance in detecting attacks with high accuracy with 97.68% and other merics score are more than 98%. This finding is important for optimizing a more effective IDS in protecting network infrastructure from increasingly complex cyber attacks.

References

[1] Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, and Olukunle Oladipupo Amoo, “A comprehensive review of machine learning’s role in enhancing network security and threat detection,” World Journal of Advanced Research and Reviews, vol. 21, no. 2, pp. 877–886, Feb. 2024, doi: 10.30574/wjarr.2024.21.2.0501.

[2] E. Benkhelifa, T. Welsh, and W. Hamouda, “A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3496–3509, 2018, doi:

10.1109/COMST.2018.2844742.

[3] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, Jul. 2009, pp. 1–6. doi: 10.1109/CISDA.2009.5356528.

[4] L. Dhanabal and S. P. Shantharajah, “A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, 2015, doi: 10.17148/IJARCCE.2015.4696.

[5] L. Tianyao, H. Huadong, and L. Run, “An Intrusion Detection Framework with Optimized Feature Selection and Classification Combination Using Support Vector Machine,” in 2023 IEEE 3rd International Conference on Electronic Technology, Communication and Information (ICETCI), IEEE, May 2023, pp. 182–186. doi: 10.1109/ICETCI57876.2023.10176950.

[6] M. I. Ragab and K. M. Fouad, “Intelligent System for Intrusion Detection Based on Machine Learning,” in 2024 6th Novel Intelligent and Leading Emerging Sciences Conference (NILES), IEEE, Oct. 2024, pp. 135–138. doi: 10.1109/NILES63360.2024.10753257.

[7] J. Kevric, S. Jukic, and A. Subasi, “An effective combining classifier approach using tree algorithms for network intrusion detection,” Neural Comput Appl, vol. 28, no. S1, pp. 1051–1058, Dec. 2017, doi: 10.1007/s00521-016-2418-1.

[8] V. Asha, M. T. Vasumathi, A. Prasad, Y. V, Y. A. P, and M. Sivani, “Evaluation of ML Models using SMOTE and Feature Scaling for Intrusion Detection System(IDS),” in 2025 International Conference on Visual Analytics and Data Visualization (ICVADV), IEEE, Mar. 2025, pp. 243–249. doi: 10.1109/ICVADV63329.2025.10961506.

[9] K. C. Santos, R. S. Miani, and F. de Oliveira Silva, “Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems,” Journal of Network and Systems Management, vol. 32, no. 2, p. 36, Apr. 2024, doi: 10.1007/s10922-024-09813-z.

[10] S. Kim and K.-J. Park, “A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems,” Applied Sciences, vol. 11, no. 12, p. 5458, Jun. 2021, doi: 10.3390/app11125458

Published

2026-01-31

How to Cite

[1]
O. Tamba, “Performance Comparison of Supervised Classifiers in Intrusion Detection Systems”, Journal of Artificial Intelligence and Legal Technology, vol. 2, no. 1, Jan. 2026.

Similar Articles

You may also start an advanced similarity search for this article.