Algorithm Development of Network Intrusion Detection with Adaboost.m1

Main Article Content

พลอยพรรณ สอนสุวิทย์


        The objectives of this research were 1) to develop and detect network anomaly with Adaboost.m1 technique and conduct dimension reduction with Gain Ratio and 2) to compare the efficiency of classifying proposed algorithm with Supervised Learning algorithms, This experiment used NSL-KDD database, a network intrusion database. True Positive Rate (TP Rate), False Positive Rate (FP Rate), Precision, Recall, f-Measure, and Accuracy were determined for the performance analysis and comparison.

       The results of this study were as follows: 1) data dimension reduction resulted in important features. When data were classified with Adaboost.m1 technique and decision tree was used as weal learner, it was found that the for highest classification efficiency, the accuracy was 99.79%, 2) When efficiency was compared, the efficiency of proposed algorithm was better than dimension reduction without Adaboost.m1 technique, and classification technique without dimension reduction, when processing time were compared, it was found that proposed algorithm took the highest time, compared to all methods because it required to create a number of models compared to all methods for voting the final answer. For the application with the network anomaly detection, the appropriate method can be selected according to the need.


Download data is not yet available.

Article Details

How to Cite
สอนสุวิทย์พ. (2018). Algorithm Development of Network Intrusion Detection with Adaboost.m1. Journal of Information Technology Management and Innovation, 4(2), 158-166. Retrieved from


[1] Zarpelãoa, Bruno Bogaz., Mianib,Rodrigo Sanches., Kawakania,Cláudio Toshio., and Alvarengaa, Sean Carlisto.
(2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer
Applications, 84(C), 25-37.
[2] Buczak, Anna L. and Guven, Erhan. (2017). A Survey of Data Mining and Machine Learning Methods for Cyber
Security Intrusion Detection. IEEE COMMUNICATION SYRVEYS & TUTORIALS, 18(2), 1153-1176.
[3] Stefanowski, Jerry. (2009). Data Mining - Clustering. สืบค้นจาก
[4] เกรียงไกร ชัยมินทร์. (2557). การตรวจจับการบุกรุกเครือข่ายสำหรับสำนักหอสมุด มหาวิทยาลัยเชียงใหม่ โดยใช้ตัวจำแนก
ข้อมูลนาอีฟเบส์. ปริฐฐาวิทยาศาสตร์มหาบัณฑิต, มหาวิทยาลัยเชียงใหม่. เชียงใหม่.
[5] Wahba, Yasmen, ElSalamouny, Ehab, ElTaweel, Ghada. (2015). Improving the Performance of Multi-class
Intrusion Detection System using Feature Reduction. IJSCI International Journal of Computer Science,
12(3), 255-262.
CHARACTER RECOGNITION USING WEKA TOOL. International Journal of Advance Computer and
Mathematical Sciences, 4(1), 119-123.
[7] Bramhe, Leena and Shukla, Shuwesh. (2013). A Novel Approach for Improve detection Rate in Anomaly
based Intrusion Detection System. International Journal of IT, Engineering and Applied Science
Research (IJIEASR), 2(5), 40-44.
[8] Lashkari, Arash Habibi. (2015). NSL-KDD dataset. สืบค้นจาก
[9] Zhang, Zhenyu and Xie, Xiaoyao. (2010). Research on Adaboost.M1 with Random Forest. 2nd International
Conference on Computer Engineering and Technology, 1(7), 647-652.