A Comparative Analysis of Cross-Classifiers with Resampled Datasets for Exfiltration Attacks

Arif Rahman Hakim, Kalamullah Ramli, Kuni Inayah, Esti Rahmawati Agustina

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Imbalanced datasets pose a significant challenge in intrusion detection, often reducing model performance in classifying attacks. This study evaluates the impact of three resampling techniques, BorderlineSMOTE, SMOTEENN, and SMOTETomek, on the performance of three popular classifiers: Random Forest, XGBoost, and SupportVector Machine (SVM). Using a dataset of over 2.5 million attack records generated by the BSSN honeynet targeting government networks, we assess accuracy, precision, recall, F1-score, specificity, and geometric mean. Results reveal that SMOTEENN consistently delivers superior performance across all classifiers, with notable efficiency in balancing data and enhancing detection accuracy. These findings underscore the importance of selecting the proper resampling technique and classifier for improving intrusion detection in imbalanced datasets.

Original languageEnglish
Title of host publication2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages106-111
Number of pages6
ISBN (Electronic)9798331511470
DOIs
Publication statusPublished - 2024
Event2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024 - Hybrid, Bandung, Indonesia
Duration: 12 Dec 2024 → …

Publication series

Name2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024 - Proceedings

Conference

Conference2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
Country/TerritoryIndonesia
CityHybrid, Bandung
Period12/12/24 → …

Keywords

  • exfiltration
  • honeynet
  • imbalance
  • machine learning
  • resampling

Fingerprint

Dive into the research topics of 'A Comparative Analysis of Cross-Classifiers with Resampled Datasets for Exfiltration Attacks'. Together they form a unique fingerprint.

Cite this