Evaluating MCC for Low-Frequency Cyberattack Detection in Imbalanced Intrusion Detection Data
By: Prameshwar Thiyagarajan, Chad A. Williams
In many real-world network environments, several types of cyberattacks occur at very low rates compared to benign traffic, making them difficult for intrusion detection systems (IDS) to detect reliably. This imbalance causes traditional evaluation metrics, such as accuracy, to often overstate model performance in these conditions, masking failures on minority attack classes that are most important in practice. In this paper, we evaluate a set of base and meta classifiers on low-traffic attacks in the CSE-CIC-IDS2018 dataset and compare their reliability in terms of accuracy and Matthews Correlation Coefficient (MCC). The results show that accuracy consistently inflates performance, while MCC provides a more accurate assessment of a classifier's performance across both majority and minority classes. Meta-classification methods, such as LogitBoost and AdaBoost, demonstrate more effective minority class detection when measured by MCC, revealing trends that accuracy fails to capture. These findings establish the need for imbalance-aware evaluation and make MCC a more trustworthy metric for IDS research involving low-traffic cyberattacks.
Similar Papers
Enhancing IoT Cyber Attack Detection in the Presence of Highly Imbalanced Data
Machine Learning (CS)
Finds hidden internet dangers in busy networks.
Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced Datasets
Machine Learning (CS)
Finds computer threats faster by trying different tricks.
The Wisdom of the Crowd: High-Fidelity Classification of Cyber-Attacks and Faults in Power Systems Using Ensemble and Machine Learning
Systems and Control
Finds computer attacks faster in power grids.