scholarly journals Performance Evaluation of Supervised Ensemble Cyber Situation Perception Models for Computer Network

Author(s):  
S.S. Olofintuyi ◽  
◽  
T.O. Omotehinwa ◽  

The trend at which cyber threats are gaining access to companies, industries and other sectors of the economy is becoming alarming, and this is posting a serious challenge to network administrators, governments and other business owners. A formidable intrusion detection system is needed to outplay the activities of the cyberattacks. An ensemble system is believed to perform better than a single classifier. With this fact, five different Machine Learning (ML) ensemble algorithms are suggested at the perception phase of Situation Awareness (SA) model for threat detection and the algorithms include; Artificial Neural Network Based Decision Tree (ANN based DT), Bayesian Based Artificial Neural Network (BN based ANN), J48 Based Naïve Bayes Model (J48 based NB), Decision Tree based Bayesian Network (BN) and Random Forest based on Support Vector Machine (RF based SVM). The efficiency and effectiveness of all the aforementioned algorithms were evaluated based on precision, recall and accuracy. ANN based DT gave 98.87% accuracy, BN based ANN gave 99.72% accuracy, J48 based NB gave 98.90% accuracy, DT based BN gave 89.92% accuracy and FR based SVM gave 98.40% accuracy. The implication of these results is that BN based ANN is more suitable in the perception phase of SA for threats detection. Keywords- Cyber-threats, Ensemble Algorithms, Computer Network, Intrusion Detection System, Machine Learning

Author(s):  
Tarum Bhaskar ◽  
Narasimha Kamath B.

Intrusion detection system (IDS) is now becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing an IDS. However, this requires an ability to find the mapping from the input space to the output space with the help of available data. Rough sets and neural networks are the best known data mining tools to analyze data and help solve this problem. This chapter proposes a novel hybrid method to integrate rough set theory, genetic algorithm (GA), and artificial neural network. Our method consists of two stages: First, rough set theory is applied to find the reduced dataset. Second, the results are used as inputs for the neural network, where a GA-based learning approach is used to train the intrusion detection system. The method is characterized not only by using attribute reduction as a pre-processing technique of an artificial neural network but also by an improved learning algorithm. The effectiveness of the proposed method is demonstrated on the KDD cup data.


2018 ◽  
Vol 4 (8) ◽  
pp. 6
Author(s):  
Apoorva Deshpande

Today, intrusion detection system using the neural network is an interested and considerable area for the research community. The computational intelligence systems are defined on the basis of the following parameters: fault tolerance and adaptation; adaptable the requirements of make a better intrusion detection model. In this paper, provide an overview of the research progress using computational intelligence to the problem of intrusion detection. The goal of this paper summarized and compared research contributions of Intrusion detection system using computational intelligence and neural network, define existing research challenges and anticipated solution of machine learning. Research showed that application of machine learning techniques in intrusion detection could achieve high detection rate. Machine learning and classification algorithms help to design "Intrusion Detection Models" which can classify the network traffic into intrusive or normal traffic. This paper discusses some commonly used machine learning techniques in Intrusion Detection System and also reviews some of the existing machine learning IDS proposed by researchers at different times.


Sign in / Sign up

Export Citation Format

Share Document