scholarly journals Performance Analysis of Proposed Hybrid Machine Learning Model for Efficient Intrusion Detection

At present networking technologies has provided a better medium for people to communicate and exchange information on the internet. This is the reason in the last ten years the number of internet users has increased exponentially. The high-end use of network technology and the internet has also presented many security problems. Many intrusion detection techniques are proposed in combination with KDD99, NSL-KDD datasets. But there are some limitations of available datasets. Intrusion detection using machine learning algorithms makes the detection system more accurate and fast. So in this paper, a new hybrid approach of machine learning combining feature selection and classification algorithms is presented. The model is examined with the UNSW NB15 intrusion dataset. The proposed model has achieved better accuracy rate and attack detection also improved while the false attack rate is reduced. The model is also successful to accurately classify rare cyber attacks like worms, backdoor, and shellcode.

Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 656
Author(s):  
Xavier Larriva-Novo ◽  
Víctor A. Villagrá ◽  
Mario Vega-Barbas ◽  
Diego Rivera ◽  
Mario Sanz Rodrigo

Security in IoT networks is currently mandatory, due to the high amount of data that has to be handled. These systems are vulnerable to several cybersecurity attacks, which are increasing in number and sophistication. Due to this reason, new intrusion detection techniques have to be developed, being as accurate as possible for these scenarios. Intrusion detection systems based on machine learning algorithms have already shown a high performance in terms of accuracy. This research proposes the study and evaluation of several preprocessing techniques based on traffic categorization for a machine learning neural network algorithm. This research uses for its evaluation two benchmark datasets, namely UGR16 and the UNSW-NB15, and one of the most used datasets, KDD99. The preprocessing techniques were evaluated in accordance with scalar and normalization functions. All of these preprocessing models were applied through different sets of characteristics based on a categorization composed by four groups of features: basic connection features, content characteristics, statistical characteristics and finally, a group which is composed by traffic-based features and connection direction-based traffic characteristics. The objective of this research is to evaluate this categorization by using various data preprocessing techniques to obtain the most accurate model. Our proposal shows that, by applying the categorization of network traffic and several preprocessing techniques, the accuracy can be enhanced by up to 45%. The preprocessing of a specific group of characteristics allows for greater accuracy, allowing the machine learning algorithm to correctly classify these parameters related to possible attacks.


Internet of Things(IoT) is a next generation of Internet in that every object in the universe connect, communicate with sensor devices through Internet. In that inter-connected communication devices as well as sensor devices share the data through IoT gateway for a relevant application like whether forecasting, healthcare, smart city, disaster management are providing without human interaction. IoT enhances comfortable for human being even security is one of the challenging tasks. Intrusion detection system (IDS) will protect IoT devices from intruders. Now a day i.e in this era, as per user requirement and day-to-day increasing new innovative technologies as IoT, cloud computing, big data analytics, AIapplications implementation a network traffic will be generating a heavy data. To manage these data intrusion detection system is essential technique to detect, collect analyze the data is transmission through IoT gateway network. It is essential to improve the accuracy as well speed of intrusion detection system model by applying machine learning approach to detect IoT systems and gateway network to protect from cyber-attacks. In this paper providing a detailed study of Intrusion detection system (IDS) classification system for IoT gateway communication to protect IoT gateway by machine learning algorithms ina intelligent fashion.


Author(s):  
Ahmad Azhari ◽  
Arif Wirawan Muhammad ◽  
Cik Feresa Mohd Foozy

Distributed Service Denial (DDoS) is a type of network attack, which each year increases in volume and intensity.  DDoS attacks also form part of the major types of cyber security threats so far. Early detection plays a key role in avoiding the catastrophic effects on server infrastructure from DDoS attacks. Detection techniques in the traditional Intrusion Detection System (IDS) are far from perfect compared to a number of modern techniques and tools used by attackers, because the traditional IDS only uses signature-based detection or anomaly-based detection models and causes a lot of false positive flags, since the flow of computer network data packets has complex properties in terms of both size and source. Based on the  deficiency in the ordinary IDS, this study aims to detect DDoS attacks by using machine learning techniques to enhance IDS policy development.  According to the experiment the selection of features plays an important role in the precision of the detection results and in the performance of machine learning in classification problems. The combination of seven key selected dataset features used as an input neural network classifier in this study provides the highest accuracy value at 97.76%.


2018 ◽  
Vol 21 ◽  
pp. 00027
Author(s):  
Alicja Gerka

The main problem associated with the development of an effective network behaviour anomaly detection-based IDS model is the selection of the optimal network traffic classification method. This article presents the results of simulation research on the effectiveness of the use of machine learning algorithms in the network attacks detection. The research part of the work concerned finding the optimal method of network packets classification possible to implement in the intrusion detection system’s attack detection module. During the research, the performance of three machine learning algorithms (Artificial Neural Network, Support Vector Machine and Naïve Bayes Classifier) has been compared using a dataset from the KDD Cup competition. Attention was also paid to the relationship between the values of algorithm parameters and their effectiveness. The work also contains an short analysis of the state of cybersecurity in Poland.


2019 ◽  
Vol 13 (1) ◽  
pp. 86-105 ◽  
Author(s):  
Sarika Choudhary ◽  
Nishtha Kesswani

The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.


2020 ◽  
Vol 5 (19) ◽  
pp. 32-35
Author(s):  
Anand Vijay ◽  
Kailash Patidar ◽  
Manoj Yadav ◽  
Rishi Kushwah

In this paper an analytical survey on the role of machine learning algorithms in case of intrusion detection has been presented and discussed. This paper shows the analytical aspects in the development of efficient intrusion detection system (IDS). The related study for the development of this system has been presented in terms of computational methods. The discussed methods are data mining, artificial intelligence and machine learning. It has been discussed along with the attack parameters and attack types. This paper also elaborates the impact of different attack and handling mechanism based on the previous papers.


Sign in / Sign up

Export Citation Format

Share Document