DOI QR코드

DOI QR Code

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak (Department of CSE School of Technology Assam Don Bosco University) ;
  • Bobby Sharma (Department of CSE School of Technology Assam Don Bosco University)
  • Received : 2023.11.05
  • Published : 2023.11.30

Abstract

By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Keywords

References

  1. Sarker IH, Kayes AS, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. Journal of Big data. 2020 Dec;7(1):1-29. https://doi.org/10.1186/s40537-019-0278-0
  2. Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C. Machine learning and deep learning methods for cybersecurity. Ieee access. 2018 May 15;6:35365-81. https://doi.org/10.1109/ACCESS.2018.2836950
  3. Shaukat K, Luo S, Varadharajan V, Hameed IA, Xu M. A survey on machine learning techniques for cyber security in the last decade. IEEE Access. 2020 Dec 2;8:222310-54. https://doi.org/10.1109/ACCESS.2020.3041951
  4. Amit I, Matherly J, Hewlett W, Xu Z, Meshi Y, Weinberger Y. Machine learning in cyber-security-problems, challenges and data sets. arXiv preprint arXiv:1812.07858. 2018 Dec 19.
  5. Torres JM, Comesana CI, Garcia-Nieto PJ. Machine learning techniques applied to cybersecurity. International Journal of Machine Learning and Cybernetics. 2019 Oct;10(10):2823-36. https://doi.org/10.1007/s13042-018-00906-1
  6. Ford V, Siraj A. Applications of machine learning in cyber security. InProceedings of the 27th international conference on computer applications in industry and engineering 2014 Oct 13 (Vol. 118). Kota Kinabalu: IEEE Xplore.
  7. Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials. 2015 Oct 26;18(2):1153-76. https://doi.org/10.1109/COMST.2015.2494502
  8. Sinclair C, Pierce L, Matzner S. An application of machine learning to network intrusion detection. InProceedings 15th Annual Computer Security Applications Conference (ACSAC'99) 1999 Dec 6 (pp. 371-377). IEEE.
  9. Abdulraheem MH, Ibraheem NB. A detailed analysis of new intrusion detection dataset. Journal of Theoretical and Applied Information Technology. 2019 Sep 15;97(17):4519-37.
  10. Alqahtani H, Sarker IH, Kalim A, Hossain SM, Ikhlaq S, Hossain S. Cyber intrusion detection using machine learning classification techniques. InInternational Conference on Computing Science, Communication and Security 2020 Mar 26 (pp. 121-131). Springer, Singapore
  11. Sabar NR, Yi X, Song A. A bi-objective hyper-heuristic support vector machines for big data cyber-security. Ieee Access. 2018 Mar 6;6:10421-31. https://doi.org/10.1109/ACCESS.2018.2801792
  12. Moustafa N, Slay J. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In2015 military communications and information systems conference (MilCIS) 2015 Nov 10 (pp. 1-6). IEEE.
  13. Bagui S, Kalaimannan E, Bagui S, Nandi D, Pinto A. Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Security and Privacy. 2019 Nov;2(6):e91.
  14. Sarraf J, Chakraborty S, Pattnaik PK. Detection of Network Intrusion and Classification of Cyberattack Using Machine Learning Algorithms: A Multistage Classifier Approach. InInternational conference on smart computing and cyber security: strategic foresight, security challenges and innovation 2020 Apr 23 (pp. 285-295). Springer, Singapore.
  15. Singh S, Agrawal S, Rizvi MA, Thakur RS. Improved Support Vector Machine for Cyber Attack Detection. InProceedings of the World Congress on Engineering and Computer Science 2011 Oct (Vol. 1).
  16. Sasan HP, Sharma M. Intrusion detection using feature selection and machine learning algorithm with misuse detection. International Journal of Computer Science and Information Technology. 2016 Feb;8(1):17-25. https://doi.org/10.5121/ijcsit.2016.8102
  17. Revathi S, Malathi A. A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. International Journal of Engineering Research & Technology (IJERT).2013 Dec;2(12):1848-53.
  18. Das K, Behera RN. A survey on machine learning: concept, algorithms and applications. International Journal of Innovative Research in Computer and Communication Engineering. 2017 Feb;5(2):1301-9.
  19. Sharma H, Kumar S. A survey on decision tree algorithms of classification in data mining. International Journal of Science and Research (IJSR). 2016 Apr 5;5(4):2094-7. https://doi.org/10.21275/v5i4.NOV162954
  20. Sonule AR, Kalla M, Jain A, Chouhan DS. UNSWNB15 Dataset and Machine Learning Based Intrusion Detection Systems. International Journal of Engineering and Advanced Technology. 2020;9:2638-48.
  21. Khan A. Data Science in Action: Key to Cyber security.