Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.4.33

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks  

Singh, Devendra Kumar (Dept of CSE, Central University)
Shrivastava, Manish (Dept of CSE, Central University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.4, 2021 , pp. 272-276 More about this Journal
Abstract
Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.
Keywords
IDS; Cyber Attacks; PSO; GA; ELM; KDD;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Mishra, V. P., & Shukla, B.: Development of simulator for intrusion detection system to detect and alarm the DDoS attacks. In 2017 International Conference on Infocom Technologies and Unmanned Systems: Trends and Future Directions, ICTUS, Institute of Electrical and Electronics Engineers Inc. Vol. 2018-January, pp. 803-806 (2018)
2 Singh, P., & Venkatesan, M.: Hybrid Approach for Intrusion Detection System; Hybrid Approach for Intrusion Detection System. Proceeding of 2018 IEEE International Conference on Current Trends towards Converging Technologies (ICCTCT) (2018)
3 Balikas, G., & Partalas, I.: On the effectiveness of feature set augmentation using clusters of word embeddings. In CEUR Workshop Proceedings Vol. 2226, 26-32 (2018)
4 Lejon, E., Kyosti, P., & Lindstrom, J.: Machine learning for detection of anomalies in press-hardening: Selection of efficient methods. In Procedia CIRP Vol. 72, pp. 1079-1083 (2018)   DOI
5 Potharaju Sai Prasad, Sreedevi M.: A Novel Subset Feature Selection Framework for Increasing the Classification Performance of SONAR Targets, In Procedia Computer Science, Elsevier (2018)
6 Borkar, A., Donode, A., & Kumari, A.: A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS). In Proceedings of the International Conference on Inventive Computing and Informatics, ICICI 2017, Institute of Electrical and Electronics Engineers Inc. pp. 949-953 (2018)
7 Knowledge discovery Dataset collected from UCI Repository http://kdd.ics.uci.edu/databases/kddcup99
8 https://www.mathworks.com/products/matlab.html
9 Mehmood, T.: Comparative Analysis Of Machine Learning Algorithms In Context Of Intrusion Detection. (2015)
10 Allam, M., & Nandhini, M.: Optimal feature selection using binary teaching learning-based optimization algorithm. Journal of King Saud University - Computer and Information Sciences. King Saud bin Abdulaziz University (2018)
11 Jabbar, M. A., Aluvalu, R., & Reddy, S. S. S.: Intrusion Detection System using Bayesian Network and Feature Subset Selection. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 1-5 (2017)
12 Mazini, M., Shirazi, B., & Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University - Computer and Information Sciences. King Saud bin Abdulaziz University. (2018)
13 Andreea Bendovschi: Cyber-Attacks - Trends, Patterns and Security Countermeasures, Procedia Economics and Finance. Science Direct, 28, 24-31 (2015)   DOI
14 Nikolov, D., Kordev, I., & Stefanova, S.: Concept for network intrusion detection system based on recurrent neural network classifier. IEEE XXVII International Scientific Conference Electronics - ET, 1-4 (2018)
15 Khammassi Chaouki, Krichen Saoussen: A GA-LR wrapper approach for feature selection in network intrusion detection, In Computers and Security, Elsevier (2017)
16 Viegas Felipe, Rocha Leonardo, Goncalves Marcos, Mourao Fernando, Sa Giovanni Salles Thiago, Andrade Guilherme, Isac Sandin: A Genetic Programming approach for feature selection in highly dimensional skewed data, In Neurocomputing, Elsevier (2018)
17 Ariafar Elham, Kiani Rasoul: Intrusion Detection System Using an Optimized Framework Based on Datamining Techniques, In IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI), Iran University of Science and Technology) - Tehran, Iran (2017)
18 Saxena Aumreesh Ku, Sinha Sitesh, Shukla Piyush: General study of intrusion detection system and survey of agent-based intrusion detection system, In Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA (2017)
19 Chary, K. C.: Data Mining, Intrusion Detection System - A Study. International Journal of Advanced Research in Computer Science, 3(1), 434-437 (2012)
20 Gauthama Raman M. R., Somu Nivethitha, Kirthivasan Kannan, Liscano Ramiro, Shankar Sriram V. S.: An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine, In Knowledge-Based Systems, Elsevier (2017)
21 Makani, R., & Reddy, B. V. R.: Taxonomy of Machine Leaning Based Anomaly Detection and its suitability. In Procedia Computer Science (Vol. 132, pp. 1842-1849). Elsevier B.V. (2018)   DOI
22 Hadri, A., Chougdali, K., & Touahni, R.: Intrusion detection system using PCA and Fuzzy PCA techniques. In International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc. (2017)
23 Sukumar, J. V. A., Pranav, I., Neetish, M., & Narayanan, J.: Network Intrusion Detection Using Improved Genetic k-means Algorithm. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2441-2446 (2018)