Intrusion Detection Scheme through multilevel ML Classifier

Authors

  • Hemant Kumar Saini Department of CSE,UIE Chandidarg University Mohali, Punjab, India.

Keywords:

Intrusions, Intrusion Detection System, Machine Learning, HIDS, NIDS

Abstract

In today’s era with the emerging trends of Big Data and IoT the network traffic range of services derived for the users according to their needs. Mostly public users use the open channels for the transmission of the data which would be a lot o concern over its security. To sustain such security various researches developed many defensive approaches but those are no longer effective. Intrusion detection system (IDS) deployed to detect the various intrusion assaults but they are not up to mark. This paper explores the various classes of intrusions and methodologies to mitigate them. The overview gives the useful resource for naïve researchers, make them better learning of the emerging intrusions and invoke the potential measure involving the Machine learning techniques for future investigation. In particular various potential risks and rewards of intrusive activities are highlighted which will persuade researchers to implement the proactive approaches to address such challenges. Also trying to proposed an IDS where the detection paradigms has been improved by ensembled learner and advanced hyperprameter optimization which lessen the false alarms and identify accurately.

References

G Tavallaee, M.; Bagheri, E.; Lu,W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; IEEE: Manhattan, NY, USA, 2009

Fu, Y.; Du, Y.; Cao, Z.; Li, Q.; Xiang, W. A Deep Learning Model for Network Intrusion Detection with Imbalanced Data. Electronics 2022, 11, 898.

Anita K. Jones and Robert S. Sielken “Computer System Intrusion Detection A Survey “International Journal of Computer Theory and Engineering, Vol.2, No.6, December, 2010.

Neelam Sharma, Saurabh Mukherjee, A Novel Multi- Classifier Layered Approach to Improve Minority Assault Detection in IDS, Procedia Technology, Volume 6, 2012, Pages 913-921.

P. Sharma, S. Saxena and Y. Mohan Sharma, “An Efficient Decision Support Model Based on Ensemble Framework of Data Mining Features Assortment & Classification Process,” 2018 3rd International Conference on Communication and Electronics Systems (ICCES), 2018, pp. 487-491,

Jaiswal, O., Saini, P.K., Shalini, Sharma, Y.M. (2021). Analyze Classification Act of Data Mining Schemes. In: Goyal, D., Gupta, A.K., Piuri, V., Ganzha, M., Paprzycki, M. Second International Conference on Information Management and Machine Intelligence. Lecture Notes in Networks and Systems, vol 166. Springer.

Arul, Amudha & Subburathinam, Karthik & Sivakumari, S. “Classification Techniques for Intrusion Detection An Overview.International Journal of Computer Applications., 2013, 76. 33-40.

James P. Anderson. Computer Security Threat Monitoring and Surveillance, 1980. Last accessed:= Novmeber 30,2008.

M. Mehmood, T. Javed, J. Nebhen, S. Abbas, R. Abid et al., “A hybrid approach for network intrusion detection,” Computers, Materials & Continua, vol. 70, no.1, pp. 91–107, 2022.

[ Cao B, Li C, Song Y, Fan X. Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU.Comput Intell Neurosci. 2022 Apr 12;2022:1942847

Fu Y, Du Y, Cao Z, Li Q, Xiang W. A Deep Learning Model for Network Intrusion Detection with Imbalanced Data. Electronics. 2022; 11(6):898

M. Ashfaq Khan and Y. Kim, “Deep learning-based hybrid intelligent intrusion detection system,” Computers, Materials & Continua, vol. 68, no.1, pp. 671–687, 2021.

Li Y, Xu W, Li W, Li A, Liu Z. Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms.Math Biosci Eng. 2021 Jan;19(2):2030-2042.

J. Dong Lee, H. Soung Cha, S. Rathore and J. Hyuk Park, “M-idm: a multi-classification based intrusion detection

model in healthcare iot,” Computers, Materials & Continua, vol. 67, no.2, pp. 1537–1553, 2021.

Y. S. Sydney and M. Kasongo, “A deep learning method with wrapper based feature extraction for wireless intrusion detection system,” Computers & Security. Elsevier, vol. 92, pp. 15, 2020.

K. E. S. Hadeel Alazzam and Ahmad Sharieh, “A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer,” Expert Systems with Applications. Elsevier, vol. 148, pp. 113249, 2020.

U. Ahmad, H. Asim, M. T. Hassan and S. Naseer, “Analysis of classification techniques for intrusion detection,” in 2019 Int.Conf. on Innovative Computing, New Delhi, India, IEEE, pp. 1–6, 2019.

A. Hajimirzaei and N. J. Navimipour, “Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm,” ICT Express, vol. 5, no. 1, pp. 56–59, 2019.

B. Ingre, A. Yadav and A. K. Soni, “Decision tree based intrusion detection system for NSL-KDD dataset,” in Int. Conf. on Information and Communication Technology for Intelligent Systems, Springer, pp. 207–218, 2017.

S. Aljawarneh, M. Aldwairi and M. B. Yassein, “Anomalybased intrusion detection system through feature selection analysis and building hybrid efficient model,” Journal of Computational Science, vol. 25, pp. 152–160, 2018.

C. Yin, Y. Zhu, J. Fei and X. He, “A deep learning approach for intrusion detection using recurrent neural networks,” IEEE Access, vol. 5, pp. 21954–21961, 2017.

A. M. Yogita Hande, “A survey on intrusion detection system for software defined networks (sdn),” Research Anthology on Artificial Intelligence Applications in Security. IGI Global, vol. 16, no. 1, pp. 20, 2021.

A. R. Javed, M. O. Beg, M. Asim, T. Baker and Al-Bayatti, “Alphalogger: Detecting motion-based sidechannel assault using smartphone keystrokes,” Journal of Ambient Intelligence and Humanized Computing, pp.

–14, 2020.

Published

2023-10-13