Intrusion Detection Scheme through multilevel ML Classifier
Keywords:
Intrusions, Intrusion Detection System, Machine Learning, HIDS, NIDSAbstract
In today’s era with the emerging trends of Big Data and IoT the network traffic range of services derived for the users according to their needs. Mostly public users use the open channels for the transmission of the data which would be a lot o concern over its security. To sustain such security various researches developed many defensive approaches but those are no longer effective. Intrusion detection system (IDS) deployed to detect the various intrusion assaults but they are not up to mark. This paper explores the various classes of intrusions and methodologies to mitigate them. The overview gives the useful resource for naïve researchers, make them better learning of the emerging intrusions and invoke the potential measure involving the Machine learning techniques for future investigation. In particular various potential risks and rewards of intrusive activities are highlighted which will persuade researchers to implement the proactive approaches to address such challenges. Also trying to proposed an IDS where the detection paradigms has been improved by ensembled learner and advanced hyperprameter optimization which lessen the false alarms and identify accurately.
References
G Tavallaee, M.; Bagheri, E.; Lu,W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; IEEE: Manhattan, NY, USA, 2009
Fu, Y.; Du, Y.; Cao, Z.; Li, Q.; Xiang, W. A Deep Learning Model for Network Intrusion Detection with Imbalanced Data. Electronics 2022, 11, 898.
Anita K. Jones and Robert S. Sielken “Computer System Intrusion Detection A Survey “International Journal of Computer Theory and Engineering, Vol.2, No.6, December, 2010.
Neelam Sharma, Saurabh Mukherjee, A Novel Multi- Classifier Layered Approach to Improve Minority Assault Detection in IDS, Procedia Technology, Volume 6, 2012, Pages 913-921.
P. Sharma, S. Saxena and Y. Mohan Sharma, “An Efficient Decision Support Model Based on Ensemble Framework of Data Mining Features Assortment & Classification Process,” 2018 3rd International Conference on Communication and Electronics Systems (ICCES), 2018, pp. 487-491,
Jaiswal, O., Saini, P.K., Shalini, Sharma, Y.M. (2021). Analyze Classification Act of Data Mining Schemes. In: Goyal, D., Gupta, A.K., Piuri, V., Ganzha, M., Paprzycki, M. Second International Conference on Information Management and Machine Intelligence. Lecture Notes in Networks and Systems, vol 166. Springer.
Arul, Amudha & Subburathinam, Karthik & Sivakumari, S. “Classification Techniques for Intrusion Detection An Overview.International Journal of Computer Applications., 2013, 76. 33-40.
James P. Anderson. Computer Security Threat Monitoring and Surveillance, 1980. Last accessed:= Novmeber 30,2008.
M. Mehmood, T. Javed, J. Nebhen, S. Abbas, R. Abid et al., “A hybrid approach for network intrusion detection,” Computers, Materials & Continua, vol. 70, no.1, pp. 91–107, 2022.
[ Cao B, Li C, Song Y, Fan X. Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU.Comput Intell Neurosci. 2022 Apr 12;2022:1942847
Fu Y, Du Y, Cao Z, Li Q, Xiang W. A Deep Learning Model for Network Intrusion Detection with Imbalanced Data. Electronics. 2022; 11(6):898
M. Ashfaq Khan and Y. Kim, “Deep learning-based hybrid intelligent intrusion detection system,” Computers, Materials & Continua, vol. 68, no.1, pp. 671–687, 2021.
Li Y, Xu W, Li W, Li A, Liu Z. Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms.Math Biosci Eng. 2021 Jan;19(2):2030-2042.
J. Dong Lee, H. Soung Cha, S. Rathore and J. Hyuk Park, “M-idm: a multi-classification based intrusion detection
model in healthcare iot,” Computers, Materials & Continua, vol. 67, no.2, pp. 1537–1553, 2021.
Y. S. Sydney and M. Kasongo, “A deep learning method with wrapper based feature extraction for wireless intrusion detection system,” Computers & Security. Elsevier, vol. 92, pp. 15, 2020.
K. E. S. Hadeel Alazzam and Ahmad Sharieh, “A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer,” Expert Systems with Applications. Elsevier, vol. 148, pp. 113249, 2020.
U. Ahmad, H. Asim, M. T. Hassan and S. Naseer, “Analysis of classification techniques for intrusion detection,” in 2019 Int.Conf. on Innovative Computing, New Delhi, India, IEEE, pp. 1–6, 2019.
A. Hajimirzaei and N. J. Navimipour, “Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm,” ICT Express, vol. 5, no. 1, pp. 56–59, 2019.
B. Ingre, A. Yadav and A. K. Soni, “Decision tree based intrusion detection system for NSL-KDD dataset,” in Int. Conf. on Information and Communication Technology for Intelligent Systems, Springer, pp. 207–218, 2017.
S. Aljawarneh, M. Aldwairi and M. B. Yassein, “Anomalybased intrusion detection system through feature selection analysis and building hybrid efficient model,” Journal of Computational Science, vol. 25, pp. 152–160, 2018.
C. Yin, Y. Zhu, J. Fei and X. He, “A deep learning approach for intrusion detection using recurrent neural networks,” IEEE Access, vol. 5, pp. 21954–21961, 2017.
A. M. Yogita Hande, “A survey on intrusion detection system for software defined networks (sdn),” Research Anthology on Artificial Intelligence Applications in Security. IGI Global, vol. 16, no. 1, pp. 20, 2021.
A. R. Javed, M. O. Beg, M. Asim, T. Baker and Al-Bayatti, “Alphalogger: Detecting motion-based sidechannel assault using smartphone keystrokes,” Journal of Ambient Intelligence and Humanized Computing, pp.
–14, 2020.
Published
Issue
Section
Copyright (c) 2023 Journal of Engineering Design and Analysis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.