A DEEP AND MACHINE LEARNING COMPARATIVE APPROACH FOR NETWORKS INTRUSION DETECTION

  • Ali Raad Sameer
  • Osamah Mohammed Jasmim
  • Mohamed Omar Mohamed
Keywords: MLP, CNN, Intrusion, Boosting, UNSW-NB15, RF

Abstract

Intrusion detection is intergral section of firewalls and other attacks prevention applications that works side by side with the attack pouncing section. The strongest attack prevention application is that of wide range of attack pouncing capability. Recently, data driven models are used for this task which offers the required capability of multiple type of attack detection. In this paper, foucse given to establish an attack detection system that compatible with various datasets and able to draw similar perfromacne in attack flection. Multilayer perception (MLP), Convolutional neural network (CNN). Machine learning algorithms are also deployed such as Random Forest (RF) and Boosting algorithms such as XGBoost, AdaBoost and CatBoost. The MLP algorithm was realized with best intrusion detection performance, it yielded a higher accuracy in both dataset cases. Overall, the classification results on the UNSW-NB15 dataset suggest that machine learning algorithms can be successfully applied to network intrusion detection tasks, with various algorithms demonstrating high levels of accuracy in distinguishing between normal and malicious network traffic.

References

[1] T.J. Nagalakshmi, A.K. Gnanasekar, G. Ramkumar, A. Sabarivani, Machine learning models to detect the blackhole attack in wireless adhoc network, Materials Today: Proceedings, Volume 47, Part 1, 2021

[2] Aimin Yang, Huixiang Liu, Yongjie Chen, Chunying Zhang, Ke Yang, Digital video intrusion intelligent detection method based on narrowband Internet of Things and its application, Image and Vision Computing, Volume 97, 2020

[3] Amritpal Singh, Pushpinder Kaur Chouhan, Gagangeet Singh Aujla, SecureFlow: Knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined IoT environment, Ad Hoc Networks, Volume 156, 2024

[4] Dharini N, Jeevaa Katiravan, Sruthi Priya D M, Sakthi Sneghaa V A, Intrusion Detection in Novel WSN-Leach Dos Attack Dataset using Machine Learning based Boosting Algorithms, Procedia Computer Science, Volume 230, 2023

[5] T Raghavendra, M Anand, M Selvi, K Thangaramya, SVN Santhosh Kumar, A Kannan, An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things, Procedia Computer Science, Volume 215, 2022

[6] Jafar Haadi Jafarian, Amirreza Niakanlahiji, MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization, Computers & Security, Volume 124, 2023

[7] Snehal Deshmukh-Bhosale, Santosh S. Sonavane, A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things, Procedia Manufacturing, Volume 32, 2019

[8] E. Suresh Babu, C. Nagaraju, M.H.M. Krishna Prasad, Analysis of Secure Routing Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism, Procedia Computer Science, Volume 70, 2015

[9] Putty Srividya, Lavadya Nirmala Devi, A. Nageswar Rao, A trusted effective approach for forecasting the failure of data link and intrusion in wireless sensor networks, Theoretical Computer Science, Volume 941, 2023

[10] M.V.B. Murali Krishna M, C. Anbu Ananth, N. Krishnaraj, Detection of intrusions in clustered vehicle networks using invasive weed optimization using a deep wavelet neural networks, Measurement: Sensors, Volume 28, 2023

[11] Manjula C. Belavagi, Balachandra Muniyal, Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection, Procedia Computer Science, Volume 89, 2016,

[12] C. Edwin Singh, S. Maria Celestin Vigila, Fuzzy based intrusion detection system in MANET, Measurement: Sensors, Volume 26, 2023,

[13] Z. Chiba, N. Abghour, K. Moussaid, O. Lifandali, R. Kinta, A Deep Study of Novel Intrusion Detection Systems and Intrusion Prevention Systems for Internet of Things Networks, Procedia Computer Science, Volume 210, 2022.
Published
2024-05-02
How to Cite
Sameer, A. R., Mohammed Jasmim, O., & Omar Mohamed, M. (2024). A DEEP AND MACHINE LEARNING COMPARATIVE APPROACH FOR NETWORKS INTRUSION DETECTION. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 10(1), 98-103. https://doi.org/10.33130/AJCT.2024v10i01.017

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.