Machine Learning-Based Security Enhancement in Heterogeneous Networks Using an Effective Pattern Mining Framework

Authors

  • Manohar Srinivasan Research Scholar, School of Information Technology & Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India.
  • Senthilkumar N. C. School of Information Technology & Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India

Keywords:

Autoencoder, Intrusion, Detection System, Internet Of Things

Abstract

The world becomes an internet-based system as a result of the Internet of Things. IoT benefits people greatly in many different ways. The world is growing more technologically adept, yet a lot of problems are also concurrently emerging. Security is a primary priority considering that everything is connected. Occasionally, everyone hopes that their data will be transmitted safely over the internet. Currently, the rise of security concerns is proportionate to the development of technology. Due to the large number of vulnerable devices, IoT technologies are insecure and unreliable. IoT follows unique regulations and procedures, so conventional security measures cannot be applied. IoT security concerns need to be addressed on numerous fronts. Internet seclusion, wireless security, and privacy protection are only a few of them. Network intrusion and detection is a key topic of study in addition to the problems mentioned above. Due to the tens of thousands of networked devices in the IoT, it is extremely difficult to identify unusual access, unanticipated attacks, or odd device activity. In order to reduce security risks and detect intrusions in the Internet of Things, a number of tactics and algorithms have been proposed. Machine learning-based intrusion detection systems have demonstrated excellent accuracy and efficiency in recent years at spotting intrusions. This research offers a novel approach for boosting data transmission security, identifying attack-capable devices, and identifying devices that have been infiltrated by an intruder. The suggested approach uses Autoencoder (AE), a technique for machine learning that uses feature extraction along with principal component analysis. The website CloudStor is where you can find the intrusion and detection dataset. One unsupervised machine learning approach that effectively trains data is the autoencoder. The result shows that, when compared to other machine learning techniques, the suggested strategy produces better results.

Downloads

Download data is not yet available.

References

Fan Yan1Yang Jian-wen2, Cheng Lin1, “Computer Network Security and Technology Research,” 2015.

Monali S. Gaigole, Prof. M. A. Kalyankar, “The Study of Network Security with Its Penetrating Attacks and Possible Security Mechanisms,” May 2015.

Muhammad A. Iqbal, OladiranG.Olaleye and Magdy A. Bayoumi, “A Review on Internet of Things (Iot): Security and Privacy Requirements and the Solution Approaches,” 2016.

Farrow, R. “Network Security Tools,” found at http:// sageweb.sage.org/pubs/whitepapers/ farrow.pdf .

Shailja Pandey, “Modern Network Security: Issues And Challenges,” Vol. 3 No. 5 May 2011.

Lunt, T.F., “Automated audit trail analysis and intrusion detection: A survey,” In: 11th National Computer Security Conference, 1988.

Dewan, M.F., Mohammad, Z.R., “Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm,”. Journal of Computers, 2010.

Lunt, T.F., Tamaru, A., Gilham, F., Jagannathan, R., Jalali, C., Neumann, P.G., Javitz, H.S., Valdes, A., Garvey, T.D., “A Real-Time Intrusion-Detection Expert System (IDES). Final Technical Report,” SRI International, 1992.

Kabiri, P., Ghorbani, A., “Research on intrusion Detection and Response: A Survey. International Journal of Network Security,” 1(2), 84–102, 2005.

Biermanm, E., Cloete, E., Venter, L.M, “A comparison of Intrusion Detection systems,” 2001.

Quinlan, J.R, “ Induction of Decision Trees”, Kluwer Academic Publishers, Boston, 1986.

Ashara Banu Mohamed, NorbikBashah Idris, and Bharanidharan Shanmugum, “A Brief Introduction to Intrusion Detection System,” 2012.

Sanoop Mallissery , Jeevan Prabhu,and Raghavendra Ganiga, “Survey on intrusion detection method”,2011.

Deepthy K Denatious& 2Anita John, “Survey on Data Mining Techniques to Enhance Intrusion Detection”,2012.

Changxin Song, Ke Ma Institute of Computer Information & Technology of Qinghai Normal University Network Center of Qinghai Normal University Qinghai, China., “Design of Intrusion Detection System Based on Data Mining Algorithm”,2009.

Li Tian1, Wang Jianwen1 Department of Computer Science, North China Electric Power University (NCEPU), Baoding 071003, China, “Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm”,2009

Li Xue-yong, Gao Guo- “A New Intrusion Detection Method Based on Improved DBSCAN”,2010.

Z. Muda, W. Yassin, M.N. Sulaiman and N.I.Udzir, “Intrusion Detection based on K-Means Clustering andOneR Classification”,2011.

Zhou Mingqiang, HuangHui, WangQian, “A Graph-based Clustering Algorithm for Anomaly Intrusion Detection”, 2012

Rachna kulhare, Dr. Divakar Singh, “Survey paper on intrusion detection techniques,” 2013.

Chittur, “Model Generation for an Intrusion Detection System Using Genetic Algorithms”, January 2005.

W. Li, “Using Genetic Algorithm for Network Intrusion Detection”. “A Genetic Algorithm

Approach to Network Intrusion Detection”. SANS Institute, USA, 2004.

KDD-CUP-99 Task Description; http://kdd.ics.uci.edu/databases/kddcup99/task.html

KDD Cup 1999: Tasks; http://www.kdd.org/kddcup/index.php? section=1999&method=task

KDD Cup 1999: Data; http://www.kdd.org/kddcup/index.php? section=1999&method=data

H. G. Kayacık, A. N. Zincir-Heywood, M. I. Heywood, “Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets”, May 2005.

Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, “Intrusion detection using an ensemble of intelligent paradigms”, Journal of Network and Computer Applications, Volume 28, Issue 2, April 2005, Pages 167-182

S. Peddabachigari, Ajith Abraham, C. Grosan, J. Thomas, “Modeling intrusion detection system using hybrid intelligent systems”, Journal of Network and Computer Applications, Volume 30, Issue 1, January 2007, Pages 114–132

M. Saniee Abadeh, J. Habibi, C. Lucas, “Intrusion detection using a fuzzy genetics-based learning algorithm”, Journal of Network and Computer Applications, Volume 30, Issue 1, January 2007,Pages 414-428

Tao Peng, C. Leckie, Kotagiri Ramamohanarao, “Information sharing for distributed intrusion detection systems”, Journal of Network and Computer Applications, Volume 30, Issue 3, August 2007, Pages 877–899.

V. Bobor, “Efficient Intrusion Detection System Architecture ,Based on Neural Networks and Genetic Algorithms”, Department of Computer and Systems Sciences, Stockholm University / Royal Institute of Technology, KTH/DSV, 2006.

Mohammad Sazzadul Hoque, Md. Abdul Mukit, Md. Abu Naser Bikas, “An Implementation Of Intrusion Detection System Using Genetic Algorithm,” 2012.

Ullah I., Mahmoud Q.H. (2020) A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In: Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI 2020. Lecture Notes in Computer Science, vol 12109. Springer, Cham. https://doi.org/10.1007/978-3-030-47358-7_52.

HichemSedjelmaci, Mohamed Feham, “Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network,” 2011.

Diniesh, V. C. ., Prasad, L. V. R. C. ., Bharathi , R. J. ., Selvarani, A., Theresa, W. G. ., Sumathi, R. ., & Dhanalakshmi, G. . (2023). Performance Evaluation of Energy Efficient Optimized Routing Protocol for WBANs Using PSO Protocol. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 116–121. https://doi.org/10.17762/ijritcc.v11i4s.6314

Pise, D. P. . (2021). Bot Net Detection for Social Media Using Segmentation with Classification Using Deep Learning Architecture. Research Journal of Computer Systems and Engineering, 2(1), 11:15. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/13

Kothandaraman, D., Praveena, N., Varadarajkumar, K., Madhav Rao, B., Dhabliya, D., Satla, S., & Abera, W. (2022). Intelligent forecasting of air quality and pollution prediction using machine learning. Adsorption Science and Technology, 2022 doi:10.1155/2022/5086622

Downloads

Published

02.09.2023

How to Cite

Srinivasan, M. ., & N. C., S. . (2023). Machine Learning-Based Security Enhancement in Heterogeneous Networks Using an Effective Pattern Mining Framework. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 244–257. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3412

Issue

Section

Research Article