Machine Learning-Based Classification Techniques for Network Intrusion Detection
Keywords:Network Intrusion, Decision Tree, K-means, MLP, Random Forest, KDD Cup99
Network intrusion detection is crucial because of how it affects several communication and security areas, to detect network intrusion is a challenging task. Additionally, network intrusion detection is arduous work because to train modern machine learning models it takes a huge number of data to recognise an intrusion into the network. Recently, in order to identify network intrusions various methods proposed. Though they face significant difficulties because novel threats are always emerging that more older systems cannot detect. The goal of this paper is to design a network intrusion detection system (NIDS) by comparing several algorithms. Considering the relationships between the features, the optimum features are chosen from the dataset. In our research, we use K-means, Decision Tree, Random Forest, KNNs, and MLP for comparison. By monitoring the network traffic is classified into attacks and normal traffic. The experimental outcomes demonstrated that our suggested technique accurately detects various network intrusion types with on the KDD Cup99 dataset. Our proposed system also helpful for research and application areas involving network security.
Alabdulatif, A. and Rizvi, S.S.H., 2023. Network intrusion detection system using an optimized machine learning algorithm. Mehran University Research Journal of Engineering & Technology, 42(1), pp.153-164.
Sable, N.P., Rathod, V.U. (2023). Rethinking Blockchain and Machine Learning for Resource-Constrained WSN. In: Neustein, A., Mahalle, P.N., Joshi, P., Shinde, G.R. (eds) AI, IoT, Big Data and Cloud Computing for Industry 4.0. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-29713-7_17.
Solanke, O.O., Adegboyega, T.A., Taiwo, A.I., Abdullah, K.A., Ayo, F.E., Odule, T.J., Hassan, S.O. and Efuwape, B.T., 2022. A HYBRID MACHINE LEARNING MODEL FOR NETWORK INTRUSION DETECTION. LAUTECH Journal of Engineering and Technology, 16(2), pp.152-157.
N. P. Sable, V. U. Rathod, M. D. Salunke, H. B. Jadhav, R. S. . Tambe, and S. R. . Kothavle, “Enhancing Routing Performance in Software-Defined Wireless Sensor Networks through Reinforcement Learning”, International Journal of Intelligent Systems and Applications in Engineering (IJISAE), vol. 11, no. 10s, pp. 73–83, Aug. 2023.
Ahmad, I., Ul Haq, Q.E., Imran, M., Alassafi, M.O. and AlGhamdi, R.A., 2022. An efficient network intrusion detection and classification system. Mathematics, 10(3), p.530.
Y. Mali, “A Comparative Analysis of Machine Learning Models for Soil Health Prediction and Crop Selection”, International Journal of Intelligent Systems and Applications in Engineering (IJISAE), vol. 11, no. 10s, pp. 811–828, Aug. 2023.
Al-magsoosi, A.A.D., Mohammed, G.N. and Ramadhan, Z.A., 2021. Comparison and analysis of supervised machine learning algorithms. Periodicals of Engineering and Natural Sciences, 9(4), pp.1102-1109.
Rathod, V.U. and Gumaste, S.V., 2022. Role of Neural Network in Mobile Ad Hoc Networks for Mobility Prediction. International Journal of Communication Networks and Information Security, 14(1s), pp.153-166.
Alhajjar, E., Maxwell, P. and Bastian, N., 2021. Adversarial machine learning in network intrusion detection systems. Expert Systems with Applications, 186, p.115782.
Vijay U. Rathod* & Shyamrao V. Gumaste, “Effect Of Deep Channel To Improve Performance On Mobile Ad-Hoc Networks”, J. Optoelectron. Laser, vol. 41, no. 7, pp. 754–756, Jul. 2022.
N. P. Sable, V. U. Rathod, P. N. Mahalle, and P. N. Railkar, “An Efficient and Reliable Data Transmission Service using Network Coding Algorithms in Peer-to-Peer Network”, IJRITCC, vol. 10, no. 1s, pp. 144–154, Dec. 2022.
Alqahtani, H., Sarker, I.H., Kalim, A., Minhaz Hossain, S.M., Ikhlaq, S. and Hossain, S., 2020. Cyber intrusion detection using machine learning classification techniques. In Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers 1 (pp. 121-131). Springer Singapore.
N. P. Sable, R. Sonkamble, V. U. Rathod, S. Shirke, J. Y. Deshmukh, and G. T. Chavan, “Web3 Chain Authentication and Authorization Security Standard (CAA)”, IJRITCC, vol. 11, no. 5, pp. 70–76, May 2023.
Khraisat, A., Gondal, I., Vamplew, P. and Kamruzzaman, J., 2019. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1), pp.1-22.
V. U. Rathod and S. V. Gumaste, “Role of Deep Learning in Mobile Ad-hoc Networks”, IJRITCC, vol. 10, no. 2s, pp. 237–246, Dec. 2022.
V. U. Rathod, Y. Mali, R. Sable, M. D. Salunke, S. Kolpe and D. S. Khemnar, "The Application of CNN Algorithm in COVID-19 Disease Prediction Utilising X-Ray Images," 2023 3rd Asian Conference on Innovation in Technology (ASIANCON), Ravet IN, India, 2023, pp. 1-6, doi: 10.1109/ASIANCON58793.2023.10270221.
Ghurab, M., Gaphari, G., Alshami, F., Alshamy, R. and Othman, S., 2021. A detailed analysis of benchmark datasets for network intrusion detection system. Asian Journal of Research in Computer Science, 7(4), pp.14-33.
V. U. Rathod, N. P. Sable, N. N. Thorat and S. N. Ajani, "Deep Learning Techniques Using Lightweight Cryptography for IoT Based E-Healthcare System," 2023 3rd International Conference on Intelligent Technologies (CONIT), Hubli, India, 2023, pp. 1-5, doi: 10.1109/CONIT59222.2023.10205808.
Sarker, I.H., Abushark, Y.B., Alsolami, F. and Khan, A.I., 2020. Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry, 12(5), p.754.
N. P. Sable, M. D. Salunke, V. U. Rathod and P. Dhotre, "Network for Cross-Disease Attention to the Severity of Diabetic Macular Edema and Joint Retinopathy," 2022 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), Bangalore, India, 2022, pp. 1-7, doi: 10.1109/SMARTGENCON56628.2022.10083936.
Moustafa, N., Creech, G. and Slay, J., 2018. Anomaly detection system using beta mixture models and outlier detection. In Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017 (pp. 125-135). Springer Singapore.
N. P. Sable, V. U. Rathod, P. N. Mahalle and D. R. Birari, "A Multiple Stage Deep Learning Model for NID in MANETs," 2022 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 2022, pp. 1-6, doi: 10.1109/ESCI53509.2022.9758191.
Moustafa, N., Turnbull, B. and Choo, K.K.R., 2018. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet of Things Journal, 6(3), pp.4815-4830.
V. U. Rathod and S. V. Gumaste, "Role of Routing Protocol in Mobile Ad-Hoc Network for Performance of Mobility Models," 2023 IEEE 8th International Conference for Convergence in Technology (I2CT), Lonavla, India, 2023, pp. 1-6, doi: 10.1109/I2CT57861.2023.10126390.
Sarker, I.H., Kayes, A.S.M., Badsha, S., Alqahtani, H., Watters, P. and Ng, A., 2020. Cybersecurity data science: an overview from machine learning perspective. Journal of Big data, 7, pp.1-29.
N. P. Sable, V. U. Rathod, R. Sable and G. R. Shinde, "The Secure E-Wallet Powered by Blockchain and Distributed Ledger Technology," 2022 IEEE Pune Section International Conference (PuneCon), Pune, India, 2022, pp. 1-5, doi: 10.1109/PuneCon55413.2022.10014893.
G, A. ., K, S. ., S, B. ., M, B. ., & M, P. . (2023). Power Consumption and Carbon Emission Equivalent for Virtualized Resources – An Analysis: Virtual Machine and Container Analysis for Greener Data Center. International Journal on Recent and Innovation Trends in Computing and Communication, 11(1), 110–116. https://doi.org/10.17762/ijritcc.v11i1.6057
Andrew Hernandez, Stephen Wright, Yosef Ben-David, Rodrigo Costa, David Botha. Optimizing Resource Allocation using Machine Learning in Decision Science. Kuwait Journal of Machine Learning, 2(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/195
Sharma, R., Dhabliya, D. A review of automatic irrigation system through IoT (2019) International Journal of Control and Automation, 12 (6 Special Issue), pp. 24-29.
How to Cite
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.