Building an Intrusion Detection System on Ecommerce Data using Regression Analysis
Keywords:Intrusion Detection System, Machine Learning, LR, K Nearest Neighbour, SVM, Network Security
A system for anomaly-based intrusion detection learns to identify acceptable network behaviour in order to detect intrusion. When anomalous network behaviour is observed outside of its training sets, it then issues a warning. Administrators utilize the Network Intrusion Detection and Prevention System to identify network security vulnerabilities in their organizations by detecting and blocking a number of well-known network attacks. It is more crucial than ever to identify network anomalies and cyberattacks since they aid in the creation of an efficient intrusion detection system, which is necessary for contemporary security. The Canadian Institute of Cyber Security published a new data set called CICIDS2019 network data set, which fixed the NSL-KDD issue. The research's Network Intrusion Detection dataset can be downloaded for free from Kaggle. The dataset is standardised after being pre-processed to eliminate cells with null values. Based on the networking facts, a variety of computational techniques have been used to determine whether or not an intrusion has occurred, including classic ML and ensemble learning models. Classic machine learning methods like AdaBoost, Naive Bayes, K Nearest Neighbour, Support Vector Machine, and Logistic Regression are employed in this work. The Ad, K Nearest Neighbour, Naive Bayes, Support Vector Machine, and Logistic Regression models are all developed into the proposed model. According to the accuracy, precision, recall, and f-measure experimental findings from the NSL-KDD dataset used in this work, the proposed system outperforms the existing methods.
Islam, M. K., Hridi, P., Hossain, M. S., & Narman, H. S. (2020, November). Network anomaly detection using lightgbm: A gradient boosting classifier. In 2020 30th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1-7). IEEE
Ren, J., Guo, J., Qian, W., Yuan, H., Hao, X., & Jingjing, H. (2019). Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Security and communication networks, 2019.
Sharma, S., & Kaushik, B. (2019). A survey on internet of vehicles: Applications, security issues & solutions. Vehicular Communications, 20, 100182.
Sharma, S., & Kaul, A. (2021). VANETs cloud: architecture, applications, challenges, and issues. Archives of Computational Methods in Engineering, 28, 2081-2102.
Axelsson, S. (1998). Research in intrusion-detection systems: A survey (Vol. 120). Technical report 98–17. Department of Computer Engineering, Chalmers University of Technology.
Bace, R. G., & Mell, P. (2001). Intrusion detection systems.
Smadi, A. A., Ajao, B. T., Johnson, B. K., Lei, H., Chakhchoukh, Y., & Abu Al-Haija, Q. (2021). A Comprehensive survey on cyber-physical smart grid testbed architectures: Requirements and challenges. Electronics, 10(9), 1043.
Tazi, K., Abdi, F., & Abbou, M. F. (2015, December). Review on cyber-physical security of the smart grid: Attacks and defense mechanisms. In 2015 3rd International Renewable and Sustainable Energy Conference (IRSEC) (pp. 1-6). IEEE.
Khoei, T. T., Aissou, G., Hu, W. C., & Kaabouch, N. (2021, May). Ensemble learning methods for anomaly intrusion detection system in smart grid. In 2021 IEEE international conference on electro information technology (EIT) (pp. 129-135). IEEE.
Khoei, T. T., Ismail, S., & Kaabouch, N. (2021, December). Boosting-based models with tree-structured parzen estimator optimization to detect intrusion attacks on smart grid. In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0165-0170). IEEE.
El Mrabet, Z., El Ghazi, H., & Kaabouch, N. (2019, May). A performance comparison of data mining algorithms-based intrusion detection system for smart grid. In 2019 IEEE International Conference on Electro Information Technology (EIT) (pp. 298-303). IEEE.
Anthi, E., Williams, L., Słowińska, M., Theodorakopoulos, G., & Burnap, P. (2019). A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal, 6(5), 9042-9053.
Talaei Khoei, T., Ismail, S., Shamaileh, K. A., Devabhaktuni, V. K., & Kaabouch, N. (2022). Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles. Applied Sciences, 13(1), 383.
Kumar, R. R., Tomar, A., Shameem, M., & Alam, M. N. (2022). Optcloud: An optimal cloud service selection framework using QoS correlation lens. Computational Intelligence and Neuroscience, 2022.
Kumar, R. R., Shameem, M., Khanam, R., & Kumar, C. (2018, December). A hybrid evaluation framework for QoS based service selection and ranking in cloud environment. In 2018 15th IEEE India council international conference (INDICON) (pp. 1-6). IEEE.
Kumar, R. R., Shameem, M., & Kumar, C. (2022). A computational framework for ranking prediction of cloud services under fuzzy environment. Enterprise information systems, 16(1), 167-187.
Akbar, M. A., Shameem, M., Mahmood, S., Alsanad, A., & Gumaei, A. (2020). Prioritization based taxonomy of cloud-based outsource software development challenges: Fuzzy AHP analysis. Applied Soft Computing, 95, 106557.
Bakro, M., Bisoy, S. K., Patel, A. K., & Naal, M. A. (2021). Performance analysis of cloud computing encryption algorithms. In Advances in Intelligent Computing and Communication: Proceedings of ICAC 2020 (pp. 357-367). Springer Singapore.
Bakro, M., Kumar, R. R., Alabrah, A. A., Ashraf, Z., Bisoy, S. K., Parveen, N., ... & Abdelsalam, A. (2023). Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier. Electronics, 12(11), 2427.
Bakro, M., Bisoy, S. K., Patel, A. K., & Naal, M. A. (2022). Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms. In Blockchain based Internet of Things (pp. 139-170). Singapore: Springer Singapore.
Srilatha, D., & Shyam, G. K. (2021). Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network. Cluster Computing, 24(3), 2657-2672.
Xu, C., Shen, J., Du, X., & Zhang, F. (2018). An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access, 6, 48697-48707.
Abbas, G., Mehmood, A., Carsten, M., Epiphaniou, G., & Lloret, J. (2022). Safety, Security and Privacy in Machine Learning Based Internet of Things. Journal of Sensor and Actuator Networks, 11(3), 38.
Mighan, S. N., & Kahani, M. (2021). A novel scalable intrusion detection system based on deep learning. International Journal of Information Security, 20, 387-403.
Mayuranathan, M., Murugan, M., & Dhanakoti, V. (2021). Best features-based intrusion detection system by RBM model for detecting DDoS in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12, 3609-3619.
Arora, N., & Kaur, P. D. (2020). A Bolasso based consistent feature selection enabled random forest classification algorithm: An application to credit risk assessment. Applied Soft Computing, 86, 105936.
Singh, S., Sharma, S., Sharma, S., Alfarraj, O., Yoon, B., & Tolba, A. (2021). Intrusion Detection System-Based Security Mechanism for Vehicular Ad-Hoc Networks for Industrial IoT. IEEE Consumer Electronics Magazine, 11(6), 83-92.
Butun, I., Ra, I. H., & Sankar, R. (2015). An intrusion detection system based on multi-level clustering for hierarchical wireless sensor networks. Sensors, 15(11), 28960-28978.
Sharma, S., & Kaul, A. (2018). A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular communications, 12, 138-164.
Sharma, S., & Kaul, A. (2018). Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET. Vehicular Communications, 12, 23-38.
Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1), 1-22.
Mrs. Monika Soni. (2015). Design and Analysis of Single Ended Low Noise Amplifier. International Journal of New Practices in Management and Engineering, 4(01), 01 - 06. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/33
Sivakumar, D. S. (2021). Clustering and Optimization Based on Hybrid Artificial Bee Colony and Differential Evolution Algorithm in Big Data. Research Journal of Computer Systems and Engineering, 2(1), 23:27. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/15
How to Cite
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.