Machine Learning-Based Intrusion Detection: A Comparative Analysis among Datasets and Innovative Feature Reduction for Enhanced Cybersecurity

Authors

  • T. R. Ramesh Computer Applications, SRM Institute of Science and Technology, Tiruchirappalli Campus,
  • T. Jackulin Associate Professor, Department of Computer Science and Engineering, Panimalar Engineering College, Chennai
  • R. Ashok Kumar Assistant Professor, Artificial Intelligence Department, Madanapalle Institute of Technology & Science, Kadiri Road Angallu Madanapalle, Andhrapradesh, 517325
  • K. Chanthirasekaran Professor, Department of Electronics and Communication Engineering, Saveetha Engineering College, Chennai.
  • M. Bharathiraja Professor, Automobile Engineering, Bannari Amman Institute of Technology, Sathyamangalam, Erode

Keywords:

Intrusion Detection Systems, Cybersecurity, Machine Learning, Performance Metrics, Network Security

Abstract

: In the rapidly establishing digital area, the upward push of cyber threats furnishes growing issues in safeguarding statistics, consequently needing the expansion of strong intrusion detection systems (IDS). This study gives an in-depth analysis of Intrusion Detection Systems (IDS), evaluating its class, commonly applied methodology, and the vital position of datasets inside the assessment process. The exploration spans the incorporation of device learning and deep mastering in IDS, demonstrating the cutting-edge qualities and breakthroughs that boost network security. The exam closes with a radical evaluation of general performance signs, along with precision, recall, F1 score, and accuracy, throughout ten illustrations. These indications offer focused and diffused insights regarding the machine's ability to correctly identify and respond with cyber-assaults. This study gives useful insights to aid cybersecurity specialists in upgrading their intrusion detection strategies for increased resilience towards transforming cyber threats. It covers the vital goal of keeping virtual belongings that companies are presently facing.

Downloads

Download data is not yet available.

References

M.Preetha, et al., “Ant Colony Optimisation With Levy Based Unequal Clustering And Routing (ACO-UCR) Technique For Wireless Sensor Networks”, Journal of Circuits, Systems, and Computers, ISSN: 0218-1266 (print); 1793-6454 (web) Vol .33, Issue3, July 24, 2023. DOI: 10.1142/S0218126624500439

M. Parto, C. Saldana, and T. Kurfess, “A novel three-layer IoT architecture for shared, private, scalable, and real-time machine learning from ubiquitous cyber-physical systems,” Procedia Manuf., vol. 48, no. 2019, pp. 959–967, 2020, doi: 10.1016/j.promfg.2020.05.135.

I. Zakariyya, H. Kalutarage, and M. O. Al-Kadri, “Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring,” Comput. Secur., vol. 133, no. June, p. 103388, 2023, doi: 10.1016/j.cose.2023.103388.

M.Preetha et al., “Efficient Re-clustering with Novel Fuzzy Based Grey Wolf Optimization for Hotspot Issue Mitigation and Network Lifetime Enhancement,” Journal of Ad Hoc & Sensor Wireless Networks, Vol. 56, Issue 4, page No-273-297, Sep 2023

N. Jeffrey, Q. Tan, and J. R. Villar, “A hybrid methodology for anomaly detection in Cyber–Physical Systems,” Neurocomputing, vol. 568, no. November 2023, p. 127068, 2024, doi: 10.1016/j.neucom.2023.127068.

Z. Song, A. R. Mishra, and S. P. Saeidi, “Technological capabilities in the era of the digital economy for integration into cyber-physical systems and the IoT using decision-making approach,” J. Innov. Knowl., vol. 8, no. 2, p. 100356, 2023, doi: 10.1016/j.jik.2023.100356.

Preetha M et al.,“CMAC-An Efficient Energy Postulate Based on Energy Cost Modeling in Wireless Sensor Network”, Asian Journal of Information Technology, vol.12, issue.6, pp. 176-183, 2013,ISSN 1682-3915

M. Wazid, A. K. Das, V. Chamola, and Y. Park, “Uniting cyber security and machine learning: Advantages, challenges and future research,” ICT Express, vol. 8, no. 3, pp. 313–321, 2022, doi: 10.1016/j.icte.2022.04.007.

P. Wang, Z. Man, Z. Cao, J. Zheng, and Y. Zhao, “Dynamics modelling and linear control of quadcopter,” Int. Conf. Adv. Mechatron. Syst. ICAMechS, vol. 0, pp. 498–503, 2016, doi: 10.1109/ICAMechS.2016.7813499.

Y. P. Tsang, T. Yang, Z. S. Chen, C. H. Wu, and K. H. Tan, “How is extended reality bridging human and cyber-physical systems in the IoT-empowered logistics and supply chain management?,” Internet of Things (Netherlands), vol. 20, no. June, 2022, doi: 10.1016/j.iot.2022.100623.

M. Preetha et al., “A Preliminary Analysis by using FCGA for Developing Low Power Neural Network Controller Autonomous Mobile Robot Navigation”, International Journal of Intelligent Systems and Applications in Engineering (IJISAE), ISSN:2147-6799, 2023

G. Epiphaniou, M. Hammoudeh, H. Yuan, C. Maple, and U. Ani, “Digital twins in cyber effects modelling of IoT/CPS points of low resilience,” Simul. Model. Pract. Theory, vol. 125, no. March 2022, p. 102744, 2023, doi: 10.1016/j.simpat.2023.102744.

M. M. Hossain, M. A. Kashem, N. M. Nayan, and M. A. Chowdhury, “A Medical Cyber-physical system for predicting maternal health in developing countries using machine learning,” Healthc. Anal., vol. 5, no. May 2023, p. 100285, 2024, doi: 10.1016/j.health.2023.100285.

Z. Noor, S. Hina, F. Hayat, and G. A. Shah, “An intelligent context-aware threat detection and response model for smart cyber-physical systems,” Internet of Things (Netherlands), vol. 23, no. June, p. 100843, 2023, doi: 10.1016/j.iot.2023.100843.

M. Catillo, A. Pecchia, and U. Villano, “CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders,” Comput. Secur., vol. 129, p. 103210, 2023, doi: 10.1016/j.cose.2023.103210.

M. Preetha et al., “Deep Learning-Driven Real-Time Multimodal Healthcare Data Synthesis”, International Journal of Intelligent Systems and Applications in Engineering (IJISAE), ISSN:2147-6799, Vol.12, Issue 5, page No-360-369, 2024

M. Al-Hawawreh and N. Moustafa, “Explainable deep learning for attack intelligence and combating cyber–physical attacks,” Ad Hoc Networks, vol. 153, no. April 2023, 2024, doi: 10.1016/j.adhoc.2023.103329.

A. Aldhaheri, F. Alwahedi, M. A. Ferrag, and A. Battah, “Deep learning for cyber threat detection in IoT networks: A review,” Internet Things Cyber-Physical Syst., vol. 4, no. September 2023, pp. 110–128, 2024, doi: 10.1016/j.iotcps.2023.09.003.

Preetha M et al., “A Survey on Misbehavior Report Authentication Scheme of Selfish node Detection Using Collaborative Approach in MANET”, International Journal of Engineering Science and Computing, vol. 6, no. 5, pp. 5381-5384, ISSN 2321-3361

I. Singh, D. Centea, and M. Elbestawi, “IoT, IIoT and Cyber-Physical Systems Integration in the SEPT Learning Factory,” Procedia Manuf., vol. 31, pp. 116–122, 2019, doi: 10.1016/j.promfg.2019.03.019.

M. Kato, T. Kizaki, T. Uwano, K. Iijima, and Y. Kakinuma, “Development of temperature analysis environment for Cyber-Physical Systems on IoT platform: a study of dynamical properties under temperature change in machine tool spindle unit using carbon fiber reinforced plastics,” Procedia CIRP, vol. 107, no. March, pp. 1485–1490, 2022, doi: 10.1016/j.procir.2022.05.179.

Downloads

Published

12.01.2024

How to Cite

Ramesh, T. R. ., Jackulin, T. ., Kumar, R. A. ., Chanthirasekaran, K. ., & Bharathiraja, M. . (2024). Machine Learning-Based Intrusion Detection: A Comparative Analysis among Datasets and Innovative Feature Reduction for Enhanced Cybersecurity. International Journal of Intelligent Systems and Applications in Engineering, 12(12s), 200–206. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4505

Issue

Section

Research Article

Most read articles by the same author(s)