Analytics of Binary Class Detection & Forecasting of Cyber Incident by Machine Learning Methods

Authors

  • Swati Gawand Research Scholar, 2Professor Department of Computer Science and Engineering, Sandip University, Mahiravani, Nashik 422213, Maharashtra, India.
  • Meesala Sudhir Kumar Research Scholar, 2Professor Department of Computer Science and Engineering, Sandip University, Mahiravani, Nashik 422213, Maharashtra, India.

Keywords:

Cyber Attack, Decision Tree, Logistic Regression, Random Forest

Abstract

In the rapidly evolving landscape of the digital era, the importance of cybersecurity has become paramount. As technology continues to advance, organizations and individuals are becoming increasingly interconnected, relying on digital platforms for communication, commerce, and critical infrastructure. This interconnectedness, while facilitating unprecedented convenience and efficiency, also exposes systems to a myriad of cybersecurity threats. This paper presents a proposed system designed to analyze network intrusion datasets. The dataset utilized comprises binary classified data, distinguishing between normal and attack types. We obtained the dataset from Kaggle for implementation purposes. Different machine learning methods,  GNB, KNN, LR, SVM, DT, VC, RF, GB and XG are employed for the identification and categorization of cyber incident. A comparative analysis is conducted utilizing these machine learning algorithms. System performance is evaluated using Cross-Validation score, Recall value, F1 Score, Precision value and Accuracy value metrics. The analysis of system performance demonstrates which algorithm achieves the most accurate results.

Downloads

Download data is not yet available.

References

Kousik Barik, Sanjay Misra, Karabi Konar, Luis Fernandez-Sanz & Murat Koyuncu," Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study", Applied Artificial Intelligence, Published with license by Taylor & Francis Group, pp 1-25, DOI: 10.1080/08839514.2022.2055399,2022

Blessing Guembe, Ambrose Azeta, Sanjay Misra, Victor Chukwudi Osamor, Luis Fernandez-Sanz & Vera Pospelova," The Emerging Threat of Ai-driven Cyber Attacks: A Review", Applied Artificial Intelligence, Published with license by Taylor & Francis Group,1-36, DOI: 10.1080/08839514.2022.2037254,2022

Mona Alduailij, Qazi Waqas Khan, Muhammad Tahir, Muhammad Sardaraz, Mai Alduailij, and Fazila Malik," Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method", Cloud Computing and Symmetry: Latest Advances and Prospects,1-15, DOI https://doi.org/10.3390/sym14061095,2022

Arpitha. B, Sharan. R, Brunda. B. M, Indrakumar. D. M, Ramesh, "Cyber Attack Detection and notifying System using ML Techniques", Indian Journal of Computer Science and Engineering (IJCSE), pp 28153-28159,2021

Fahima Hossain, Marzana Akter and Mohammed Nasir Uddin," Cyber Attack Detection Model (CADM) Based on Machine Learning Approach ",2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp 567-572,2021

Abdulkadir Bilen and Ahmet Bedri Özer," Cyber-attack method and perpetrator prediction using machine learning algorithms", PeerJ Computer Science, pp 475-496,2021

Florian Klaus Kaiser, Tobias Budiga," Attack Forecast and Prediction ", C&ESAR'21: Computer Electronics Security Application Rendezvous, pp 77-97, 2021

Iqbal H. Sarker, CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks, Internet of Things, Volume 14,2021,100393, ISSN 2542-6605,

I. H. Sarker, Y. B. Abushark, F. Alsolami, A. I. Khan, Intrudtree: A machine learning based cyber security intrusion detection model, Symmetry 12 (5) (2020) 754.

I. H. Sarker, A. Kayes, S. Badsha, H. Alqahtani, P. Watters, A. Ng, Cybersecurity data science: an overview from a machine learning perspective, Journal of Big Data 7 (1) (2020) 1–29.

Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, K. Sakurai, Machine learning-based iot-botnet attack detection with sequential architecture, Sensors 20 (16) (2020) 4372.

A. Bansal and S. Kaur, "Data Dimensionality Reduction (DDR) Scheme for Intrusion Detection System Using Ensemble and Standalone Classifiers," In Proc. International Conference on Advances in Computing and Data Sciences, vol. 1045, pp. 436-451, 2019. doi 10.1007/978-981-13-9939-8 39 [Accessed 15 July 2020].

S. Sandosh, V. Govindasamy, and G. Akila, "Enhanced intrusion detection system via agent clustering and classification based on outlier detection," Peer-to-Peer Networking and Applications, vol. 13, no. 3, pp. 1038-1045, 2020. doi: 10.1007/s12083-019-00822-3 [Accessed 15 July 2020

R. Wazirali, "An Improved Intrusion Detection System Based on KNN Hyperparameter Tuning and Cross-Validation," Arabian Journal for Science and Engineering, vol. 45, no. 12, pp. 10859-10873, 2020. doi 10.1007/s13369-020-04907-7 [Accessed 19 August 2020].

Twinkle Shah, Sagar Parmar, Kishan Panchal," Cyber Crime Attack Prediction", International Research Journal of Engineering and Technology, pp 1037–1042. 2020

Kumar, "Cyber-attack prediction using machine learning algorithms", International Conference on Advances in Computing, Communication and Control (ICAC3), pp 1–5,2020

A. Ahmim, M. Ferrag, L. Maglaras, M. Derdour and H. Janicke, "A Detailed Analysis of Using Supervised Machine Learning for Intrusion Detection," Strategic Innovative Marketing and Tourism, pp. 629-639, 2020.

W. Zong, Y. Chow, and W. Susilo, "Interactive three-dimensional visualization of network intrusion detection data for machine learning," Future Generation Computer Systems, vol. 102, pp. 292-306, 2020

O. Sarumi, A. Adetunmbi, and F. Adetoye, "Discovering computer networks intrusion using data analytics and machine intelligence," Scientific African, vol. 9, p. p 1-5, 2020.

A. Nagaraja, B. Uma, and R. Gunupudi, "UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation," Foundations of Science, vol. 25, no. 4, pp. 1049-1075,2020.

A. Saleh, F. Talaat, and L. Labib, "A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers", Artificial Intelligence Review, vol. 51, no. 3, pp. 403-443, 2020.

H. Liu and A. Gegov, "Collaborative Decision Making by Ensemble Rule-Based Classification Systems," Studies in Big Data, pp. 245-264, 2020.

P. Negandhi, Y. Trivedi and R. Mangrulkar, "Intrusion Detection System Using Random Forest on the NSL-KDD Dataset," Emerging Research in Computing, Information, Communication and Applications, pp. 519-531, 2019.

C. Gayathri Harshitha, M. Kameswara Rao, and P. Neelesh Kumar, "A Novel Mechanism for Host-Based Intrusion Detection System," In Proc. , "First International Conference on Sustainable Technologies for Computational Intelligence, pp. 527-536, 2019.

Y. Ever, B. Sekeroglu and K. Dimplier, "Classification Analysis of Intrusion Detection on NSL-KDD Using Machine Learning Algorithms," In Proc. International Conference on Mobile Web and Intelligent Information Systems, pp. 111-122, 2019.

T. Tang, D. McLernon, L. Mhamdi, S. Zaidi and M. Ghogho, "Intrusion Detection in SDN-Based Networks: Deep Recurrent Neural Network Approach," Deep Learning Applications for Cyber Security, pp. 175-195, 2019.

A. Gupta, G. Prasad and S. Nayak, "A New and Secure Intrusion Detecting System for Detection of Anomalies Within the Big Data," Studies in Big Data, pp. 177-190, 2018.

M. Ibrahim, "An empirical comparison of random forest-based and other learning-to-rank algorithms, "Pattern Analysis and Applications, vol. 23, no. 3, pp. 1133-1155, 2019.

M. G. Raman, N. Somu, S. Jagarapu, T. Manghnani, T. Selvam, K. Krithivasan, V. S. Sriram, An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm, Artificial Intelligence Review (2019) 1–32.

Mahmudul Hasan, Md. Milon Islam, Md Ishrak Islam Zarif, M.M.A. Hashem, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches", Internet of Things, Volume 7,2019,100059, ISSN 2542-6605,https://doi.org/10.1016/j.iot.2019.100059.

https://pub.towardsai.net/gaussian-naive-bayes-explained-and-hands-on-with-scikit-learn-4183b8cb0e4c

https://www.kaggle.com/datasets/sampadab17/network-intrusion-detection

Sonia Wadhwa, Dr. Sudhir Kumar Meesala, "An Artificial System for Prognosis Cancer Cells through Blood Cells Images Using Image Processing", International Journal of Science and Research (IJSR), Volume 8 Issue 6, June 2019, pp. 638-642, https://www.ijsr.net/getabstract.php?paperid=ART20198513.

Sudhir Kumar Meesala, Dr. Pabitra Mohan Khilar, Dr. A. K. Shrivastava, "Multiple Instruction Multiple Data (MIMD) Implementation on Clusters of Terminals", International Journal of Science and Research (IJSR), Volume 5 Issue 1, January 2016, pp. 1652-1658, https://www.ijsr.net/getabstract.php?paperid=NOV153204.

Meesala, Sudhir & Pabitra, Mohan & Khilar, & Shrivastava, Ajeet & Scholar, Ph. (2014). Multiple Instruction Multiple Data (MIMD) Implementation on Clusters of Terminals. 10.13140/RG.2.1.4826.9846.

Mishra, Sudha & Chandra, Pankaj & Soni, Dr & Gupta, Akanksha & Tiger, Bindu & Kumar, Dr & Singh, Dr. (2023). TUMOR DETECTION AND COMPARATIVE ANALYSIS Section A-Research paper ISSN. 12. 148-172. 10.48047/ecb/2023.12.si13.115.

Kumar, Meesala & Murugan, Chitra & Sharma, Anubhav & Ragavendiran, S & Banappagoudar, Sudharani & Kumar, A. (2023). RECOGNITION OF EMOTIONS THROUGH SPEECH USING MACHINE LEARNING TECHNIQUES. 26. 723-437.

Munusamy, Ambigavathi & Sridharan, D. (2020). A Survey on Big Data in Healthcare Applications. 10.1007/978-981-13-8618-3_77.

Gawand Swati, and Santosh Kumar. "Energy Efficient Clustering Method for Wireless Sensor Network by using Compressive Sensing and MEMAC." International journal of computer Applications 975 (2014): 8887.

S. K. Meesala, "Parallel processing implementation on clusters of terminals using Java RMI," 2012 International Conference on Computing, Communication and Applications, Dindigul, India, 2012, pp. 1-6, doi: 10.1109/ICCCA.2012.6179167.

Downloads

Published

24.03.2024

How to Cite

Gawand, S. ., & Kumar, M. S. . (2024). Analytics of Binary Class Detection & Forecasting of Cyber Incident by Machine Learning Methods. International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 100–108. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5122

Issue

Section

Research Article