Intrusion Detection System by Integrating Mod K- Means C Algorithm and T-SNE Dimensionality Reduction

Authors

  • Mallaradhya C., G. N. K. Suresh Babu

Keywords:

Intrusion Detection System, Modified K-Means Clustering, t-SNE Dimensionality Reduction, Cyber security, Network Security, Parallel Processing, and Machine Learning.

Abstract

This research presents a new methodology to enhance the precision of Intrusion Detection Systems (IDS) by integrating the Modified K-Means Clustering (ModKMeansC) algorithm as a classifier along with t-Distributed Stochastic Neighbor Embedding (t-SNE) a reduction technique of dimensionality. In the realm of cyber security, conventional IDS face challenges in accurately discerning abnormal network behavior due to the dynamic and intricate nature of cyber threats. The ModKMeansC algorithm, intricately designed to address issues stemming from abnormal network connections, introduces parallelism into centroid and distance calculation update operations. This concurrent execution, performed asynchronously for each data point, facilitates real-time analysis of network traffic, thereby bolstering efficiency and responsiveness. Leveraging the CICIDS2017 dataset, encompassing both normal and abnormal network traffic patterns, the study implements and fine-tunes the ModKMeansC algorithm for optimal performance. t-SNE is applied to preprocess the data before feeding it into the classifier. The proposed system's performance is meticulously assessed using key performance metrics. A proportional analysis against traditional intrusion detection algorithms underscores the ModKMeansC algorithm's advantages in accurately categorizing abnormal network behavior as 92%. Results and ensuing discussions highlight the algorithm's adeptness in efficiently handling abnormal network connections and its prowess in parallel processing. This examination significantly supports to the dynamic field of cyber security by presenting a more effective and responsive methodology for identifying abnormal network behavior. The amalgamation of the ModKMeansC algorithm with t-SNE holds considerable promise in elevating the accuracy of IDS as 95%. Future research directions may encompass adapting the proposed system to real-world cyber security scenarios and further optimizing the algorithm for scalability in large-scale networks.

Downloads

Download data is not yet available.

References

Ahmad I, Basheri M, Iqbal MJ, and Rahim A, Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection, 2021, IEEE Access, Vol. 6, pp. 33789-33795.

Ahmad I, Basheri M, Iqbal MJ, and Rahim A, Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection, IEEE Access, Vol. 6, pp. 33789-33795, 2018.

Akashdeep Manzoor, I Kumar N, A feature reduced intrusion detection system using ANN classifier, Expert Systems with Applications, vol. 88, pp. 249-257, 2017.

Anurag Chhetri , Sanjay Kumar , Arya Nanda , Priyanshu Panwar, Applications of machine learning and rule induction, International Journal of Innovative Science and Research Technology, Vol.7, Issue 5, pp.1-4, 2022

Chen, Ying. "Big data technology for computer intrusion detection" Open Computer Science, vol. 13, no. 1, 2023, pp. 20220267. https://doi.org/10.1515/comp-2022-0267

Eesa AS, Orman Z and Brifcani AMA, A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems, Expert Systems with Applications, vol. 42, no. 5, pp. 2670-2679, 2015.

Fang, F., 2023. A Study on the Application of Data Mining Techniques in the Management of Sustainable Education for Employment. Data Science Journal, 22(1), p.23. DOI: https://doi.org/10.5334/dsj-2023-023

Farnaaz N & Jabbar MA, Random Forest Modeling for Network Intrusion Detection System, Procedia Computer Science, vol. 89, pp. 213-217, 2016.

Fawaz A M and Sanders W H, Learning Process Behavioral Baselines for Anomaly Detection, In Proceedings of IEEE Twenty Second Pacific Rim, International Symposium on Dependable Computing. 145–154, 2020.

Jianyi Liu, dilleniid dicot genus Li and Ru Zhang, Algorithm of reducing the false positives in IDS supported correlation Analysis”, IOP Conference Series: Materials Science and Engineering, Vol.322, pp.1-5, 2018.

Kabir M R, Onik A R and Samad T, A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach, International Journal of Computer Applications, 166(4), 2017.

M Deepa and Dr P Sumitra, Ramping up Data mining Algorithms for Intrusion Detection, High Technology Letters, Vol. 27, issue .4, pp. 637-643, 2021. doi: https://doi.org/10.37896/HTL27.4/3362

M. Zhang, "Design of Network Intrusion Detection System Based on Data Mining," 2022 International Conference on Electronics and Devices, Computational Science (ICEDCS), Marseille, France, 2022, pp. 460-463, doi: 10.1109/ICEDCS57360.2022.00105.

Mahesh T R, V Vivek, & Vinoth Kumar. (2023). Implementation of Machine Learning-Based Data Mining Techniques for IDS. International Journal of Information Technology, Research and Applications, 2(1), 7–13. https://doi.org/10.59461/ijitra.v2i1.23

Md Nayer & Subhash Chandra Pandey, The ensemble of Ant Colony Optimization and Gradient Descent Technique for Efficient Feature selection and data classification, SCOTA, 2021, BIT, Mesra, Ranchi.

Mohamad Faiz Ahmad, Nor Ashidi Mat Isa, Wei Hong Lim, Koon Meng Ang, Differential evolution: A recent review based on state-of-the-art works, Alexandria Engineering Journal, Volume 61, Issue 5, pp. 3831-3872, 2022

Moshref M, Al Sayyed R, and Al Sharaeh S, Improving the quality of service in wireless sensor networks using an enhanced routing genetic protocol for four objectives. Indonesian Journal of Electrical Engineering and Computer Science, 26(2), pp.1182-1196, 2022

Nishika Gulia, Kamna Solanki, Sandeep Dalal, Amita Dhankhar, Omdev Dahiya, and N Ummal Salmaan (2023), Intrusion Detection System Using the G-ABC with Deep Neural Network in Cloud Environment, Scientific Programming, Volume 2023, Article ID 7210034,https://doi.org/10.1155/2023/7210034

Olson C, Coyle M, and Doster T, A Study of Anomaly Detection Performance as a Function of Relative Spectral Abundances for Graph-and Statisticsbased Detection Algorithms, In Proceedings of International Society for Optics and Photonics on Algorithms and Technologies for Multispectral, Hyperspectral, and Ultraspectral Imagery, pp. 22–33, 2017.

Omar Almoman, A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms, Symmetry 2, 1046, doi:10.3390/sym12061046.

Pajouh H H, Dastghaibyfard G, and Hashemi S, Two-tier Network Anomaly Detection Model: A Machine Learning Approach, Journal of Intelligent Information Systems, 48(1), pp. 61–74, 2017.

Panthong R & Srivihok A, Wrapper Feature Subset Selection for Dimension Reduction Based on Ensemble Learning Algorithm, Procedia - Procedia Computer Science, vol. 72, pp. 162-169, 2015.

Parhizkari S (2024) Anomaly Detection in Intrusion Detection Systems. Artificial Intelligence. IntechOpen. DOI: http://dx.doi.org/10.5772/intechopen.112733.

Reddy N C S, Vemuri P C R, and Govardhan A, Evaluation of PCA and kmeans Algorithm for Efficient Intrusion Detection, International Journal of Applied Engineering Research, 12(12), pp. 3370–3376, 2017.

Satrya GB and Shin SY, Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks, Journal of King Saud University-Computer and Information Sciences, 34(3), pp.706-715, 2022

Shona D & Senthilkumar M, An ensemble data preprocessing approach for intrusion detection system using variant firefly and BkNN techniques, International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 4161-4166, 2016.

T. Soewu, Hemant, M. Rakhra and D. Singh, "Analysis of Data Mining-Based Approach for Intrusion Detection System," 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Uttar Pradesh, India, 2022, pp. 908-912, doi: 10.1109/IC3I56241.2022.10072828.

Thaseen IS & Kumar CA, Intrusion detection model using fusion of chi-square feature selection and multi class SVM, Journal of King Saud University Computer and Information Sciences, vol. 29, no.4, pp. 462-472, 2017.

Thockchom, N., Singh, M.M. & Nandi, U. A novel ensemble learning-based model for network intrusion detection. Complex Intell. Syst. 9, 5693–5714 (2023). https://doi.org/10.1007/s40747-023-01013-7

Van NT, Thinh TN & Sach LT, An anomaly-based network intrusion detection system using Deep learning, International Conference on System Science and Engineering (ICSSE), pp. 210-214, 2017.

Zhu Y, Liang J, Chen J & Ming Z, An improved NSGA-III algorithm for feature selection used in intrusion detection, KnowledgeBased Systems, vol. 116, pp. 74-85, 2017.

Downloads

Published

26.03.2024

How to Cite

G. N. K. Suresh Babu, M. C. . (2024). Intrusion Detection System by Integrating Mod K- Means C Algorithm and T-SNE Dimensionality Reduction. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1534–1545. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5624

Issue

Section

Research Article