Enhancing Intrusion Detection Effectiveness through the Implementation of Advanced Machine Learning Boosting Strategies

Authors

  • Pulyala Radhika, Geeta Kakarla

Keywords:

Network Intrusion Detection System, IDS, Machine Learning, Cyber Security, Cyber Threats, Ensemble Learning, Firewall Technique, System Vulnerabilities, Network Attacks, Intrusion Detection

Abstract

In the rapidly evolving digital landscape, the increased utilization of networks has given rise to numerous security challenges. With the integration of the digital world into society, the emergence of new threats such as viruses and worms has become prevalent. Malicious actors employ various techniques, including password cracking and detecting unencrypted text, to exploit vulnerabilities within computer systems. Consequently, users must prioritize security measures to safeguard their systems against unauthorized intrusions. One well-established method for protecting private networks from external threats is the firewall technique. Firewalls serve as a protective barrier by filtering incoming Internet traffic. However, certain access methods, such as connecting to the Intranet via a modem within the private network, can evade detection by conventional firewalls. To address this issue, a novel system known as a Network Intrusion Detection System (IDS) has been developed to effectively identify and mitigate network attacks. In this project, an Intrusion Detection System utilizing Machine Learning has been developed to accurately determine the presence of intrusions. Multiple models have been constructed using sklearn and ensemble techniques, resulting in exceptional accuracy. This system serves as a proactive approach to bolster network security and confront the constantly developing spectrum of cyber-attacks.

Downloads

Download data is not yet available.

References

AlOmar, Ban, Zouheir Trabelsi, and Firas Saidi. "Attention-Based Deep Learning Modelling for Intrusion Detection." In European Conference on Cyber Warfare and Security, vol. 22, no. 1, pp. 22-32. 2023.

Alzahrani, AO, Alenazi, MJF. ML-IDSDN: Machine learning based intrusion detection system for software-defined network. Concurrency Computat Pract Exper. 2023; 35 (1): e7438.

M. S. Farooq, S. Abbas, Atta-ur-Rahman, K. Sultan, M. A. Khan et al., "A fused machine learning approach for intrusion detection system," Computers, Materials & Continua, vol. 74, no.2, pp. 2607–2623, 2023.

Chunying Zhang, Donghao Jia, Liya Wang, Wenjie Wang, Fengchun Liu, Aimin Yang, Comparative research on network intrusion detection methods based on machine learning, Computers & Security, Volume 121, 2022, 102861, ISSN 0167-4048.

Gautam Srivastava, Thippa Reddy G, N. Deepa, B. Prabadevi, and Praveen Kumar Reddy M. 2021. An ensemble model for intrusion detection in the Internet of Softwarized Things. In Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking (ICDCN '21). Association for Computing Machinery, New York, NY, USA, 25–30. https://doi.org/10.1145/3427477.3429987

Ployphan Sornsuwit & Saichon Jaiyen (2019) A New Hybrid Machine Learning for Cybersecurity Threat Detection Based on Adaptive Boosting, Applied Artificial Intelligence, 33:5,462-482

Sarker, I.H.; Abushark, Y.B.; Alsolami, F.; Khan, A.I. IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model. Symmetry 2020, 12, 754. https://doi.org/10.3390/sym12050754

Anderson, J. et al. (2019). Unencrypted Text Detection Techniques. Journal of Network Security, 25(3), 45-60.

Smith, J. et al. (2018). Security Challenges in the Digital Era: A Comprehensive Review. International Journal of Cybersecurity Research & Applications, 11(4), 215-230.

Gupta, S., & Kumar, V. (2017). Network Security: Issues and Challenges. International Journal of Network Security & Its Applications, 9(2), 71-88.

Downloads

Published

24.03.2024

How to Cite

Pulyala Radhika. (2024). Enhancing Intrusion Detection Effectiveness through the Implementation of Advanced Machine Learning Boosting Strategies. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 3426–3439. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5978

Issue

Section

Research Article