Enhancing Intrusion Detection Effectiveness through the Implementation of Advanced Machine Learning Boosting Strategies
Keywords:
Network Intrusion Detection System, IDS, Machine Learning, Cyber Security, Cyber Threats, Ensemble Learning, Firewall Technique, System Vulnerabilities, Network Attacks, Intrusion DetectionAbstract
In the rapidly evolving digital landscape, the increased utilization of networks has given rise to numerous security challenges. With the integration of the digital world into society, the emergence of new threats such as viruses and worms has become prevalent. Malicious actors employ various techniques, including password cracking and detecting unencrypted text, to exploit vulnerabilities within computer systems. Consequently, users must prioritize security measures to safeguard their systems against unauthorized intrusions. One well-established method for protecting private networks from external threats is the firewall technique. Firewalls serve as a protective barrier by filtering incoming Internet traffic. However, certain access methods, such as connecting to the Intranet via a modem within the private network, can evade detection by conventional firewalls. To address this issue, a novel system known as a Network Intrusion Detection System (IDS) has been developed to effectively identify and mitigate network attacks. In this project, an Intrusion Detection System utilizing Machine Learning has been developed to accurately determine the presence of intrusions. Multiple models have been constructed using sklearn and ensemble techniques, resulting in exceptional accuracy. This system serves as a proactive approach to bolster network security and confront the constantly developing spectrum of cyber-attacks.
Downloads
References
AlOmar, Ban, Zouheir Trabelsi, and Firas Saidi. "Attention-Based Deep Learning Modelling for Intrusion Detection." In European Conference on Cyber Warfare and Security, vol. 22, no. 1, pp. 22-32. 2023.
Alzahrani, AO, Alenazi, MJF. ML-IDSDN: Machine learning based intrusion detection system for software-defined network. Concurrency Computat Pract Exper. 2023; 35 (1): e7438.
M. S. Farooq, S. Abbas, Atta-ur-Rahman, K. Sultan, M. A. Khan et al., "A fused machine learning approach for intrusion detection system," Computers, Materials & Continua, vol. 74, no.2, pp. 2607–2623, 2023.
Chunying Zhang, Donghao Jia, Liya Wang, Wenjie Wang, Fengchun Liu, Aimin Yang, Comparative research on network intrusion detection methods based on machine learning, Computers & Security, Volume 121, 2022, 102861, ISSN 0167-4048.
Gautam Srivastava, Thippa Reddy G, N. Deepa, B. Prabadevi, and Praveen Kumar Reddy M. 2021. An ensemble model for intrusion detection in the Internet of Softwarized Things. In Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking (ICDCN '21). Association for Computing Machinery, New York, NY, USA, 25–30. https://doi.org/10.1145/3427477.3429987
Ployphan Sornsuwit & Saichon Jaiyen (2019) A New Hybrid Machine Learning for Cybersecurity Threat Detection Based on Adaptive Boosting, Applied Artificial Intelligence, 33:5,462-482
Sarker, I.H.; Abushark, Y.B.; Alsolami, F.; Khan, A.I. IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model. Symmetry 2020, 12, 754. https://doi.org/10.3390/sym12050754
Anderson, J. et al. (2019). Unencrypted Text Detection Techniques. Journal of Network Security, 25(3), 45-60.
Smith, J. et al. (2018). Security Challenges in the Digital Era: A Comprehensive Review. International Journal of Cybersecurity Research & Applications, 11(4), 215-230.
Gupta, S., & Kumar, V. (2017). Network Security: Issues and Challenges. International Journal of Network Security & Its Applications, 9(2), 71-88.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.