NEW STRATEGIES FOR IMPROVING NETWORK SECURITY AGAINST CYBER ATTACK BASED ON INTELLIGENT ALGORITHMS
DOI:
https://doi.org/10.31272/jeasd.28.3.4Keywords:
Adaptive Boosting, Multi-Step Cyber-Attack Dataset, Cyber-Attacks, Mitigation, Internet AccessAbstract
Gradually, since the number of linked computer systems that use networks linked to the Internet is raised the information that is delivered through those systems becomes more vulnerable to cyber threats. This article presents proposed algorithms based on Machine Learning (ML) that ensure early detection of cyber threats that cause network breaking through the use of the Correlation Ranking Filter feature selection method. These proposed algorithms were applied to the Multi-Step Cyber-Attack Dataset (MSCAD) which consists of 66 features. The proposed strategy will apply machine learning algorithms like Adaptive Boosting-Deep Learning (AdaBoost-Deep Learning) or (ABDL), Multi-Layer Perceptron (MLP), Bayesian Networks Model (BNM), and Random Forest (RF), the feature would be decreased to high valuable of 46 features were included with a threshold of 0.1 or higher. The accuracy would be increased when the no. of features decreased to 46 with a threshold of ≥ 0.1 with the ABDL algorithm producing an accuracy of 99.7076%. The obtained results showed that the proposed algorithm delivered a suitable accuracy of 99.6791% with the ABDL algorithm even with a higher number of features.
References
Chaloop, S. G., Abdullah, M. Z., Enhancing Hybrid Security Approach Using AES And RSA Algorithms. J. Eng. Sustain. Dev., Vol. 25, Issue 4, pp. 58–66, 2021. https://doi.org/10.31272/jeasd.25.4.6
Sharipuddin S., Winanto E., Purnama B., Kurniabudi K., Stiawan D., Hanapi D., Bin Idris M., Kerim B., and Budiarto R., Enhanced Deep-Learning Intrusion Detection in IoT Heterogeneous Network With Feature-Extraction, Indones. J. Electr. Eng. Informatics, Vol. 9, Issue 3, pp. 747–755, 2021. https://doi.org/10.52549/.V9I3.3134.
Shah, A. H., Miry, A. H., Salman, T. M. Automatic Modulation Classification Using Deep Learning Polar Feature. J. Eng. Sustain. Dev., Vol. 27, Issue 4, pp. 477–486,2023. https://doi.org/10.31272/jeasd.27.4.5
Almseidin, M., Al-Sawwa, J., Alkasassbeh, M. Generating a benchmark cyber multi-step attacks dataset for intrusion detection. J. Intell. Fuzzy Syst., Vol. 43, Issue 3, pp. 3679–3694, 2022. https://doi.org/10.3233/JIFS-213247
Muna, A.-H., Moustafa, N., Sitnikova, E. Identification of malicious activities in industrial Internet of Things based on deep learning models. J. Inf. Secur. Appl., Vol. 41, pp. 1–11, 2018.
https://doi.org/10.1016/j.jisa.2018.05.002
Khan, F. A., Gumaei, A., Derhab, A., Hussain, A. A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access, Vol. 7, pp. 30373–30385, 2019. https://doi.org/0.1109/ACCESS.2019.2899721
Zhng Y., Chen W., Wang Z., Chen Y., Wang K., Li Y., Yin X., Shi X. Yang J., and Li K., A Novel Network Anomaly Detection Model Based on Heterogeneous Ensemble Learning, Comp. Net., vol. 169, 2020. https://doi.org/10.1016/j.comnet.2019.107049
Mohammad R., and Alsmadi, M., Intrusion Detection Using Highest-Wins Feature Selection Algorithm, Neural Computer. Appl., Vol. 33, p. 9805 – 9816, 2021. https://doi.org/10.1007/s00521-021-05745-w
Venkatesan, S. Design an intrusion detection system based on feature selection using ML algorithms. Math. Stat. Eng. Appl., Vol. 72, Issue 1, pp. 702–710. 2023.https://doi.org/10.17762/msea.v72i1.2000
Mwadulo, M., A Review on Feature Selection Methods for Classification Tasks, International Journal of Computer Applications Technology and Research, vol. 5, Issue 6, p. 395–402, 2016. http://dx.doi.org/10.7753/IJCATR0506.1013
Bagaa, M., Taleb, T., Bernabe, J. B., Skarmeta, A. A machine learning security framework for IoT systems. IEEE Access, vol. 8, 114066–114077. 2020. https://doi.org/10.1109/ACCESS.2020.2996214
Sornsuwt P., and Jaiyn S. A New Hybrid Machine Learning for Cyber Security Threat Detection Based on Adaptive Boosting, Applied Artifecial Intelligence, Vol. 33, no.5, p. 462 – 482, 2019. https://doi.org/10.1080/08839514.2019.1582861
Wang M., Lu Y., and Qin J., A Dynamic MLP Based DDoS Attack Detection Method Using Feature Selection and Feedback, Comput. Secur., Vol. 88, 2020. https://doi.org/10.1016/j.cose.2019.101645
Alexander R. Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures, Journal of Information Security, vol. 11, no. 3, 2020. https://doi.org/10.4236/jis.2020.113008
Ahuja N., G. Singal, D. Mukhopadhyay, and N. Kumar, “Automated DDOS attack detection in software defined networking,” J. Netw. Comput. Appl., vol. 187, no. November 2020, p. 103108, 2021. https://doi.org/10.1016/j.jnca.2021.103108.
Joshi, M., Hadi, T. H. A Review of Network Traffic Analysis and Prediction Techniques, 2015. https://doi.org/10.48550/arXiv.1507.05722
Khammas B., Ransomware Detection using Random Forest Technique, ICT Express 6(4):325-331, December 2020. http://dx.doi.org/10.1016/j.icte.2020.11.001
Dhanya K., Sulakshan V., Kartik S., Kumard, T., and Gireesh K., Detection of Network Attacks using Machine Learning and Deep Learning Models, Procedia Computer Science, vol. 218, pp. 57–66, 2023. https://doi.org/10.1016/j.procs.2022.12.401
Zeljko Đ., Classification Model Evaluation Metrics, (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 12, Issue. 6, 2021. https://doi.org/10.14569/IJACSA.2021.0120670
Zaheer A., and Seunghwan M., Enhancing Industrial Cybersecurity, Focusing on Formulating a Practical Strategy for Making Prediction through Machine Learning Tools in Cloud Computing Environment, electronics, 12 (12), 2650, June 2023.https://doi.org/10.3390/electronics12122650
Cavusoglu U., Akgun D., and Hizal S., A Novel Cyber Security Model Using Deep Transfer Learning, Arabian Journal for Science and Engineering vol.49, p. 3623-3632, 2023. http://dx.doi.org/10.1007/s13369-023-08092-1
Elmaghraby R., Aziem N., Sobh M., and Bahaa-Eldin A., Encrypted Network Traffic Classification Based on Machine Learning, Ain Shams Engineering Journal, vol. 15, Issue 2, 2024. https://doi.org/10.1016/j.asej.2023.102361
Talukder A., Islam M., Udin A., Hassan K., Sharmn S., Alyami S., and Moni M., Machine Learning Based Network Intrusion Detection for Big and Imbalanced Data using Oversampling Stacking Feature Embedding and Feature Extraction, Journal of big data, Vol. 11, Article no.33, 2024. https://doi.org/10.1186/s40537-024-00886-w
Downloads
Key Dates
Received
Revised
Accepted
Published Online First
Published
Issue
Section
License
Copyright (c) 2024 Mahmood Zaki Abdullah, Assist. Prof. Dr. Ali Khalid Jassim, Lecturer Fadia Noori Hummadi (Author)
This work is licensed under a Creative Commons Attribution 4.0 International License.