NEW STRATEGIES FOR IMPROVING NETWORK SECURITY AGAINST CYBER ATTACK BASED ON INTELLIGENT ALGORITHMS

Authors

  • Mahmood Zaki Abdullah Computer Engineering Department, Mustansiriyah University, Baghdad, Iraq Author https://orcid.org/0000-0002-3191-3780
  • Ali Khalid Jassim Electrical Engineering Department, Mustansiriyah University, Baghdad, Iraq Author https://orcid.org/0000-0002-4146-4536
  • Fadia Noori Hummadi Biomedical Engineering Department, Al-Khwarizmi College of Engineering, University of Baghdad, Baghdad, Iraq Author https://orcid.org/0000-0002-8179-5305
  • Mohammed Majid M. Al Khalidy Department of Electrical and Electronics, College of Engineering, University of Bahrain, Manama, Bahrain Author https://orcid.org/0000-0002-9723-0405

DOI:

https://doi.org/10.31272/jeasd.28.3.4

Keywords:

Adaptive Boosting, Multi-Step Cyber-Attack Dataset, Cyber-Attacks, Mitigation, Internet Access

Abstract

Gradually, since the number of linked computer systems that use networks linked to the Internet is raised the information that is delivered through those systems becomes more vulnerable to cyber threats. This article presents proposed algorithms based on Machine Learning (ML) that ensure early detection of cyber threats that cause network breaking through the use of the Correlation Ranking Filter feature selection method. These proposed algorithms were applied to the Multi-Step Cyber-Attack Dataset (MSCAD) which consists of 66 features. The proposed strategy will apply machine learning algorithms like Adaptive Boosting-Deep Learning (AdaBoost-Deep Learning) or (ABDL), Multi-Layer Perceptron (MLP), Bayesian Networks Model (BNM), and Random Forest (RF), the feature would be decreased to high valuable of 46 features were included with a threshold of 0.1 or higher. The accuracy would be increased when the no. of features decreased to 46 with a threshold of ≥ 0.1 with the ABDL algorithm producing an accuracy of 99.7076%. The obtained results showed that the proposed algorithm delivered a suitable accuracy of 99.6791% with the ABDL algorithm even with a higher number of features.

Author Biographies

  • Mahmood Zaki Abdullah, Computer Engineering Department, Mustansiriyah University, Baghdad, Iraq

    Computer Engineering Department / Assistant Professor Doctor

  • Ali Khalid Jassim, Electrical Engineering Department, Mustansiriyah University, Baghdad, Iraq

    Electrical Engineering Department, College of Engineering, Mustansiriyah University.

    Assistant Professor Doctor.

  • Fadia Noori Hummadi, Biomedical Engineering Department, Al-Khwarizmi College of Engineering, University of Baghdad, Baghdad, Iraq

    Biomedical Engineering Department / Al-Khwarizmi Collage of Engineering / University of Baghdad.

    Lecturer  

References

Chaloop, S. G., Abdullah, M. Z., Enhancing Hybrid Security Approach Using AES And RSA Algorithms. J. Eng. Sustain. Dev., Vol. 25, Issue 4, pp. 58–66, 2021. https://doi.org/10.31272/jeasd.25.4.6

Sharipuddin S., Winanto E., Purnama B., Kurniabudi K., Stiawan D., Hanapi D., Bin Idris M., Kerim B., and Budiarto R., Enhanced Deep-Learning Intrusion Detection in IoT Heterogeneous Network With Feature-Extraction, Indones. J. Electr. Eng. Informatics, Vol. 9, Issue 3, pp. 747–755, 2021. https://doi.org/10.52549/.V9I3.3134.

Shah, A. H., Miry, A. H., Salman, T. M. Automatic Modulation Classification Using Deep Learning Polar Feature. J. Eng. Sustain. Dev., Vol. 27, Issue 4, pp. 477–486,2023. https://doi.org/10.31272/jeasd.27.4.5

Almseidin, M., Al-Sawwa, J., Alkasassbeh, M. Generating a benchmark cyber multi-step attacks dataset for intrusion detection. J. Intell. Fuzzy Syst., Vol. 43, Issue 3, pp. 3679–3694, 2022. https://doi.org/10.3233/JIFS-213247

Muna, A.-H., Moustafa, N., Sitnikova, E. Identification of malicious activities in industrial Internet of Things based on deep learning models. J. Inf. Secur. Appl., Vol. 41, pp. 1–11, 2018.

https://doi.org/10.1016/j.jisa.2018.05.002

Khan, F. A., Gumaei, A., Derhab, A., Hussain, A. A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access, Vol. 7, pp. 30373–30385, 2019. https://doi.org/0.1109/ACCESS.2019.2899721

Zhng Y., Chen W., Wang Z., Chen Y., Wang K., Li Y., Yin X., Shi X. Yang J., and Li K., A Novel Network Anomaly Detection Model Based on Heterogeneous Ensemble Learning, Comp. Net., vol. 169, 2020. https://doi.org/10.1016/j.comnet.2019.107049

Mohammad R., and Alsmadi, M., Intrusion Detection Using Highest-Wins Feature Selection Algorithm, Neural Computer. Appl., Vol. 33, p. 9805 – 9816, 2021. https://doi.org/10.1007/s00521-021-05745-w

Venkatesan, S. Design an intrusion detection system based on feature selection using ML algorithms. Math. Stat. Eng. Appl., Vol. 72, Issue 1, pp. 702–710. 2023.https://doi.org/10.17762/msea.v72i1.2000

Mwadulo, M., A Review on Feature Selection Methods for Classification Tasks, International Journal of Computer Applications Technology and Research, vol. 5, Issue 6, p. 395–402, 2016. http://dx.doi.org/10.7753/IJCATR0506.1013

Bagaa, M., Taleb, T., Bernabe, J. B., Skarmeta, A. A machine learning security framework for IoT systems. IEEE Access, vol. 8, 114066–114077. 2020. https://doi.org/10.1109/ACCESS.2020.2996214

Sornsuwt P., and Jaiyn S. A New Hybrid Machine Learning for Cyber Security Threat Detection Based on Adaptive Boosting, Applied Artifecial Intelligence, Vol. 33, no.5, p. 462 – 482, 2019. https://doi.org/10.1080/08839514.2019.1582861

Wang M., Lu Y., and Qin J., A Dynamic MLP Based DDoS Attack Detection Method Using Feature Selection and Feedback, Comput. Secur., Vol. 88, 2020. https://doi.org/10.1016/j.cose.2019.101645

Alexander R. Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures, Journal of Information Security, vol. 11, no. 3, 2020. https://doi.org/10.4236/jis.2020.113008

Ahuja N., G. Singal, D. Mukhopadhyay, and N. Kumar, “Automated DDOS attack detection in software defined networking,” J. Netw. Comput. Appl., vol. 187, no. November 2020, p. 103108, 2021. https://doi.org/10.1016/j.jnca.2021.103108.

Joshi, M., Hadi, T. H. A Review of Network Traffic Analysis and Prediction Techniques, 2015. https://doi.org/10.48550/arXiv.1507.05722

Khammas B., Ransomware Detection using Random Forest Technique, ICT Express 6(4):325-331, December 2020. http://dx.doi.org/10.1016/j.icte.2020.11.001

Dhanya K., Sulakshan V., Kartik S., Kumard, T., and Gireesh K., Detection of Network Attacks using Machine Learning and Deep Learning Models, Procedia Computer Science, vol. 218, pp. 57–66, 2023. https://doi.org/10.1016/j.procs.2022.12.401

Zeljko Đ., Classification Model Evaluation Metrics, (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 12, Issue. 6, 2021. https://doi.org/10.14569/IJACSA.2021.0120670

Zaheer A., and Seunghwan M., Enhancing Industrial Cybersecurity, Focusing on Formulating a Practical Strategy for Making Prediction through Machine Learning Tools in Cloud Computing Environment, electronics, 12 (12), 2650, June 2023.https://doi.org/10.3390/electronics12122650

Cavusoglu U., Akgun D., and Hizal S., A Novel Cyber Security Model Using Deep Transfer Learning, Arabian Journal for Science and Engineering vol.49, p. 3623-3632, 2023. http://dx.doi.org/10.1007/s13369-023-08092-1

Elmaghraby R., Aziem N., Sobh M., and Bahaa-Eldin A., Encrypted Network Traffic Classification Based on Machine Learning, Ain Shams Engineering Journal, vol. 15, Issue 2, 2024. https://doi.org/10.1016/j.asej.2023.102361

Talukder A., Islam M., Udin A., Hassan K., Sharmn S., Alyami S., and Moni M., Machine Learning Based Network Intrusion Detection for Big and Imbalanced Data using Oversampling Stacking Feature Embedding and Feature Extraction, Journal of big data, Vol. 11, Article no.33, 2024. https://doi.org/10.1186/s40537-024-00886-w

Downloads

Key Dates

Received

2023-10-27

Revised

2024-03-22

Accepted

2024-04-04

Published Online First

2024-05-01

Published

2024-05-01

How to Cite

NEW STRATEGIES FOR IMPROVING NETWORK SECURITY AGAINST CYBER ATTACK BASED ON INTELLIGENT ALGORITHMS. (2024). Journal of Engineering and Sustainable Development, 28(3), 342-354. https://doi.org/10.31272/jeasd.28.3.4

Similar Articles

1-10 of 188

You may also start an advanced similarity search for this article.