Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Analysis of Network Traffic Intrusion Detection System Using Machine Learning Technique


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v12i2.21724

Abstract


As the internet and communication areas evolve, from Wireless Sensor Networks (WSN) to the Internet of Things (IoT), network intrusions, and assaults become more common. For wireless sensor networks, this research study provides a progressive intrusion detection approach based on machine learning techniques. Wireless network traffic intrusions should be identified, studied, and removed from the network as quickly as possible. The purpose of an Intrusion Detection System (IDS) is to identify and prevent different intrusion attempts in the network and to provide users with a positive and secure connection. Machine learning and related approaches have recently evolved to identify network attacks. The major goal of the proposed study is to use network traffic to identify network intrusions in a smart and efficient manner. The proposed method for detecting network intrusion does not need any extra hardware. In order to protect the network against intrusion, the provided approach is used to guarantee the network's confidentiality and integrity. With other current approaches, the result achieves a greater detection rate.
Copyright © 2022 Praise Worthy Prize - All rights reserved.

Keywords


Internet of Things (IoT); Intrusion Detection System (IDS); Machine Learning Techniques; Network Traffic; Wireless Sensor Networks (WSN)

Full Text:

PDF


References


PrzemyslawKazienko& Piotr Dorosz. Intrusion Detection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture). www.windowsecurity.com › Articles & Tutorials.

I. F. Kilincer, F. Ertam, and A. Sengur, Machine learning methods for cyber security intrusion detection: Datasets and comparative study, Computer Networks, vol. 188, no. Complete, p. , Apr. 2021.
https://doi.org/10.1016/j.comnet.2021.107840

Ahmad, Zeeshan, Adnan Shahid Khan, Cheah Wai Shiang, Johari Abdullah, and Farhan Ahmad. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies 32, no. 1 (2021): e4150.
https://doi.org/10.1002/ett.4150

A. O. Alzahrani and M. J. F. Alenazi, Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks, Future Internet, vol. 13, no. 5, p. 111, Apr. 2021.
https://doi.org/10.3390/fi13050111

Kanimozhi, V., and T. Prem Jacob. Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express 7, no. 3 (2021): 366-370
https://doi.org/10.1016/j.icte.2020.12.004

Di Mauro, Mario, Giovanni Galatro, Giancarlo Fortino, and Antonio Liotta. Supervised feature selection techniques in network intrusion detection: A critical review. Engineering Applications of Artificial Intelligence 101 (2021): 104216
https://doi.org/10.1016/j.engappai.2021.104216

Hajisalem, Vajiheh, and Shahram Babaie. A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Computer Networks 136 (2018): 37-50
https://doi.org/10.1016/j.comnet.2018.02.028

Inayat, Zakira, Abdullah Gani, Nor BadrulAnuar, Muhammad Khurram Khan, and Shahid Anwar. Intrusion response systems: Foundations, design, and challenges. Journal of Network and Computer Applications 62 (2016): 53-74
https://doi.org/10.1016/j.jnca.2015.12.006

Ashoor A.S., Gore S. (2011) Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). In: Wyld D.C., Wozniak M., Chaki N., Meghanathan N., Nagamalai D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg.
https://doi.org/10.1007/978-3-642-22540-6_48

Jabez, Ja, and B. Muthukumar. Intrusion Detection System (IDS): Anomaly detection using outlier detection approach. Procedia Computer Science 48 (2015): 338-346
https://doi.org/10.1016/j.procs.2015.04.191

P. Nayak and B. Vathasavai, Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic, in IEEE Sensors Journal, vol. 17, no. 14, pp. 4492-4499, 15 July15, 2017.
https://doi.org/10.1109/JSEN.2017.2711432

Srividhya, G., R. Nagarajan, and S. Kannadhasan. Enhancement of Clustering Techniques Efficiency for WSN using LEACH Algorithm. Journal of Physics: Conference Series. Vol. 1921. No. 1. IOP Publishing, 2021
https://doi.org/10.1088/1742-6596/1921/1/012013

Ferrag, Mohamed Amine, et al. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications 50 (2020): 102419.
https://doi.org/10.1016/j.jisa.2019.102419

Mohamed Mubarak, T., Sajitha, M., Appa Rao, G., Sattar, S., Secure and Energy Efficient Intrusion Detection in 3D WSN, (2021) International Review on Computers and Software (IRECOS), 16 (2), pp. 53-60.
https://doi.org/10.15866/irecos.v16i2.21544

Ashiku, Lirim, and Cihan Dagli. Network intrusion detection system using deep learning. Procedia Computer Science 185 (2021): 239-247.
https://doi.org/10.1016/j.procs.2021.05.025

Shatnawi, M., Bani Yassein, M., Aljawarneh, S., Alodibat, S., Meqdadi, O., Hmeidi, I., Al Zoubi, O., An Improvement of Neural Network Algorithm for Anomaly Intrusion Detection System, (2020) International Journal on Communications Antenna and Propagation (IRECAP), 10 (2), pp. 84-93.
https://doi.org/10.15866/irecap.v10i2.18735

Saranya, T. & S, Sridevi & Chelliah, C.Deisy & Chung, Tran & Khan, Ahamed. (2020). Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review. Procedia Computer Science. 171. 1251-1260.
https://doi.org/10.1016/j.procs.2020.04.133

Gül, Ö., A Research on Cyber Security Intrusion Detection Against Physical Access Cyber Attacks Using Open Source Software for Smart Grids, (2021) International Review of Electrical Engineering (IREE), 16 (2), pp. 136-146.
https://doi.org/10.15866/iree.v16i2.19174

Agarwal, Arushi, et al. Classification model for accuracy and intrusion detection using machine learning approach. PeerJ Computer Science 7 (2021): e437.
https://doi.org/10.7717/peerj-cs.437

Sarnovsky, Martin, and Jan Paralic. Hierarchical intrusion detection using machine learning and knowledge model. Symmetry 12.2 (2020): 203.
https://doi.org/10.3390/sym12020203

Ramya, G., R. Nagarajan, and S. Kannadhasan. Energy efficient cluster based algorithm technique for wireless sensor networks. IOP Conference Series: Materials Science and Engineering. Vol. 1085. No. 1. IOP Publishing, 2021.
https://doi.org/10.1088/1757-899X/1085/1/012034

Sarhan, Mohanad, Siamak Layeghy, and Marius Portmann. Towards a standard feature set for network intrusion detection system datasets. Mobile Networks and Applications 27.1 (2022): 357-370.
https://doi.org/10.1007/s11036-021-01843-0

Asad, H., Gashi, I. Dynamical analysis of diversity in rule-based open source network intrusion detection systems. Empir Software Eng 27, 4 (2022).
https://doi.org/10.1007/s10664-021-10046-w

Rashid Husain, Dr.Rajan Vohra, A Survey On Machine Learning In Wireless Sensor Networks, International Education and Research Journal (IERJ): Vol. 3 No.1(2017): January Issue, International Education And Research Journal.

Baraneetharan, E. Role of machine learning algorithms intrusion detection in WSNs: a survey. Journal of Information Technology 2.03 (2020): 161-173.
https://doi.org/10.36548/jitdw.2020.3.004

Alheyasat, O., A Hybrid K-Mean and Graph Metrics Algorithm for Node Sleeping Scheduling in Wireless Sensor Network (WSN), (2021) International Journal on Communications Antenna and Propagation (IRECAP), 11 (3), pp. 181-188.
https://doi.org/10.15866/irecap.v11i3.20018

Kaissari, S., El Attaoui, A., Benba, A., Jilbab, A., Bourouhou, A., Kaissari, A., PlanTech: Early Detection of Plant Disease Based on HWSN Using Deep Learning, (2021) International Journal on Engineering Applications (IREA), 9 (3), pp. 162-172.
https://doi.org/10.15866/irea.v9i3.20720


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize