Open Access Open Access  Restricted Access Subscription or Fee Access

Examining Machine Learning Models Toward Green Network Intrusion Detection


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v13i6.24482

Abstract


Network intrusion detection can affect businesses by protecting sensitive information, reducing the risk of data breaches, and complying with regulations and industry standards. The continuous expansion of the Internet has led to an increase in the number of cyber-attacks, with ransomware and zero-day exploits becoming more prevalent. Despite the usefulness of traditional network security methods, machine learning techniques are becoming more viable candidates in the current security environment owing to their promising results in anomaly identification. The aim of this study is to examine machine learning models for network intrusion detection and provide insights for the development of green and sustainable intrusion detection systems. This was accomplished by implementing a diverse set of supervised learning algorithms on the KDD Cup 99 dataset. Our findings indicate that the random tree and random forest tree outperformed the other algorithms, demonstrating their effectiveness in both intrusion detection and green and sustainable AI.
Copyright © 2023 Praise Worthy Prize - All rights reserved.

Keywords


Machine Learning; Network Intrusions; Supervised Learning; Green and Sustainable AI

Full Text:

PDF


References


R. L. Fante and M. T. McCormack, Reflection properties of the Salisbury screen, in IEEE Transactions on Antennas and Propagation, vol. 36, no. 10, pp. 1443-1454, Oct. 1988.
https://doi.org/10.1109/8.8632

Stephani, E., Nova, F., & Asri, E. Implementation and Analysis of Network Security, IDS (Intrusion Detection System) Using Suricata on a Web Server. JITSI: Jurnal Ilmiah Teknologi Sistem Informasi, Volume 1,2020,No2, Pages 67-74.
https://doi.org/10.30630/jitsi.1.2.10

Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans Emerging Tel Tech. 2021; 32:e4150.
https://doi.org/10.1002/ett.4150

J. Sun, B., & Chen, H, A Survey of K Nearest Neighbor Algorithms for Solving the Class Imbalanced Problem, Wireless Communications and Mobile Computing, 2021.pp-1-12.
https://doi.org/10.1155/2021/5520990

Tornede, T., Tornede, A., Hanselle, J., Mohr, F., Wever, M. and Hüllermeier, E,Towards Green Automated Machine Learning: Status Quo and Future Directions, Journal of Artificial Intelligence Research, Volume 77, pp.427-457,2023.
https://doi.org/10.1613/jair.1.14340

Schweizerische SN. Information, Technology-Security Techniques-Information Security Management Systems-Requirements. ISO/IEC International Standards Organization, 2013.

Puthal, D., Ranjan, R., & Chen, J.Big Data Stream Security Classification for IoT Applications. In Encyclopedia of Big Data Technologies. Springer: Cham, Switzerland, 2019.
https://doi.org/10.1007/978-3-319-77525-8_236

Samonas, S., & Coss, D. The CIA Strikes Back,Redefining Confidentiality, Integrity and Availability in Security. Journal of Information System Security, Volume 10, 2014, No. 3.

Chao-Yang, Z. DOS Attack Analysis and Study of New Measures to Prevent. In 2011 International Conference on Intelligence Science and Information Engineering, 2011, pp. 426-429, IEEE.
https://doi.org/10.1109/ISIE.2011.66

Ko, C., Ruschitzka, M., & Levitt, K. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. In Proceedings IEEE Symposium on Security and Privacy, 1997, pp. 175-187, IEEE.

Niyaz, Q., Sun, W., Javaid, A. Y., & Alam, M. A Deep Learning Approach for Network Intrusion Detection System. In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (Formerly BIONETICS), BICT-15, Vol. 15, 2015, pp. 21-26.

Kumar, S. Survey of Current Network Intrusion Detection Techniques. Washington Univ. in St. Louis, 2007, 1-18.

Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges. Computers & Security, Vol. 28, 2009, pp. 18-28.
https://doi.org/10.1016/j.cose.2008.08.003

Sahu, S., & Mehtre, B. M. Network Intrusion Detection System Using J48 Decision Tree. In International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, pp. 2023-2026, IEEE.
https://doi.org/10.1109/ICACCI.2015.7275914

Bace, R. An Introduction to Intrusion Detection & Assessment, Sams Publishing, 1998.

Brackney, R. Cyber-Intrusion Response. In Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems, 1998, pp. 413-415, IEEE.

Sanyal, S., Das, N., & Sarkar, T. Survey on Host and Network Based Intrusion Detection System. Acta Technica Corviniensis-Bulletin of Engineering, Vol. 8, 2015, No 1.

Al-Asli, M., & Ghaleb, T. A. Review of Signature-Based Techniques in Antivirus Products. In 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-6, IEEE.
https://doi.org/10.1109/ICCISci.2019.8716381

Tumeo, A., Villa, O., & Chavarría-Miranda, D. G. Aho-Corasick String Matching on Shared and Distributed-Memory Parallel Architectures. IEEE Transactions on Parallel and Distributed Systems, Vol. 23, 2011, No 3, pp. 436-443.
https://doi.org/10.1109/TPDS.2011.181

Ingham, K. L., & Somayaji, A.A Methodology for Designing Accurate Anomaly Detection Systems. In Proceedings of the 4th International IFIP/ACM Latin American Conference on Networking, 2007, pp. 139-143.
https://doi.org/10.1145/1384117.1384137

Abdallah-Qasaimeh, B., & Ratté, S.Detecting Depression in Alzheimer's Disease and MCI by Speech Analysis. Journal of Theoretical and Applied Information Technology Vol. 99, 2021, No 5, pp. 1162-1171.

Tom Mitchell. Machine Learning textbook, 1997, McGraw Hill.

Atallah, D. M., Badawy, M., & El-Sayed, A. Intelligent Feature Selection with Modified K-Nearest Neighbor for Kidney Transplantation Prediction. SN Applied Sciences, Vol. 1, 2019, No 1297, pp. 1-17.
https://doi.org/10.1007/s42452-019-1329-z

Kalmegh, S.Analysis of Weka Data Mining Algorithm Reptree, Simple Cart and Randomtree for Classification of Indian News. International Journal of Innovative Science, Engineering & Technology, Vol. 2, 2015, No 2, pp. 438-446

Khan, M. Y., Qayoom, A., Nizami, M. S., Siddiqui, M. S., Wasi, S., & Raazi, S. M. K. U. R. Automated Prediction of Good Dictionary Examples (GDEX): A Comprehensive Experiment with Distant Supervision, Machine Learning, and Word Embedding-Based Deep Learning Techniques. Complexity, 2021, pp. 1-18.
https://doi.org/10.1155/2021/2553199

Xu, X. Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction. International Journal of Web Services Practices, Vol. 2, 2006, No (1-2), pp. 49-58.

El-Sappagh, S., Mohammed, A. S., & AlSheshtawy, T. A.Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set. International Journal of Network Security & Its Applications (IJNSA) Vol, 11, 2019.
https://doi.org/10.5121/ijnsa.2019.11302

Kumar,N., Kumar, U.Artificial Intelligence for Classification and Regression Tree Based Feature Selection Method for Network Intrusion Detection System in Various Telecommunication Technologies. Computational Intelligence, 2022, Wiley.
https://doi.org/10.1111/coin.12500

Taher, K. A., Jisan, B. M. Y., & Rahman, M. M. Network Intrusion Detection Using Supervised Machine Learning Technique with Feature Selection. In 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), 2019, pp. 643-646, IEEE.
https://doi.org/10.1109/ICREST.2019.8644161

Parashar, A., Saggu, K. S., & Garg, A. Machine learning based framework for network intrusion detection system using stacking ensemble technique. Indian Journal of Engineering and Materials Sciences (IJEMS). Vol 29, 2022, No 4
https://doi.org/10.56042/ijems.v29i4.46838

Ikram, S.T., Cherukuri, A.K., Poorva, B., Ushasree, P.S., Zhang, Y., Liu, X. and Li, G. Anomaly Detection Using Xgboost Ensemble of Deep Neural Network Models. Cybernetics and Information Technologies, Vol. 21, 2021, No 3, pp.175-188.
https://doi.org/10.2478/cait-2021-0037

Ejaz, S., Noor, U. and Rashid, Z. Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques. Cybernetics and Information Technologies, Vol. 22, 2022, No 2, pp.96-113.
https://doi.org/10.2478/cait-2022-0019

Van Wynsberghe, A. Sustainable AI: AI for Sustainability and The Sustainability of AI. AI and Ethics, Vol. 1, 2021, No 3, pp.213-218.
https://doi.org/10.1007/s43681-021-00043-6

Vanin, P., Newe, T., Dhirani, L. L., O'Connell, E., O'Shea, D., Lee, B., & Rao, M. A study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning. Applied Sciences, Vol. 12, 2022, No 22, p. 11752.
https://doi.org/10.3390/app122211752

Schwartz, R., Dodge, J., Smith, N.A. and Etzioni, O. Green AI. Communications of the ACM, Vol. 63, 2020, No 12, pp.54-63
https://doi.org/10.1145/3381831

Stolfo, S. J., Fan, W., Lee, W., Prodromidis, A., & Chan, P. K Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM project. In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00 Vol. 2, 2000, pp. 130-144, IEEE.

Ghojogh, B., & Crowley, M. The Theory Behind Overfitting, Cross Validation, Regularization, Bagging, and Boosting: Tutorial. arXiv preprint, 2019, arXiv:1905.12787.

Abdallah, B. Computer Based Technique to Detect Depression in Alzheimer Patients. Master's Dissertation, École de Technologie Supérieure, University of Quebec, 2022, Montreal, Canada.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize