Skip to main content
Top

2023 | OriginalPaper | Chapter

Hybrid-Network Intrusion Detection (H-NID) Model Using Machine Learning Techniques (MLTs)

Authors : K. R. Pradeep, Arjun S. Gowda, M. Dakshayini

Published in: ICDSMLA 2021

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Providing computer security is one of a significant challenge. Software and its mechanisms have been established to provide the security to avoid intrusion, which includes Intrusion Detection Systems (IDS). IDS helps to detect the exertions to outbreak a network and detect anomalous actions and its activities. It includes the details of uncertainty in probing of different kinds of attacks. IDS demands the need for combination of Machine Learning (ML) methods integrated into a hybrid model. In this paper, the Hybrid Machine Learning (HML) model is proposed that predicts the attacks against the network provided with better performance. The proposed system includes an innovative IDS having good network act helping to perceive the strange attacks, achieved by ML algorithms such as Decision Tree (DT), Naive Bayes (NB), Random Forest (FR), K-Means, and SVM. The algorithms with the good results are used to build a hybrid model. The proposed HML method improves the accurateness and efficiency for detecting the attacks by the IDS system. This research work recommends a system for access within a hybrid model, i.e., Hybrid-Network Intrusion Detection (H-NID) which is a hybrid network combination of DT, K-NN, NB, SVM, and RF to extract temporary and local data of network traffic which advances the accurateness of IDS. The training phase in H-NID uses stage wise approaches to scale out the model. This technique decreases this consequence quantity of unparalleled trials of various attacks on training of model execution. It progresses the strength of training and prediction. Lastly, test of H-NID is done for several types of network traffic from the CICIDS-2017 database as it works on a real network traffic dataset that simulates real-world conditions. The predicted results demonstrate that H-NID got 98.50% of accuracy, and the accuracy for each type of attack remained more than 94.65%, which achieved excellent results in all models. Various rules and restrictions do not work well.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Amarasinghe K, Manic M (2018) Improving user trust on deep neural networks based intrusion detection system. In: IECON 2018–44th Annual conference of the IEEE Industrial Electronics Society, October 2018 Amarasinghe K, Manic M (2018) Improving user trust on deep neural networks based intrusion detection system. In: IECON 2018–44th Annual conference of the IEEE Industrial Electronics Society, October 2018
3.
go back to reference Vinayakumar R, Soman K, Prabaharan P (2020) Evaluation of recurrent neural network and it's variant for intrusion detection system (IDS) Vinayakumar R, Soman K, Prabaharan P (2020) Evaluation of recurrent neural network and it's variant for intrusion detection system (IDS)
5.
go back to reference Manaswi NK (2018) Deep learning with applications using Python, après Manaswi NK (2018) Deep learning with applications using Python, après
6.
go back to reference Thing VLL (2017) IEEE 802.11 Network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE wireless communications and networking conference (WCNC). IEEE Thing VLL (2017) IEEE 802.11 Network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE wireless communications and networking conference (WCNC). IEEE
7.
go back to reference Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. IEEE Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. IEEE
8.
go back to reference Potluri S, Diedrich C (2016) Accelerated deep neural networks for enhanced intrusion detection system. IEEE Potluri S, Diedrich C (2016) Accelerated deep neural networks for enhanced intrusion detection system. IEEE
9.
go back to reference Tang TA et al (2018) Deep recurrent neural network for intrusion detection in SDN-based networks. In: 2018 4th IEEE conference on network softwarization and workshops (NetSoft). IEEE Tang TA et al (2018) Deep recurrent neural network for intrusion detection in SDN-based networks. In: 2018 4th IEEE conference on network softwarization and workshops (NetSoft). IEEE
10.
go back to reference Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE
11.
12.
go back to reference Hassan MM, Gumaei A, Huda S, Ahmad A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Ind Inf 16(9) Hassan MM, Gumaei A, Huda S, Ahmad A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Ind Inf 16(9)
13.
go back to reference Khan FA, Gumaei A (2019) A comparative study of machine mlearning classifiers for network intrusion detection. In: Proceedings of the International conference on artificial intelligence and security. New York, NY, USA, pp 75–86 Khan FA, Gumaei A (2019) A comparative study of machine mlearning classifiers for network intrusion detection. In: Proceedings of the International conference on artificial intelligence and security. New York, NY, USA, pp 75–86
14.
go back to reference Alqahtani M, Gumaei A, Mathkour M, Maher Ben Ismail M (2019) A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors 19(20):4383 Alqahtani M, Gumaei A, Mathkour M, Maher Ben Ismail M (2019) A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors 19(20):4383
15.
go back to reference Derhab A, Guerroumi M, Gumaei A et al (2019) Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors 19(14):3119CrossRef Derhab A, Guerroumi M, Gumaei A et al (2019) Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors 19(14):3119CrossRef
16.
go back to reference Nunez JC et al (2018) Convolutional neural networks and long short-term memory for skeleton based human activity and hand gesture recognition. Pattern Recogn 76:80–94 Nunez JC et al (2018) Convolutional neural networks and long short-term memory for skeleton based human activity and hand gesture recognition. Pattern Recogn 76:80–94
17.
go back to reference Lin WC, Ke SW, Tsai CF (2015) CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst Lin WC, Ke SW, Tsai CF (2015) CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst
Metadata
Title
Hybrid-Network Intrusion Detection (H-NID) Model Using Machine Learning Techniques (MLTs)
Authors
K. R. Pradeep
Arjun S. Gowda
M. Dakshayini
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-5936-3_16

Premium Partner