Skip to main content

2023 | OriginalPaper | Buchkapitel

Hybrid-Network Intrusion Detection (H-NID) Model Using Machine Learning Techniques (MLTs)

verfasst von : K. R. Pradeep, Arjun S. Gowda, M. Dakshayini

Erschienen in: ICDSMLA 2021

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Providing computer security is one of a significant challenge. Software and its mechanisms have been established to provide the security to avoid intrusion, which includes Intrusion Detection Systems (IDS). IDS helps to detect the exertions to outbreak a network and detect anomalous actions and its activities. It includes the details of uncertainty in probing of different kinds of attacks. IDS demands the need for combination of Machine Learning (ML) methods integrated into a hybrid model. In this paper, the Hybrid Machine Learning (HML) model is proposed that predicts the attacks against the network provided with better performance. The proposed system includes an innovative IDS having good network act helping to perceive the strange attacks, achieved by ML algorithms such as Decision Tree (DT), Naive Bayes (NB), Random Forest (FR), K-Means, and SVM. The algorithms with the good results are used to build a hybrid model. The proposed HML method improves the accurateness and efficiency for detecting the attacks by the IDS system. This research work recommends a system for access within a hybrid model, i.e., Hybrid-Network Intrusion Detection (H-NID) which is a hybrid network combination of DT, K-NN, NB, SVM, and RF to extract temporary and local data of network traffic which advances the accurateness of IDS. The training phase in H-NID uses stage wise approaches to scale out the model. This technique decreases this consequence quantity of unparalleled trials of various attacks on training of model execution. It progresses the strength of training and prediction. Lastly, test of H-NID is done for several types of network traffic from the CICIDS-2017 database as it works on a real network traffic dataset that simulates real-world conditions. The predicted results demonstrate that H-NID got 98.50% of accuracy, and the accuracy for each type of attack remained more than 94.65%, which achieved excellent results in all models. Various rules and restrictions do not work well.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amarasinghe K, Manic M (2018) Improving user trust on deep neural networks based intrusion detection system. In: IECON 2018–44th Annual conference of the IEEE Industrial Electronics Society, October 2018 Amarasinghe K, Manic M (2018) Improving user trust on deep neural networks based intrusion detection system. In: IECON 2018–44th Annual conference of the IEEE Industrial Electronics Society, October 2018
3.
Zurück zum Zitat Vinayakumar R, Soman K, Prabaharan P (2020) Evaluation of recurrent neural network and it's variant for intrusion detection system (IDS) Vinayakumar R, Soman K, Prabaharan P (2020) Evaluation of recurrent neural network and it's variant for intrusion detection system (IDS)
5.
Zurück zum Zitat Manaswi NK (2018) Deep learning with applications using Python, après Manaswi NK (2018) Deep learning with applications using Python, après
6.
Zurück zum Zitat Thing VLL (2017) IEEE 802.11 Network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE wireless communications and networking conference (WCNC). IEEE Thing VLL (2017) IEEE 802.11 Network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE wireless communications and networking conference (WCNC). IEEE
7.
Zurück zum Zitat Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. IEEE Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. IEEE
8.
Zurück zum Zitat Potluri S, Diedrich C (2016) Accelerated deep neural networks for enhanced intrusion detection system. IEEE Potluri S, Diedrich C (2016) Accelerated deep neural networks for enhanced intrusion detection system. IEEE
9.
Zurück zum Zitat Tang TA et al (2018) Deep recurrent neural network for intrusion detection in SDN-based networks. In: 2018 4th IEEE conference on network softwarization and workshops (NetSoft). IEEE Tang TA et al (2018) Deep recurrent neural network for intrusion detection in SDN-based networks. In: 2018 4th IEEE conference on network softwarization and workshops (NetSoft). IEEE
10.
Zurück zum Zitat Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE
11.
12.
Zurück zum Zitat Hassan MM, Gumaei A, Huda S, Ahmad A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Ind Inf 16(9) Hassan MM, Gumaei A, Huda S, Ahmad A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Ind Inf 16(9)
13.
Zurück zum Zitat Khan FA, Gumaei A (2019) A comparative study of machine mlearning classifiers for network intrusion detection. In: Proceedings of the International conference on artificial intelligence and security. New York, NY, USA, pp 75–86 Khan FA, Gumaei A (2019) A comparative study of machine mlearning classifiers for network intrusion detection. In: Proceedings of the International conference on artificial intelligence and security. New York, NY, USA, pp 75–86
14.
Zurück zum Zitat Alqahtani M, Gumaei A, Mathkour M, Maher Ben Ismail M (2019) A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors 19(20):4383 Alqahtani M, Gumaei A, Mathkour M, Maher Ben Ismail M (2019) A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors 19(20):4383
15.
Zurück zum Zitat Derhab A, Guerroumi M, Gumaei A et al (2019) Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors 19(14):3119CrossRef Derhab A, Guerroumi M, Gumaei A et al (2019) Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors 19(14):3119CrossRef
16.
Zurück zum Zitat Nunez JC et al (2018) Convolutional neural networks and long short-term memory for skeleton based human activity and hand gesture recognition. Pattern Recogn 76:80–94 Nunez JC et al (2018) Convolutional neural networks and long short-term memory for skeleton based human activity and hand gesture recognition. Pattern Recogn 76:80–94
17.
Zurück zum Zitat Lin WC, Ke SW, Tsai CF (2015) CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst Lin WC, Ke SW, Tsai CF (2015) CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst
Metadaten
Titel
Hybrid-Network Intrusion Detection (H-NID) Model Using Machine Learning Techniques (MLTs)
verfasst von
K. R. Pradeep
Arjun S. Gowda
M. Dakshayini
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-5936-3_16