DOI QR코드

DOI QR Code

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks

  • Received : 2021.04.05
  • Published : 2021.04.30

Abstract

Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.

Keywords

References

  1. Andreea Bendovschi: Cyber-Attacks - Trends, Patterns and Security Countermeasures, Procedia Economics and Finance. Science Direct, 28, 24-31 (2015) https://doi.org/10.1016/S2212-5671(15)01077-1
  2. Nikolov, D., Kordev, I., & Stefanova, S.: Concept for network intrusion detection system based on recurrent neural network classifier. IEEE XXVII International Scientific Conference Electronics - ET, 1-4 (2018)
  3. Chary, K. C.: Data Mining, Intrusion Detection System - A Study. International Journal of Advanced Research in Computer Science, 3(1), 434-437 (2012)
  4. Khammassi Chaouki, Krichen Saoussen: A GA-LR wrapper approach for feature selection in network intrusion detection, In Computers and Security, Elsevier (2017)
  5. Viegas Felipe, Rocha Leonardo, Goncalves Marcos, Mourao Fernando, Sa Giovanni Salles Thiago, Andrade Guilherme, Isac Sandin: A Genetic Programming approach for feature selection in highly dimensional skewed data, In Neurocomputing, Elsevier (2018)
  6. Gauthama Raman M. R., Somu Nivethitha, Kirthivasan Kannan, Liscano Ramiro, Shankar Sriram V. S.: An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine, In Knowledge-Based Systems, Elsevier (2017)
  7. Ariafar Elham, Kiani Rasoul: Intrusion Detection System Using an Optimized Framework Based on Datamining Techniques, In IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI), Iran University of Science and Technology) - Tehran, Iran (2017)
  8. Saxena Aumreesh Ku, Sinha Sitesh, Shukla Piyush: General study of intrusion detection system and survey of agent-based intrusion detection system, In Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA (2017)
  9. Jabbar, M. A., Aluvalu, R., & Reddy, S. S. S.: Intrusion Detection System using Bayesian Network and Feature Subset Selection. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 1-5 (2017)
  10. Mishra, V. P., & Shukla, B.: Development of simulator for intrusion detection system to detect and alarm the DDoS attacks. In 2017 International Conference on Infocom Technologies and Unmanned Systems: Trends and Future Directions, ICTUS, Institute of Electrical and Electronics Engineers Inc. Vol. 2018-January, pp. 803-806 (2018)
  11. Singh, P., & Venkatesan, M.: Hybrid Approach for Intrusion Detection System; Hybrid Approach for Intrusion Detection System. Proceeding of 2018 IEEE International Conference on Current Trends towards Converging Technologies (ICCTCT) (2018)
  12. Mazini, M., Shirazi, B., & Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University - Computer and Information Sciences. King Saud bin Abdulaziz University. (2018)
  13. Balikas, G., & Partalas, I.: On the effectiveness of feature set augmentation using clusters of word embeddings. In CEUR Workshop Proceedings Vol. 2226, 26-32 (2018)
  14. Allam, M., & Nandhini, M.: Optimal feature selection using binary teaching learning-based optimization algorithm. Journal of King Saud University - Computer and Information Sciences. King Saud bin Abdulaziz University (2018)
  15. Makani, R., & Reddy, B. V. R.: Taxonomy of Machine Leaning Based Anomaly Detection and its suitability. In Procedia Computer Science (Vol. 132, pp. 1842-1849). Elsevier B.V. (2018) https://doi.org/10.1016/j.procs.2018.05.133
  16. Lejon, E., Kyosti, P., & Lindstrom, J.: Machine learning for detection of anomalies in press-hardening: Selection of efficient methods. In Procedia CIRP Vol. 72, pp. 1079-1083 (2018) https://doi.org/10.1016/j.procir.2018.03.221
  17. Potharaju Sai Prasad, Sreedevi M.: A Novel Subset Feature Selection Framework for Increasing the Classification Performance of SONAR Targets, In Procedia Computer Science, Elsevier (2018)
  18. Sukumar, J. V. A., Pranav, I., Neetish, M., & Narayanan, J.: Network Intrusion Detection Using Improved Genetic k-means Algorithm. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2441-2446 (2018)
  19. Borkar, A., Donode, A., & Kumari, A.: A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS). In Proceedings of the International Conference on Inventive Computing and Informatics, ICICI 2017, Institute of Electrical and Electronics Engineers Inc. pp. 949-953 (2018)
  20. Knowledge discovery Dataset collected from UCI Repository http://kdd.ics.uci.edu/databases/kddcup99
  21. Hadri, A., Chougdali, K., & Touahni, R.: Intrusion detection system using PCA and Fuzzy PCA techniques. In International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc. (2017)
  22. https://www.mathworks.com/products/matlab.html
  23. Mehmood, T.: Comparative Analysis Of Machine Learning Algorithms In Context Of Intrusion Detection. (2015)