全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Machine Learning Models for Heterogenous Network Security Anomaly Detection

DOI: 10.4236/jcc.2024.126004, PP. 38-58

Keywords: Cyber-Security, Network Anomaly Detection, Machine Learning, Random Forest, Decision Tree, Gaussian Naive Bayes

Full-Text   Cite this paper   Add to My Lib

Abstract:

The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptions. Conventional detection approaches face challenges in keeping up with the ever-changing strategies of cyber-attacks, resulting in heightened susceptibility and significant harm to network infrastructures. In order to tackle this urgent issue, this project focused on developing an effective anomaly detection system that utilizes Machine Learning technology. The suggested model utilizes contemporary machine learning algorithms and frameworks to autonomously detect deviations from typical network behaviour. It promptly identifies anomalous activities that may indicate security breaches or performance difficulties. The solution entails a multi-faceted approach encompassing data collection, preprocessing, feature engineering, model training, and evaluation. By utilizing machine learning methods, the model is trained on a wide range of datasets that include both regular and abnormal network traffic patterns. This training ensures that the model can adapt to numerous scenarios. The main priority is to ensure that the system is functional and efficient, with a particular emphasis on reducing false positives to avoid unwanted alerts. Additionally, efforts are directed on improving anomaly detection accuracy so that the model can consistently distinguish between potentially harmful and benign activity. This project aims to greatly strengthen network security by addressing emerging cyber threats and improving their resilience and reliability.

References

[1]  Acharya, T., Khatri, I., Annamalai, A. and Chouikha, M.F. (2021) Efficacy of Heterogeneous Ensemble Assisted Machine Learning Model for Binary and Multi-Class Network Intrusion Detection. Proceedings of the 2021 IEEE International Conference on Automatic Control & Intelligent Systems (I2CACIS), Shah Alam, 26 June 2021, 408-413.
https://doi.org/10.1109/i2cacis52118.2021.9495864
[2]  Calistus, C., Martin, O., Monday, A. and Joe, E. (2023) Discrete Event Simulation-Based Evaluation of a Single-Lane Synchronized Dual-Traffic Light Intersections. Journal of Computer and Communications, 11, 82-100.
https://doi.org/10.4236/jcc.2023.1110006
[3]  Nassif, A.B., Talib, M.A., Nasir, Q. and Dakalbab, F.M. (2021) Machine Learning for Anomaly Detection: A Systematic Review. IEEE Access, 9, 78658-78700.
https://doi.org/10.1109/access.2021.3083060
[4]  Essien, J. (2023) A Synergistic Approach for Enhancing Credit Card Fraud Detection Using Random Forest and Naïve Bayes Models. International Journal of Innovative Science and Research Technology, 8, 2908-2916.
[5]  Elijah, A.V., Abdullah, A., JhanJhi, N.Z., Supramaniam, M. and Abdullateef, B. (2019) Ensemble and Deep-Learning Methods for Two-Class and Multi-Attack Anomaly Intrusion Detection: An Empirical Study. International Journal of Advanced Computer Science and Applications, 10, 520-528.
https://doi.org/10.14569/ijacsa.2019.0100969
[6]  Essien, J. (2023) Dynamic Control and Performance Evaluation of Microcontroller-Based Smart Industrial Heat Extractor. European Journal of Computer Science and Information Technology, 11, 59-74.
https://doi.org/10.37745/ejcsit.2013/vol11n35974
[7]  Inuwa, M.M. and Das, R. (2024) A Comparative Analysis of Various Machine Learning Methods for Anomaly Detection in Cyber Attacks on IoT Networks. Internet of Things, 26, Article 101162.
https://doi.org/10.1016/j.iot.2024.101162
[8]  Essien, J. and Ogharandukun, M. (2023) Neural Network-Based Performance Index Model for Enterprise Goals Simulation and Forecasting. Journal of Computer and Communications, 11, 1-13.
https://doi.org/10.4236/jcc.2023.118001
[9]  Dutta, V., Choraś, M., Pawlicki, M. and Kozik, R. (2020) A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. Sensors, 20, Article 4583.
https://doi.org/10.3390/s20164583
[10]  Mothukuri, V., Khare, P., Parizi, R.M., Pouriyeh, S., Dehghantanha, A. and Srivastava, G. (2022) Federated-Learning-Based Anomaly Detection for IoT Security Attacks. IEEE Internet of Things Journal, 9, 2545-2554.
https://doi.org/10.1109/jiot.2021.3077803
[11]  Essien, J. (2024) Integration of Ultrasonic Range Finder Technology with IoT for Smart Automated Door Control Systems. International Journal of Innovative Science and Research Technology, 8, 2823-2830.
https://www.ijisrt.com/
[12]  Anton, S.D., Kanoor, S., Fraunholz, D. and Schotten, H.D. (2018) Evaluation of Machine Learning-Based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set. Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, 27-30 August 2018, 1-9.
https://doi.org/10.1145/3230833.3232818
[13]  Essien, J. (2023) Enhancing Role-Based Access Control with Embedded Facial Recognition RBAC-EFR System. International Journal of Science and Research, 12, 2767-2774.
https://doi.org/10.21275/SR23625003927
[14]  Kaggle (2024) KDD Cup 1999 Data.
https://www.kaggle.com/datasets/galaxyh/kdd-cup-1999-data
[15]  Bakhshi, T. and Ghita, B. (2021) Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning. Security and Communication Networks, 2021, Article ID: 5363750.
https://doi.org/10.1155/2021/5363750
[16]  Essien, J. and Chimezie, C. (2023) Ultrasonic Sensor-Based Embedded System for Vehicular Collusion Detection and Alert. Journal of Computer and Communications, 11, 44-57.
https://doi.org/10.4236/jcc.2023.118004
[17]  Fernandes, G., Rodrigues, J.J.P.C., Carvalho, L.F., Al-Muhtadi, J.F. and Proença, M.L. (2018) A Comprehensive Survey on Network Anomaly Detection. Telecommunication Systems, 70, 447-489.
https://doi.org/10.1007/s11235-018-0475-8
[18]  Moustafa, N., Hu, J. and Slay, J. (2019) A Holistic Review of Network Anomaly Detection Systems: A Comprehensive Survey. Journal of Network and Computer Applications, 128, 33-55.
https://doi.org/10.1016/j.jnca.2018.12.006
[19]  Essien, J. and Uloko, F. (2023) Intelligent 3-Way Priority-Driven Traffic Light Control System for Emergency Vehicles. Open Journal of Applied Sciences, 13, 1207-1223.
https://doi.org/10.4236/ojapps.2023.138095
[20]  Aldweesh, A., Derhab, A. and Emam, A.Z. (2020) Deep Learning Approaches for Anomaly-Based Intrusion Detection Systems: A Survey, Taxonomy, and Open Issues. Knowledge-Based Systems, 189, Article 105124.
https://doi.org/10.1016/j.knosys.2019.105124
[21]  Ariyaluran Habeeb, R.A., Nasaruddin, F., Gani, A., Targio Hashem, I.A., Ahmed, E. and Imran, M. (2019) Real-Time Big Data Processing for Anomaly Detection: A Survey. International Journal of Information Management, 45, 289-307.
https://doi.org/10.1016/j.ijinfomgt.2018.08.006
[22]  Essien, J. (2023) Application of Branch and Bound and Dynamic Programming in Demand Forecasting for Supply Chain Optimization. International Journal of Science and Research, 12, 2617-2623.
https://doi.org/10.21275/sr23528175430
[23]  Chen, T., Tang, L.-A., Sun, Y., Chen, Z. and Zhang, K. (2016) Entity Embedding-Based Anomaly Detection for Heterogeneous Categorical Events. Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, New York, 9-15 July 2016, 1396-1403.
[24]  Joe, E., Ogharandukun, M., Felix, U. and Ogbonna, C.N. (2023) Ontology-Driven Analytic Models for Pension Management and Decision Support System. Journal of Computer and Communications, 11, 101-119.
[25]  Chalapathy, R. and Chawla, S. (2019) Deep Learning for Anomaly Detection: A Survey. arXiv Preprint arXiv:1901.03407.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133