全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Optimizing Network Security via Ensemble Learning: A Nexus with Intrusion Detection

DOI: 10.4236/jis.2024.154030, PP. 545-556

Keywords: Machine Learning, Cyber-Security, Data Preprocessing, Model Training

Full-Text   Cite this paper   Add to My Lib

Abstract:

Network intrusion detection systems need to be updated due to the rise in cyber threats. In order to improve detection accuracy, this research presents a strong strategy that makes use of a stacked ensemble method, which combines the advantages of several machine learning models. The ensemble is made up of various base models, such as Decision Trees, K-Nearest Neighbors (KNN), Multi-Layer Perceptrons (MLP), and Naive Bayes, each of which offers a distinct perspective on the properties of the data. The research adheres to a methodical workflow that begins with thorough data preprocessing to guarantee the accuracy and applicability of the data. In order to extract useful attributes from network traffic data—which are essential for efficient model training—feature engineering is used. The ensemble approach combines these models by training a Logistic Regression model meta-learner on base model predictions. In addition to increasing prediction accuracy, this tiered approach helps get around the drawbacks that come with using individual models. High accuracy, precision, and recall are shown in the model’s evaluation of a network intrusion dataset, indicating the model’s efficacy in identifying malicious activity. Cross-validation is used to make sure the models are reliable and well-generalized to new, untested data. In addition to advancing cybersecurity, the research establishes a foundation for the implementation of flexible and scalable intrusion detection systems. This hybrid, stacked ensemble model has a lot of potential for improving cyberattack prevention, lowering the likelihood of cyberattacks, and offering a scalable solution that can be adjusted to meet new threats and technological advancements.

References

[1]  Moustafa, N., Turnbull, B. and Choo, K.R. (2019) An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things. IEEE Internet of Things Journal, 6, 4815-4830.
https://doi.org/10.1109/jiot.2018.2871719
[2]  Kambe, T. (2007) Elementary Fluid Mechanics. World Scientific Publishing Co. Pte. Ltd.
https://doi.org/10.1142/9789812706676
[3]  Kambe, T. (2010) A New Formulation of Equations of Compressible Fluids by Analogy with Maxwell’s Equations. Fluid Dynamics Research, 42, Article ID: 055502.
https://doi.org/10.1088/0169-5983/42/5/055502
[4]  Penchala, S., Murad, S.A., Roy, I., Gupta, B. and Rahimi, N. (2024) Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms. Proceedings of 39th International Conference on Computers and Their Applications, 98, 103-115.
https://doi.org/10.29007/lsgw
[5]  Kambe, T. (1984) Axisymmetric Vortex Solution of Navier-Stokes Equation. Journal of the Physical Society of Japan, 53, 13-15.
https://doi.org/10.1143/jpsj.53.13
[6]  Murad, S.A., Rahimi, N. and Md Muzahid, A.J. (2023) PhishGuard: Machine Learning-Powered Phishing URL Detection. 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), Las Vegas, 24-27 July 2023, 2279-2284.
https://doi.org/10.1109/csce60160.2023.00371
[7]  Ladyzhenskaya, O. (1969) The Mathematical Theory of Viscous Incompressible Flow, Translated from the Russian by Richard A. Silverman, Mathematics and Its Applications. 2nd Edition, Gordon and Breach.
[8]  Galdi, G.P. (2011) An Introduction to the Mathematical Theory of the Navier-Stokes Equations. Springer.
[9]  Gautam, A. and Rahimi, N. (2023) Viability of Machine Learning in Android Scareware Detection. Proceedings of 38th International Conference on Computers and Their Applications, 91, 19-26.
https://doi.org/10.29007/n5ft
[10]  Majda, A.J. and Bertozzi, A.L. (2001) Vorticity and Incompressible Flow. Cambridge University Press.
https://doi.org/10.1017/cbo9780511613203
[11]  Broome, H., Shrestha, Y., Harrison, N. and Rahimi, N. (2022) SMS Malware Detection: A Machine Learning Approach. 2022 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, 14-16 December 2022, 936-941.
https://doi.org/10.1109/csci58124.2022.00167
[12]  Tao, T. (2015) Finite Time Blowup for an Averaged Three-Dimensional Navier-Stokes Equation. Journal of the American Mathematical Society, 29, 601-674.
https://doi.org/10.1090/jams/838
[13]  Constantin, P. and Fefferman, C. (1993) Direction of Vorticity and the Problem of Global Regularity for the Navier-Stokes Equations. Indiana University Mathematics Journal, 42, 775-789.
https://doi.org/10.1512/iumj.1993.42.42034
[14]  Constantin, P. (1990) Navier-Stokes Equations and Area of Interfaces. Communications in Mathematical Physics, 129, 241-266.
https://doi.org/10.1007/bf02096982

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133