Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering

被引:1
|
作者
Ahmed, Usama [1 ]
Nazir, Mohammad [2 ]
Sarwar, Amna [3 ]
Ali, Tariq [4 ]
Aggoune, El-Hadi M. [4 ]
Shahzad, Tariq [5 ]
Khan, Muhammad Adnan [6 ]
机构
[1] Univ Management & Technol, Sch Syst & Technol, Dept Artificial Intelligence, Lahore 54700, Pakistan
[2] Islamia Univ Bahawalpur, Dept Comp Sci & Informat Technol, Bahawalpur, Pakistan
[3] Univ Wah, Dept Comp Sci, Wah Cantt, Pakistan
[4] Univ Tabuk, Artificial Intelligence & Sensing Technol AIST Res, Tabuk 71491, Saudi Arabia
[5] COMSATS Univ Islamabad, Dept Comp Engn, Sahiwal Campus, Sahiwal 57000, Pakistan
[6] Gachon Univ, Fac Artificial Intelligence & Software, Dept Software, Seongnam si 13120, South Korea
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
DETECTION SYSTEM; SECURITY; INTERNET;
D O I
10.1038/s41598-025-85866-7
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Network security is crucial in today's digital world, since there are multiple ongoing threats to sensitive data and vital infrastructure. The aim of this study to improve network security by combining methods for instruction detection from machine learning (ML) and deep learning (DL). Attackers have tried to breach security systems by accessing networks and obtaining sensitive information.Intrusion detection systems (IDSs) are one of the significant aspect of cybersecurity that involve the monitoring and analysis, with the intention of identifying and reporting of dangerous activities that would help to prevent the attack.Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Random Forest (RF), Decision Tree (DT), Long Short-Term Memory (LSTM), and Artificial Neural Network (ANN) are the vector figures incorporated into the study through the results. These models are subjected to various test to established the best results on the identification and prevention of network violation. Based on the obtained results, it can be stated that all the tested models are capable of organizing data originating from network traffic. thus, recognizing the difference between normal and intrusive behaviors, models such as SVM, KNN, RF, and DT showed effective results. Deep learning models LSTM and ANN rapidly find long-term and complex pattern in network data. It is extremely effective when dealing with complex intrusions since it is characterised by high precision, accuracy and recall.Based on our study, SVM and Random Forest are considered promising solutions for real-world IDS applications because of their versatility and explainability. For the companies seeking IDS solutions which are reliable and at the same time more interpretable, these models can be promising. Additionally, LSTM and ANN, with their ability to catch successive conditions, are suitable for situations involving nuanced, advancing dangers.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering (vol 15, 1726, 2025)
    Ahmed, Usama
    Nazir, Mohammad
    Sarwar, Amna
    Ali, Tariq
    Aggoune, El-Hadi M.
    Shahzad, Tariq
    Khan, Muhammad Adnan
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [2] Applying hardware-based machine learning to signature-based network intrusion detection
    Payer, Garrett
    McCormick, Chris
    Harang, Richard
    CYBER SENSING 2014, 2014, 9097
  • [3] Applying hardware-based machine learning to signature-based network intrusion detection
    Payer, Garrett
    McCormick, Chris
    Harang, Richard
    MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VIII, 2014, 9119
  • [4] Machine Learning Architecture for Signature-based IoT Intrusion Detection in Smart Energy Grids
    Yadav, Nikhil
    Truong, Laura
    Troja, Erald
    Aliasgari, Mehrdad
    2022 IEEE 21ST MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (IEEE MELECON 2022), 2022, : 671 - 676
  • [5] Effective intrusion detection model through the combination of a signature-based intrusion detection system and a machine learning-based intrusion detection system
    Weon, Ill-Young
    Song, Doo Heon
    Lee, Chang-Hoon
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (06) : 1447 - 1464
  • [6] Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches
    Karthiga, B.
    Durairaj, Danalakshmi
    Nawaz, Nishad
    Venkatasamy, Thiruppathy Kesavan
    Ramasamy, Gopi
    Hariharasudan, A.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [7] A Study: Machine Learning and Deep Learning Approaches for Intrusion Detection System
    Sekhar, C. H.
    Rao, K. Venkata
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 845 - 849
  • [8] Intrusion Detection Using Machine Learning and Deep Learning Techniques
    Calisir, Sinan
    Atay, Remzi
    Pehlivanoglu, Meltem Kurt
    Duru, Nevcihan
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 656 - 660
  • [9] Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
    Rashid, Azam
    Siddique, Muhammad Jawaid
    Ahmed, Shahid Munir
    2020 3RD INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN COMPUTATIONAL SCIENCES (ICACS), 2020,
  • [10] A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
    Masdari, Mohammad
    Khezri, Hemn
    APPLIED SOFT COMPUTING, 2020, 92 (92)