Network security attack classification: leveraging machine learning methods for enhanced detection and defence

被引:0
作者
Kandhro, Irfan Ali [1 ]
Panhwar, Ali Orangzeb [2 ]
Awan, Shafique Ahmed [3 ]
Larik, Raja Sohail Ahmed [4 ]
Abro, Abdul Ahad [5 ]
机构
[1] Sindh Madressatul Islam Univ, Dept Comp Sci, Karachi, Sindh, Pakistan
[2] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol, Dept Comp Sci, Gharo Sindh, Pakistan
[3] Benazir Bhutto Shaheed Univ, Dept Comp Sci & IT, Lyari Karachi, Pakistan
[4] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[5] Iqra Univ, Fac Engn Sci & Technol, Dept Comp Sci, Karachi, Pakistan
关键词
attacks classification; network security; cyber security; machine learning; adversarial attacks;
D O I
10.1504/IJESDF.2025.10062253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth and advancement of information exchange over the internet and mobile technologies have resulted in a significant increase in malicious network attacks. Machine learning (ML) algorithms have emerged as crucial tools in network security for accurately classifying and detecting these attacks, enabling effective defence strategies. In this paper, we employed ML methods such as logistic regression (LG), random forest (RF), decision tree (DT), k-nearest neighbours (KNN), and support vector machines (SVM) for building an intrusion detection system using the publicly available NSL-KDD dataset. Our proposed method utilised feature engineering and selection techniques to extract relevant features. We trained classification models and optimised their parameters using cross-validation and grid search techniques. The models exhibited robustness in identifying unseen attacks, enabling proactive defence strategies. In this paper, we contribute to the field of network security by showcasing the efficacy of machine learning methods, empowering organisations to enhance their defences and respond to threats promptly. Future research can explore advanced models and real-time monitoring techniques to develop dynamic defence mechanisms.
引用
收藏
页数:12
相关论文
共 26 条
[1]  
Al-Mhiqani M.N., 2019, International Journal of Internet Technology and Secured Transactions, V9, P282, DOI DOI 10.1504/IJITST.2019.101827
[2]  
Al-Naymat Ghazi, 2018, International Journal of Wireless and Mobile Computing, V15, P67
[3]   Network Intrusion Detection Leveraging Machine Learning and Feature Selection [J].
Ali, Arshid ;
Shaukat, Shahtaj ;
Tayyab, Muhammad ;
Khan, Muazzam A. ;
Khan, Jan Sher ;
Arshad ;
Ahmad, Jawad .
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON SMART COMMUNITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEEHONET 2020), 2020, :49-53
[4]   A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security [J].
Ali, Munwar ;
Jung, Low Tang ;
Sodhro, Ali Hassan ;
Laghari, Asif Ali ;
Belhaouari, Samir Birahim ;
Gillani, Zeeshan .
ALEXANDRIA ENGINEERING JOURNAL, 2023, 64 :749-760
[5]  
Chapman S, 2017, J SENS ACTUAR NETW, V6, DOI 10.3390/jsan6030016
[6]  
Chen L., 2020, Computers & Security, V92
[7]   Fog computing security: A review [J].
Jumani, Awais Khan ;
Shi, Jinglun ;
Laghari, Asif Ali ;
Hu, Zhihui ;
ul Nabi, Aftab ;
Qian, Huang .
SECURITY AND PRIVACY, 2023, 6 (06)
[8]  
Khan A.A., 2021, Security Issues and Privacy Concerns in Industry 4.0 Applications, P15
[9]   Data Security in Healthcare Industrial Internet of Things With Blockchain [J].
Khan, Abdullah Ayub ;
Bourouis, Sami ;
Kamruzzaman, M. M. ;
Hadjouni, Myriam ;
Shaikh, Zaffar Ahmed ;
Laghari, Asif Ali ;
Elmannai, Hela ;
Dhahbi, Sami .
IEEE SENSORS JOURNAL, 2023, 23 (20) :25144-25151
[10]   Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review [J].
Khan, Abdullah Ayub ;
Laghari, Asif Ali ;
Shaikh, Zaffar Ahmed ;
Dacko-Pikiewicz, Zdzislawa ;
Kot, Sebastian .
IEEE ACCESS, 2022, 10 :122679-122695