Network security attack classification: leveraging machine learning methods for enhanced detection and defence

被引:0
作者
Kandhro, Irfan Ali [1 ]
Panhwar, Ali Orangzeb [2 ]
Awan, Shafique Ahmed [3 ]
Larik, Raja Sohail Ahmed [4 ]
Abro, Abdul Ahad [5 ]
机构
[1] Sindh Madressatul Islam Univ, Dept Comp Sci, Karachi, Sindh, Pakistan
[2] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol, Dept Comp Sci, Gharo Sindh, Pakistan
[3] Benazir Bhutto Shaheed Univ, Dept Comp Sci & IT, Lyari Karachi, Pakistan
[4] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[5] Iqra Univ, Fac Engn Sci & Technol, Dept Comp Sci, Karachi, Pakistan
关键词
attacks classification; network security; cyber security; machine learning; adversarial attacks;
D O I
10.1504/IJESDF.2025.10062253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth and advancement of information exchange over the internet and mobile technologies have resulted in a significant increase in malicious network attacks. Machine learning (ML) algorithms have emerged as crucial tools in network security for accurately classifying and detecting these attacks, enabling effective defence strategies. In this paper, we employed ML methods such as logistic regression (LG), random forest (RF), decision tree (DT), k-nearest neighbours (KNN), and support vector machines (SVM) for building an intrusion detection system using the publicly available NSL-KDD dataset. Our proposed method utilised feature engineering and selection techniques to extract relevant features. We trained classification models and optimised their parameters using cross-validation and grid search techniques. The models exhibited robustness in identifying unseen attacks, enabling proactive defence strategies. In this paper, we contribute to the field of network security by showcasing the efficacy of machine learning methods, empowering organisations to enhance their defences and respond to threats promptly. Future research can explore advanced models and real-time monitoring techniques to develop dynamic defence mechanisms.
引用
收藏
页数:12
相关论文
共 26 条
[11]   IoT with Multimedia Investigation: A Secure Process of Digital Forensics Chain-of-Custody using Blockchain Hyperledger Sawtooth [J].
Khan, Abdullah Ayub ;
Shaikh, Aftab Ahmed ;
Laghari, Asif Ali .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (08) :10173-10188
[12]   INTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence [J].
Koloveas, Paris ;
Chantzios, Thanasis ;
Alevizopoulou, Sofia ;
Skiadopoulos, Spiros ;
Tryfonopoulos, Christos .
ELECTRONICS, 2021, 10 (07)
[13]   A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System [J].
Li, Peng ;
Laghari, Asif Ali ;
Rashid, Mamoon ;
Gao, Jing ;
Gadekallu, Thippa Reddy ;
Javed, Abdul Rehman ;
Yin, Shoulin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :693-702
[14]   Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification [J].
McCarthy, Andrew ;
Ghadafi, Essam ;
Andriotis, Panagiotis ;
Legg, Phil .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
[15]   Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques [J].
Mihoub, Alaeddine ;
Ben Fredj, Ouissem ;
Cheikhrouhou, Omar ;
Derhab, Abdelouahid ;
Krichen, Moez .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
[16]   A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks [J].
Mohmand, Muhammad Ismail ;
Hussain, Hameed ;
Khan, Ayaz Ali ;
Ullah, Ubaid ;
Zakarya, Muhammad ;
Ahmed, Aftab ;
Raza, Mushtaq ;
Rahman, Izaz Ur ;
Haleem, Muhammad .
IEEE ACCESS, 2022, 10 :21443-21454
[17]   Survey on Wireless Network Security [J].
Nazir, Rashid ;
Laghari, Asif Ali ;
Kumar, Kamlesh ;
David, Shibin ;
Ali, Munwar .
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (03) :1591-1610
[18]  
Rege M., 2018, Data Analytics, V83
[19]   Feature extraction for machine learning-based intrusion detection in IoT networks [J].
Sarhan, Mohanad ;
Layeghy, Siamak ;
Moustafa, Nour ;
Gallagher, Marcus ;
Portmann, Marius .
DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (01) :205-216
[20]  
Sen S., 2020, P INT JOINT C COMP I