Network Intrusion Detection Model Using Fused Machine Learning Technique

被引:4
作者
Alotaibi, Fahad Mazaed [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh FCITR, Jeddah, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 75卷 / 02期
关键词
Cyberattack; machine learning; prediction; solution; intrusion detection; SYSTEM;
D O I
10.32604/cmc.2023.033792
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the progress of advanced technology in the industrial rev-olution encompassing the Internet of Things (IoT) and cloud computing, cyberattacks have been increasing rapidly on a large scale. The rapid expansion of IoT and networks in many forms generates massive volumes of data, which are vulnerable to security risks. As a result, cyberattacks have become a prevalent and danger to society, including its infrastructures, economy, and citizens' privacy, and pose a national security risk worldwide. Therefore, cyber security has become an increasingly important issue across all levels and sectors. Continuous progress is being made in developing more sophisticated and efficient intrusion detection and defensive methods. As the scale of complexity of the cyber-universe is increasing, advanced machine learning methods are the most appropriate solutions for predicting cyber threats. In this study, a fused machine learning-based intelligent model is proposed to detect intrusion in the early stage and thus secure networks from harmful attacks. Simulation results confirm the effectiveness of the proposed intrusion detection model, with 0.909 accuracy and a miss rate of 0.091.
引用
收藏
页码:2479 / 2490
页数:12
相关论文
共 27 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]  
Akmal R., 2022, INT J COMPUTATIONAL, V1, P69
[3]  
Al Najada H, 2018, 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), P631, DOI 10.1109/SSCI.2018.8628685
[4]   Blind Channel and Data Estimation Using Fuzzy Logic-Empowered Opposite Learning-Based Mutant Particle Swarm Optimization [J].
AsadUllah, Muhammad ;
Khan, Muhammad Adnan ;
Abbas, Sagheer ;
Athar, Atifa ;
Raza, Syed Saqib ;
Ahmad, Gulzar .
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2018, 2018
[5]  
Asif M., 2021, J KING SAUD UNIV-COM
[6]   Intelligent Model Of Ecosystem For Smart Cities Using Artificial Neural Networks [J].
Batool, Tooba ;
Abbas, Sagheer ;
Alhwaiti, Yousef ;
Saleem, Muhammad ;
Ahmad, Munir ;
Asif, Muhammad ;
Elmitwally, Nouh Sabri .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (02) :513-525
[7]   A Survey of Deep Learning Methods for Cyber Security [J].
Berman, Daniel S. ;
Buczak, Anna L. ;
Chavis, Jeffrey S. ;
Corbett, Cherita L. .
INFORMATION, 2019, 10 (04)
[8]   Machine Learning Empowered Software Defect Prediction System [J].
Daoud, Mohammad Sh. ;
Aftab, Shabib ;
Ahmad, Munir ;
Khan, Muhammad Adnan ;
Iqbal, Ahmed ;
Abbas, Sagheer ;
Iqbal, Muhammad ;
Ihnaini, Baha .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (02) :1287-1300
[9]   Blockchain-Based Smart Home Networks Security Empowered with Fused Machine Learning [J].
Farooq, Muhammad Sajid ;
Khan, Safiullah ;
Rehman, Abdur ;
Abbas, Sagheer ;
Khan, Muhammad Adnan ;
Hwang, Seong Oun .
SENSORS, 2022, 22 (12)
[10]   A Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System [J].
Haider, Amir ;
Khan, Muhammad Adnan ;
Rehman, Abdur ;
Rahman, Muhib Ur ;
Kim, Hyung Seok .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (02) :1785-1798