A Fine-Grained System Driven of Attacks Over Several New Representation Techniques Using Machine Learning

被引:3
|
作者
Al Ghamdi, Mohammed A. [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Comp Sci Dept, Mecca 24382, Saudi Arabia
来源
IEEE ACCESS | 2023年 / 11卷
关键词
Machine learning; Computational intelligence; Intrusion detection; Neural networks; computational intelligence; intrusion detection system; deep neural network; convolutional neural network; support vector machine;
D O I
10.1109/ACCESS.2023.3307018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) techniques, especially deep learning, are crucial to many contemporary real world systems that use Computational Intelligence (CI) as their core technology, including self-deriving vehicles, assisting machines, and biometric authentication systems. We encounter a lot of attacks these days. Drive-by-download is used to covertly download websites when we view them, and emails we receive often have malicious attachments. The affected hosts and networks sustain significant harm as a result of the infection. Therefore, identifying malware is crucial. Recent attacks, however, is designed to evade detection using Intrusion Detection System (IDS). It is essential to create fresh signatures as soon as new malware is found in order to stop this issue. Using a variety of cutting-edge representation methodologies, we develop attack taxonomy and examine it. 1) N-gram-based representation: In this tactic, we look at a number of random representations that consider a technique of sampling the properties of the graph. 2) Signature-based representation: This technique uses the idea of invariant representation of the graph, which is based on spectral graph theory. One of the main causes is that a ML system setup is rely on a number of variables, including the input dataset, ML architecture, attack creation process, and defense strategy. To find any hostile attacks in the network system, we employ IDS with Deep Neural Network (DNN). In conclusion, the efficacy and efficiency of the suggested framework with Convolutional Neural Network (CNN) and Support Vector Machine (SVM) are assessed using the assessment indicators, including throughput, latency rate, accuracy and precision. The findings of the suggested model with a detection rate of 93%, 14%, 95.63% and 95% in terms of throughput, latency rate, accuracy and precision, which is based on adversarial assault, were better and more effective than CNN and SVM models. Additionally at the end we contrast the performance of the suggested model with that of earlier research that makes use of the same dataset, NSL-KDD, as we do in our scenario.
引用
收藏
页码:96615 / 96625
页数:11
相关论文
共 50 条
  • [21] Underwater laser micro-milling of fine-grained aluminium and the process modelling by machine learning
    Feng, Wenhe
    Guo, Jiang
    Yan, Wenjin
    Wu, Hu
    Wan, Yin Chi
    Wang, Xincai
    JOURNAL OF MICROMECHANICS AND MICROENGINEERING, 2020, 30 (04)
  • [22] Predicting the performance of radio over free space optics system using machine learning techniques
    Kaur, Sanmukh
    Kaur, Jasleen
    Sharma, Aanchal
    OPTIK, 2023, 281
  • [23] Web Application Attacks Detection Using Machine Learning Techniques
    Betarte, Gustavo
    Martinez, Rodrigo
    Pardo, Alvaro
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1065 - 1072
  • [24] Prediction of soil degree of compaction based on machine learning: a case study of two fine-grained soils
    Ran, Yuling
    Bai, Wei
    Kong, Lingwei
    Fan, Henghui
    Yang, Xiujuan
    Li, Xuemei
    ENGINEERING COMPUTATIONS, 2024, 41 (01) : 46 - 67
  • [25] Handling Intrusion and DDoS Attacks in Software Defined Networks Using Machine Learning Techniques
    Ashraf, Javed
    Latif, Seemab
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 55 - 60
  • [26] Network Forensics Analysis of Cyber Attacks on Computer Systems using Machine Learning Techniques
    Yildiz, Firdevs
    Guel, Batuhan
    Ertam, Fatih
    ACTA INFOLOGICA, 2024, 8 (01): : 34 - 50
  • [27] Detecting false data attacks using machine learning techniques in smart grid: A survey
    Cui, Lei
    Qu, Youyang
    Gao, Longxiang
    Xie, Gang
    Yu, Shui
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 170
  • [28] Machine Learning Techniques to Detect DDoS Attacks on VANET System: A Survey
    Alrehan, Alia Mohammed
    Al-Haidari, Fahd
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [29] A Review on Intrusion Detection System using Machine Learning Techniques
    Musa, Usman Shuaibu
    Chakraborty, Sudeshna
    Abdullahi, Muhammad M.
    Maini, Tarun
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 541 - 549
  • [30] Enhancing Security Attacks Analysis using Regularized Machine Learning Techniques
    Hagos, Desta Haileselassie
    Yazidi, Anis
    Kure, Oivind
    Engelstad, Paal E.
    2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, : 909 - 918