A Fine-Grained System Driven of Attacks Over Several New Representation Techniques Using Machine Learning

被引:3
|
作者
Al Ghamdi, Mohammed A. [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Comp Sci Dept, Mecca 24382, Saudi Arabia
来源
IEEE ACCESS | 2023年 / 11卷
关键词
Machine learning; Computational intelligence; Intrusion detection; Neural networks; computational intelligence; intrusion detection system; deep neural network; convolutional neural network; support vector machine;
D O I
10.1109/ACCESS.2023.3307018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) techniques, especially deep learning, are crucial to many contemporary real world systems that use Computational Intelligence (CI) as their core technology, including self-deriving vehicles, assisting machines, and biometric authentication systems. We encounter a lot of attacks these days. Drive-by-download is used to covertly download websites when we view them, and emails we receive often have malicious attachments. The affected hosts and networks sustain significant harm as a result of the infection. Therefore, identifying malware is crucial. Recent attacks, however, is designed to evade detection using Intrusion Detection System (IDS). It is essential to create fresh signatures as soon as new malware is found in order to stop this issue. Using a variety of cutting-edge representation methodologies, we develop attack taxonomy and examine it. 1) N-gram-based representation: In this tactic, we look at a number of random representations that consider a technique of sampling the properties of the graph. 2) Signature-based representation: This technique uses the idea of invariant representation of the graph, which is based on spectral graph theory. One of the main causes is that a ML system setup is rely on a number of variables, including the input dataset, ML architecture, attack creation process, and defense strategy. To find any hostile attacks in the network system, we employ IDS with Deep Neural Network (DNN). In conclusion, the efficacy and efficiency of the suggested framework with Convolutional Neural Network (CNN) and Support Vector Machine (SVM) are assessed using the assessment indicators, including throughput, latency rate, accuracy and precision. The findings of the suggested model with a detection rate of 93%, 14%, 95.63% and 95% in terms of throughput, latency rate, accuracy and precision, which is based on adversarial assault, were better and more effective than CNN and SVM models. Additionally at the end we contrast the performance of the suggested model with that of earlier research that makes use of the same dataset, NSL-KDD, as we do in our scenario.
引用
收藏
页码:96615 / 96625
页数:11
相关论文
共 50 条
  • [31] Analysis on intrusion detection system using machine learning techniques
    Seraphim B.I.
    Poovammal E.
    Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 423 - 441
  • [32] Prediction of Pile Setup for Driven Pipe Piles in Fine-Grained Soils Using Gene Expression Programming
    Alzahrani, Saeed
    Bilgin, Omer
    GEOTECHNICAL AND GEOLOGICAL ENGINEERING, 2023, 41 (06) : 3605 - 3624
  • [33] Machine learning based framework for fine-grained word segmentation and enhanced text normalization for low resourced language
    Nazir, Shahzad
    Asif, Muhammad
    Rehman, Mariam
    Ahmad, Shahbaz
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [34] Optimal Skipping Rates: Training Agents with Fine-Grained Control Using Deep Reinforcement Learning
    Khan, Adil
    Feng, Jiang
    Liu, Shaohui
    Asghar, Muhammad Zubair
    JOURNAL OF ROBOTICS, 2019, 2019
  • [35] Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning
    Tofighi-Shirazi, Ramtine
    Asavoae, Irina Mariuca
    Elbaz-Vincent, Philippe
    PROCEEDINGS OF THE 9TH SOFTWARE SECURITY, PROTECTION, AND REVERSE ENGINEERING WORKSHOP 2019 (SSPREW-9), 2019,
  • [36] Fine-grained Vehicle Recognition Using Lightweight Convolutional Neural Network with Combined Learning Strategy
    Zhang, Qiang
    Zhuo, Li
    Zhang, Shiyu
    Li, Jiafeng
    Zhang, Hui
    Li, Xiaoguang
    2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA BIG DATA (BIGMM), 2018,
  • [37] A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques
    Riera, Tomas Sureda
    Higuera, Juan-Ramoen Bermejo
    Higuera, Javier Bermejo
    Herraiz, Jose-Javier Martinez
    Montalvo, Juan-Antonio Sicilia
    COMPUTERS & SECURITY, 2022, 120
  • [38] Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
    Jasleen Kaur
    Urvashi Garg
    Gourav Bathla
    Artificial Intelligence Review, 2023, 56 : 12725 - 12769
  • [39] Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
    Kaur, Jasleen
    Garg, Urvashi
    Bathla, Gourav
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (11) : 12725 - 12769
  • [40] Investigating the Security Issues of Multi-layer IoT Attacks Using Machine Learning Techniques
    Al Sukhni, Badeea
    Dave, Jugal M.
    Manna, Soumya K.
    Zhang, Leishi
    2022 HUMAN-CENTERED COGNITIVE SYSTEMS, HCCS, 2022, : 24 - 32