Javascript must be enabled to continue!
Machine Learning-Based Intrusion Detection Systems (IDS) for real-time cyber threat monitoring
View through CrossRef
The continuous increase of cyberattacks in both frequency and complexity has made the security of the network environment in organizations very vital. Innovative and adaptive attacks are difficult to identify by Traditional Intrusion Detection Systems (IDS). Recent developments in the field of Machine Learning (ML) have paved the way for one such solution — an ML-based Intrusion Detection System (IDS) where anomalies within network traffic can be detected, in real-time, using data-driven algorithms. As network traffic and attack methods increase, so too should the need for a scalable and sustainable IDS that can detect both known and unknown attacks. Machine learning models provide a high level of adaptability and accuracy, which are the cornerstones of modern cybersecurity. Here, we investigate the following three commonly employed machine learning models: Logistic Regression, Gradient Boosting, and Random Forest for the intrusion detection approach. And then, the best one for being used to predict a real-time network traffic monitoring algorithm. Results: The experimental results show that Gradient Boosting and Random Forest outperform Logistic Regression with perfect accuracy, precision, recall and F1-measure. The abilities of these models to classify normal and anomalous traffic are strong and hard to break, with sturdy protection from cyber threats. Of all the different models used, Random Forest proved to be the most accurate and reliable method for real-time intrusion detection. This study reveals the promise of IDS based on machine learning for improving network security with the changing dynamics of cyberattacks.
Title: Machine Learning-Based Intrusion Detection Systems (IDS) for real-time cyber threat monitoring
Description:
The continuous increase of cyberattacks in both frequency and complexity has made the security of the network environment in organizations very vital.
Innovative and adaptive attacks are difficult to identify by Traditional Intrusion Detection Systems (IDS).
Recent developments in the field of Machine Learning (ML) have paved the way for one such solution — an ML-based Intrusion Detection System (IDS) where anomalies within network traffic can be detected, in real-time, using data-driven algorithms.
As network traffic and attack methods increase, so too should the need for a scalable and sustainable IDS that can detect both known and unknown attacks.
Machine learning models provide a high level of adaptability and accuracy, which are the cornerstones of modern cybersecurity.
Here, we investigate the following three commonly employed machine learning models: Logistic Regression, Gradient Boosting, and Random Forest for the intrusion detection approach.
And then, the best one for being used to predict a real-time network traffic monitoring algorithm.
Results: The experimental results show that Gradient Boosting and Random Forest outperform Logistic Regression with perfect accuracy, precision, recall and F1-measure.
The abilities of these models to classify normal and anomalous traffic are strong and hard to break, with sturdy protection from cyber threats.
Of all the different models used, Random Forest proved to be the most accurate and reliable method for real-time intrusion detection.
This study reveals the promise of IDS based on machine learning for improving network security with the changing dynamics of cyberattacks.
Related Results
Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network play important role in real life and cyber security has become a vital in reaearch.An intrusion detection system (IDS)which is important in Network Intrusion Detectyion Sy...
Enhancing Intrusion Detection Systems: A Unified Framework Leveraging User Personality Behavior Analysis to Detect Insider Threats and Social Engineering Attacks through Deep Learning
Enhancing Intrusion Detection Systems: A Unified Framework Leveraging User Personality Behavior Analysis to Detect Insider Threats and Social Engineering Attacks through Deep Learning
Insider threats and social engineering attacks (SEAs) pose significant challenges in cybersecurity (CS), often resulting in data breaches and substantial financial losses. Insider ...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Design and Analysis of an Effective Architecture for Machine Learning Based Intrusion Detection Systems
Design and Analysis of an Effective Architecture for Machine Learning Based Intrusion Detection Systems
The increase in new cyber threats is the result of the rapid growth of using the Internet, thus raising questions about the effectiveness of traditional Intrusion Detection Systems...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...

