Javascript must be enabled to continue!
Network Intrusion Detection System Using Machine Learning
View through CrossRef
Abstract - This document discusses the creation of an intelligent Network Intrusion Detection System (NIDS) using Machine Learning (ML) for improved security of computer networks. This report presents the concept for using ML techniques, which provide a solution to conventional detection methods that utilize signatures, as traditional signature-based detection methods are often incapable of detecting new or zero-day attacks. Thus, adaptive data driven methods should be employed. The system will accurately monitor and analyze incoming and outgoing traffic on the network so that each piece of traffic can be effectively classified as either normal or malicious; malicious traffic will be classified into one of four attack types, which are: Denial of Service (DoS), Probe, Remote to Local (R2L), and User to Root (U2R). The model will utilize the NSL-KDD benchmark dataset, along with a multitude of data preprocessing steps (i.e., Categorical Encoding, scaling features, etc.) in order to maximize the effectiveness of the model. Additionally, numerous ML classification algorithms (i.e., Random Forest, Decision Tree, Support Vector Machine (SVM) and K-Nearest Neighbor (KNN)) will be analyzed to determine high performance algorithms. Based upon accuracy, precision, recall and F1 score, the Random Forest classification algorithm would be the best performing algorithm. The system includes an email alerting function to notify the network administrator immediately when a critical intrusion is detected, thus enabling the network administrator to respond rapidly to the incident. Overall results indicate that the proposed ML-based NIDS is capable of detecting a significantly higher percentage of intrusions while simultaneously producing a lower percentage of false positives than traditional rule-based methods. The findings indicate that artificial intelligence can play a critical role in the protection of modern network infrastructures against more sophisticated cyber threats.
Key Words: Network Intrusion Detection System, Machine Learning, NSL-KDD Dataset, Random Forest, Cybersecurity
Edtech Publishers (OPC) Private Limited
Title: Network Intrusion Detection System Using Machine Learning
Description:
Abstract - This document discusses the creation of an intelligent Network Intrusion Detection System (NIDS) using Machine Learning (ML) for improved security of computer networks.
This report presents the concept for using ML techniques, which provide a solution to conventional detection methods that utilize signatures, as traditional signature-based detection methods are often incapable of detecting new or zero-day attacks.
Thus, adaptive data driven methods should be employed.
The system will accurately monitor and analyze incoming and outgoing traffic on the network so that each piece of traffic can be effectively classified as either normal or malicious; malicious traffic will be classified into one of four attack types, which are: Denial of Service (DoS), Probe, Remote to Local (R2L), and User to Root (U2R).
The model will utilize the NSL-KDD benchmark dataset, along with a multitude of data preprocessing steps (i.
e.
, Categorical Encoding, scaling features, etc.
) in order to maximize the effectiveness of the model.
Additionally, numerous ML classification algorithms (i.
e.
, Random Forest, Decision Tree, Support Vector Machine (SVM) and K-Nearest Neighbor (KNN)) will be analyzed to determine high performance algorithms.
Based upon accuracy, precision, recall and F1 score, the Random Forest classification algorithm would be the best performing algorithm.
The system includes an email alerting function to notify the network administrator immediately when a critical intrusion is detected, thus enabling the network administrator to respond rapidly to the incident.
Overall results indicate that the proposed ML-based NIDS is capable of detecting a significantly higher percentage of intrusions while simultaneously producing a lower percentage of false positives than traditional rule-based methods.
The findings indicate that artificial intelligence can play a critical role in the protection of modern network infrastructures against more sophisticated cyber threats.
Key Words: Network Intrusion Detection System, Machine Learning, NSL-KDD Dataset, Random Forest, Cybersecurity.
Related Results
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND
As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Technology and its growth is considerably enormous. This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc netwo...
A comprehensive review of machine learning's role in enhancing network security and threat detection
A comprehensive review of machine learning's role in enhancing network security and threat detection
As network security threats continue to evolve in complexity and sophistication, there is a growing need for advanced solutions to enhance network security and threat detection cap...
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
Network intrusion detection method based on IEHO-SVM
Network intrusion detection method based on IEHO-SVM
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intr...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
Network intrusion detection using ensemble weighted voting classifier based honeypot framework
Network intrusion detection using ensemble weighted voting classifier based honeypot framework
<p>The Internet of Things (IoT) is a new model that connects physical objects and the Internet and has become one of the most important technological developments in computin...

