Detection of Cyber Attacks in Network Using ML
DOI:
https://doi.org/10.32628/IJSRST52310217Keywords:
Machine Learning, Random Forest, SVM, Cyber Attack.Abstract
Cybercrime is on the rise everywhere and takes advantage of different flaws in the computing environment. Paying ethical hackers boosted their focus on finding flaws and suggesting solutions. Due to machine learning's success in solving problems related to cyber security, it has recently become a topic of significant relevance. Major concerns in cyber security, such as intrusion detection, malware categorization, and detection, have been addressed using machine learning approaches. Although though it cannot fully automate a cyber security system, machine learning may be able to identify cyber security threats more effectively than other software-oriented approaches, which lessens the stress on security analysts. In this research, we suggest using a machine learning model to identify the network attack. To obtain reliable predictions, some machine learning approaches, such as Random Forest, SVM, Gradient Boosting have been applied. The dataset CSE-CIC-IDS2018 was used to train the model. As a result, efficient adaptive techniques, including different machine learning algorithms, can increase detection rates. The basic objective is to ascertain whether the network is being attacked. Random Forest gave highest accuracy of 99.99%.
References
- papers/sophoslabs-uncut-2020-threat-report.pdf, 2020.
- https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf, 2019.
- Khraisat, A., Gondal, I., Vamplew, P. et al. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2, 20 (2019).
- O. Elejla, B. Belaton, M. Anbar, and A. Alnajjar, Intrusion detection systems of ICMPv6-based DDoS attacks, Neural Computing and Applications, vol. 30, no. 1, pp. 45–56, 2018.
- M. H. Haghighat and J. Li, Edmund: Entropy based attack detection and mitigation engine using netflow Data, in Proc. of 8th International Conference on Communication and Network Security, Chengdu, China, 2018, pp. 1–6.
- M. Idhammad, K. Afdel, and M. Belouch, Semi-supervised machine learning approach for DDoS detection, Applied Intelligence, vol. 48, no. 10, pp. 3193–3208, 2018.
- D. S. Terzi, R. Terzi, and S. Sagiroglu, Big data analytics for network anomaly detection from netflow data, in Proc. of 2017 International Conference on Computer Science and Engineering, Antalya, Turkey, 2017, pp. 592–597.
- J. M. Vidal, A. L. S. Orozco, and L. J. G. Villalba, Adaptive artificial immune networks for mitigating DoS flooding attacks, Swarm and Evolutionary Computation, vol. 38, pp. 94–108, 2018.
- R. Wang, Z. Jia, and L. Ju, An entropy-based distributed DDoS detection mechanism in software-defined networking, in Proc. of 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 2015, pp. 310–317.
- G. Aceto, D. Ciuonzo, A. Montieri, and A. Pescapé, Multiclassification approaches for classifying mobile app traffic, Journal of Network and Computer Applications, vol. 103, pp. 131–145, 2018.
- Tran, K. N., Alazab, M., & Broadhurst, R. (2013, November). Towards a feature rich model considering predicting spam emails containing malicious attachments & urls. In 11th Australasian Data Mining Conference, Canberra.
- Alazab, M., & Broadhurst, R. (2015). Spam & criminal activity.
- Alazab, M., Layton, R., Broadhurst, R., & Bouhours, B. (2013, November). Malicious spam emails developments & authorship attribution. In Cybercrime & Trustworthy Computing Workshop (CTC), 2013 Fourth (pp. 58-68). IEEE.
- Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., & Chon, S. (2014). An analysis about nature about groups engaged in cybercrime.
- Alazab, M., Venkatraman, S., Watters, P., & Alazab, M. (2011, December). Zero-day malware detection based on supervised learning algorithms about API call signatures. In Proceedings about Ninth Australasian Data Mining Conference-Volume 121 (pp. 171- 182). Australian Computer Society, Inc..
- Vinayakumar, R., Alazab, M., Srinivasan, S., Pham, Q. V., Padannayil, S. K., & Simran, K. (2020). A Visualized Botnet Detection System based Deep Learning considering Internet about Things Networks about Smart Cities. IEEE Transactions on Industry Applications.
- Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach considering intelligent intrusion detection system. IEEE Access, 7, 41525-41550.
- Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., & Venkatraman, S. (2019). Robust intelligent malware detection using deep learning. IEEE Access, 7, 46717-46738.
- Vinayakumar, R., Alazab, M., Jolfaei, A., Soman, K. P., & Poornachandran, P. (2019, May). Ransomware triage using deep learning: twitter as a case study. In 2019 Cybersecurity & Cyberforensics Conference (CCC) (pp. 67-73). IEEE.
- Srinivasan, S., Ravi, V., Sowmya, V., Krichen, M., Noureddine, D. B., Anivilla, S., & Kp, S. (2020, March). Deep convolutional neural network based image spam classification. In 2020 6th Conference on Data Science & Machine Learning Applications (CDMA) (pp. 112-117). IEEE.
- F. Hossain, M. Akter and M. N. Uddin, "Cyber Attack Detection Model (CADM) Based on Machine Learning Approach," 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh, 2021, pp. 567-572.
- Sandosh, S., Govindasamy, V. & Akila, G. Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer Netw. Appl. 13, 1038–1045 (2020).
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.