DEVELOPMENT OF A NEURAL NETWORK STRUCTURE FOR INTRUSION DETECTION ANALYSIS

DOI: 10.31673/2412-4338.2023.040109

Authors

  • В. О. Сосновий, (Sosnovyy V. O.) State University of Information and Communication Technologies, Kyiv
  • Н. О. Лащевська, (Lashchevska N. O.) State University of Information and Communication Technologies, Kyiv

Abstract

The right security solutions in the information and communication world are critical to network security by providing real-time network protection against network vulnerabilities and data usage. An effective intrusion detection strategy is able to use a holistic approach to protect critical systems from unauthorized access or attacks. The paper examines the latest scientific achievements and research related to the analysis of detection of network intrusions using machine learning (ML) methods. The article describes a complex security solution based on machine learning (ML) for network intrusion detection using a complex controlled ML structure and ensemble feature selection methods. In addition, a comparative analysis of several MH models and function selection methods is provided. The article develops a general mechanism for detecting and achieving higher accuracy with a minimum frequency of false positive results (FPR). The paper uses datasets and the results show that the detection model can successfully identify 99.3% of intrusions with the lowest error rate of 0.5%, which shows better performance compared to existing solutions. The article combines the selection of ensemble functions and ensemble machine learning approaches as a detection mechanism in SBB to detect network anomalies. An experimental study was conducted with feature sets obtained from nine feature selection methods, and then these feature sets were combined to obtain the minimum number of features using majority voting. A comparative analysis of sets of functions was carried out. Controlled methods are used, which are more efficient with a balanced data set. To make the training dataset balanced, the data type (benign or attacking) with the minimum number of data instances in that training dataset was first selected. An ensemble feature selection and ensemble classification algorithm is implemented to improve the overall performance of the proposed machine learning model. Prospects for the development of further research are proposed.

Keywords: network security, malware detection, intrusion detection system, machine learning, ensemble feature selection, comparative analysis.

References:
1. Lyu X., Ying F., Onpium P. Scene style conversion algorithm of AI digital host: a deep learning approach. 2023 2nd international conference on edge computing and applications (ICECAA),м.Namakkal,India,1921лип.2023р.URL:https://doi.org/10.1109/icecaa58104.2023.10212269
2. R. Vinayakumar, K. Soman, and P. Poornachandran, “Evaluating effec-tiveness of shallow and deep networks to intrusion detection system,” in 2017 International Conference on Advances in Computing, Commu¬nications and Informatics (ICACCI), pp. 1282–1289, IEEE, 2017.
3. R. Vinayakumar, M. Alazab, S. Srinivasan, Q.-V. Pham, S. K. Padan- nayil, and K. Simran, “A visualized botnet detection system based deep learning for the internet of things networks of smart cities,” IEEE Transactions on Industry Applications, vol. 56, no. 4, pp. 4436–4456, 2020.
4. H. M. Gomes, J. P. Barddal, F. Enembreck, and A. Bifet, “A survey on ensemble learning for data stream classification,” ACM Computing Surveys (CSUR), vol. 50, no. 2, pp. 1–36, 2017.
5. O. Sagi and L. Rokach, “Ensemble learning: A survey,” Wiley Interdisci-plinary Reviews: Data Mining and Knowledge Discovery, vol. 8, no. 4, p. e1249, 2018.
6. X. Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An adaptive ensemble machine learning model for intrusion detection,” IEEE Access, vol. 7, pp. 82512–82521, 2019.
7. N. T. Pham, E. Foo, S. Suriadi, H. Jeffrey, and H. F. M. Lahza, “Improving performance of intrusion detection system using ensemble methods and feature selection,” in Proceedings of the Australasian Computer Science Week Multiconference, pp. 1–6, 2018.
8. S. Das, A. M. Mahfouz, D. Venugopal, and S. Shiva, “Ddos intrusion detection through machine learning ensemble,” in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 471–477, IEEE, 2019.
9. R. Sheikhpour, M. A. Sarram, S. Gharaghani, and M. A. Z. Chahooki, “A survey on semi-supervised feature selection methods,” Pattern Recogni-tion, vol. 64, pp. 141–158, 2017.
10. S. Adams and P. A. Beling, “A survey of feature selection methods for gaussian mixture models and hidden markov models,” Artificial Intelligence Review, vol. 52, no. 3, pp. 1739–1779, 2019.
11. W. Xiong and R. Lagerstro¨m, “Threat modeling–a systematic literature review,” Computers & security, vol. 84, pp. 53–69, 2019.
12. A A., Achuthan K. Threat modeling and threat intelligence system for cloud using splunk. 2022 10th international symposium on digital forensics and security (ISDFS), Istanbul, Turkey, 6–7 June 2022. 2022. URL: https://doi.org/10.1109/isdfs55398.2022.9800787

Published

2023-12-12

Issue

Section

Articles