A Three-Tier Model for Intrusions Classification on a Computer Network

  • Sunday Samuel Olofintuyi Department of Computer Science, College of Natural and Applied Science, Achievers University, Owo, Ondo State, Nigeria
Keywords: Classification, Intrusion Detection System, Cyber-attacks, Machine Learning, Cyber Security

Abstract

Activities of cyber attackers are on the rampage; this is because there is an increase in the usage of computer related applications. Attackers have caused reputational and economic damages to network administrators, companies and industries based on the information they have stolen. To curb all these activities, a formidable Intrusion Detection System (IDS) is needed to guide against all the numerous cyber-attacks. The research work solely aimed at reducing the accessibility of cyber threats by bringing its operations to as minimal as possible because of the adverse effects they have had in the past. This research proposed a three-tier IDS which classifies the various attacks into their various groups. The proposed model consists of Bayes Network (BN), Support Vector Machine (SVM), and Artificial Neural Network (ANN). NLS KDD 99 dataset was used for simulating the proposed three-tier IDS in the WEKA environment. The effectiveness and efficiency of the proposed model was based on recall, precision, and accuracy. The proposed three-tier model gave the following results: recall: 0.993; precision: 0.979; accuracy: 0.986.

References

Alqahtani, H., Sarker, I. H., Asra K., Syed Md. Minhaz, H., Sheikh I., & Sohrab H. (2020). Cyber Intrusion Detection Using Machine Learning Classification Techniques. Springer Nature Singapore, CCIS 1235, pp. 121–131.

Aslahi-Shahri, M. (2016). A hybrid method consisting of genetic algorithm and support vector machine for intrusion detection system. Neural computing and applications, 27(6):1669-1676.

Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys and Tutorials.

Chen, Y. H., Horng, S. J., & Su, M., Y. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert systems with Applications, 38(1):306-313

Gang, M. (2010). A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert systems with applications, 37:9.

Harbi, N., Rahman, C. M. & Farid, D. M (2010). Attacks classification in adaptive intrusion detection using decision tree. World academy of science, engineering and technology, 39:86-90.

Hao, Z., Feng, Y., Koide, H. & Sakurai, K. (2020). A sequential detection method for intrusion detection system based on artificial neural networks. International Journal of Networking and Computing, 10:213-226

Liao, S H. (2005). Expert system methodologies and applications|. A decade review from 1995 to 2004. Expert systems with applications, 28(1):93-103.

Lin, C. H., Liao, H. J., & Lin, Y. C. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1):16-24.

Lin, W. C. & Ke, S. W. (2015). An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based system.

Mohammadi, S., Mirvaziri H., Ghazizadeh-Ahsaee, M. & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Application, 44:80-88

Morgan, S (2021). Cyberwarfare in the suite. Cyber security magazine. Publish by cybersecurity ventures.

Mustapha, N., Pozi, M., & Sulaiman, M. (2016). Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming. Neural Processing Letters.

Olofintuyi, S.S. (2021). Cyber Situation Awareness Perception Model for Computer Network. International journal of advanced computer science and application. 12(1):392-397.

Olofintuyi, S.S. & Olajubu, E.A (2021). Supervised Machine Learning Algorithms for Cyber-Threats Detection in the Perception Phase of a Situation Awareness Model. International Journal of Information Processing and Communication, 11(2): 61-74.

Olofintuyi, S.S. & Omotehinwa, T.O. (2021). Performance Evaluation of Supervised Ensemble Cyber Situation Perception Models for Computer Network. Computing, Information Systems, Development Informatics and Allied Research Journal. 11(2):1-14.

Olofintuyi, S.S., Omotehinwa, T. O., Odukoya, O.H. & Olajubu, E. A. (2019). Performance comparison of threat classification models for cyber-situation awareness. Proceedings of the OAU Faculty of Technology Conference, 305-309.

Ozgur, A. & Erdem, H. (2016). A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. Peer Preprints, 4.

Sahu, S. & Mehtre, B. M. (2015). Network intrusion detection system using J48 decision tree[c]. International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2023-2026.

Sarker, H. Abushark. Y., Alsolami, F. & Khan, A. (2020). Intrudtree: a machine learning-based cyber security intrusion detection model. Symmetry, 12:754-761.

Sarker, H. (2019). A machine learning based robust prediction model for real-life mobile phone data. Internet of Things, 5:180-193.

Shams, E. A., & Rizaner, A. A. (2018). A novel support vector machine-based intrusion detection system for mobile ad hoc networks. Wireless Networks.

Stallings W. (2003). Cryptography and network security: principles and practices.

Thu, H. L., Kim, J., & Kim, J. (2016). Long short term memory recurrent neural network classifier for intrusion detection. 2016 International Conference on Platform Technology and Service (PlatCon).

Vladimir, V. & Corinna, C. (1995). Support-vector networks. Machine learning, 20(3):273-297.

Zahra, J., Mansour, S., & Ali, F. (2012). Intrusion detection using reduced-size recurrent neural network based on feature grouping. Neural Computing and Applications, 21:6.

Zhao, H., Feng, Y., Koide, H., & Sakurai, K. (2020). A sequential detection method for intrusion detection system based on artificial neural networks. International Journal of Networking and Computing, 10:213-226.

Published
2023-06-22
How to Cite
Olofintuyi, S. S. (2023). A Three-Tier Model for Intrusions Classification on a Computer Network. Journal of Computing and Social Informatics, 2(2), 1-8. https://doi.org/10.33736/jcsi.5274.2023