A Three-Tier Model for Intrusions Classification on a Computer Network
DOI:
https://doi.org/10.33736/jcsi.5274.2023Keywords:
Classification, Intrusion Detection System, Cyber-attacks, Machine Learning, Cyber SecurityAbstract
Activities of cyber attackers are on the rampage; this is because there is an increase in the usage of computer related applications. Attackers have caused reputational and economic damages to network administrators, companies and industries based on the information they have stolen. To curb all these activities, a formidable Intrusion Detection System (IDS) is needed to guide against all the numerous cyber-attacks. The research work solely aimed at reducing the accessibility of cyber threats by bringing its operations to as minimal as possible because of the adverse effects they have had in the past. This research proposed a three-tier IDS which classifies the various attacks into their various groups. The proposed model consists of Bayes Network (BN), Support Vector Machine (SVM), and Artificial Neural Network (ANN). NLS KDD 99 dataset was used for simulating the proposed three-tier IDS in the WEKA environment. The effectiveness and efficiency of the proposed model was based on recall, precision, and accuracy. The proposed three-tier model gave the following results: recall: 0.993; precision: 0.979; accuracy: 0.986.
References
Alqahtani, H., Sarker, I. H., Asra K., Syed Md. Minhaz, H., Sheikh I., & Sohrab H. (2020). Cyber Intrusion Detection Using Machine Learning Classification Techniques. Springer Nature Singapore, CCIS 1235, pp. 121–131.
Aslahi-Shahri, M. (2016). A hybrid method consisting of genetic algorithm and support vector machine for intrusion detection system. Neural computing and applications, 27(6):1669-1676.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys and Tutorials.
Chen, Y. H., Horng, S. J., & Su, M., Y. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert systems with Applications, 38(1):306-313
Gang, M. (2010). A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert systems with applications, 37:9.
Harbi, N., Rahman, C. M. & Farid, D. M (2010). Attacks classification in adaptive intrusion detection using decision tree. World academy of science, engineering and technology, 39:86-90.
Hao, Z., Feng, Y., Koide, H. & Sakurai, K. (2020). A sequential detection method for intrusion detection system based on artificial neural networks. International Journal of Networking and Computing, 10:213-226
Liao, S H. (2005). Expert system methodologies and applications|. A decade review from 1995 to 2004. Expert systems with applications, 28(1):93-103.
Lin, C. H., Liao, H. J., & Lin, Y. C. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1):16-24.
Lin, W. C. & Ke, S. W. (2015). An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based system.
Mohammadi, S., Mirvaziri H., Ghazizadeh-Ahsaee, M. & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Application, 44:80-88
Morgan, S (2021). Cyberwarfare in the suite. Cyber security magazine. Publish by cybersecurity ventures.
Mustapha, N., Pozi, M., & Sulaiman, M. (2016). Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming. Neural Processing Letters.
Olofintuyi, S.S. (2021). Cyber Situation Awareness Perception Model for Computer Network. International journal of advanced computer science and application. 12(1):392-397.
Olofintuyi, S.S. & Olajubu, E.A (2021). Supervised Machine Learning Algorithms for Cyber-Threats Detection in the Perception Phase of a Situation Awareness Model. International Journal of Information Processing and Communication, 11(2): 61-74.
Olofintuyi, S.S. & Omotehinwa, T.O. (2021). Performance Evaluation of Supervised Ensemble Cyber Situation Perception Models for Computer Network. Computing, Information Systems, Development Informatics and Allied Research Journal. 11(2):1-14.
Olofintuyi, S.S., Omotehinwa, T. O., Odukoya, O.H. & Olajubu, E. A. (2019). Performance comparison of threat classification models for cyber-situation awareness. Proceedings of the OAU Faculty of Technology Conference, 305-309.
Ozgur, A. & Erdem, H. (2016). A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. Peer Preprints, 4.
Sahu, S. & Mehtre, B. M. (2015). Network intrusion detection system using J48 decision tree[c]. International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2023-2026.
Sarker, H. Abushark. Y., Alsolami, F. & Khan, A. (2020). Intrudtree: a machine learning-based cyber security intrusion detection model. Symmetry, 12:754-761.
Sarker, H. (2019). A machine learning based robust prediction model for real-life mobile phone data. Internet of Things, 5:180-193.
Shams, E. A., & Rizaner, A. A. (2018). A novel support vector machine-based intrusion detection system for mobile ad hoc networks. Wireless Networks.
Stallings W. (2003). Cryptography and network security: principles and practices.
Thu, H. L., Kim, J., & Kim, J. (2016). Long short term memory recurrent neural network classifier for intrusion detection. 2016 International Conference on Platform Technology and Service (PlatCon).
Vladimir, V. & Corinna, C. (1995). Support-vector networks. Machine learning, 20(3):273-297.
Zahra, J., Mansour, S., & Ali, F. (2012). Intrusion detection using reduced-size recurrent neural network based on feature grouping. Neural Computing and Applications, 21:6.
Zhao, H., Feng, Y., Koide, H., & Sakurai, K. (2020). A sequential detection method for intrusion detection system based on artificial neural networks. International Journal of Networking and Computing, 10:213-226.
Downloads
Published
How to Cite
Issue
Section
License
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarise, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.