A ROBUST CYBER SECURITY THREAT DETECTION MODEL USING ARTIFICIAL INTELLIGENCE TECHNOLOGY
Main Article Content
Abstract
The difficulty of ensuring cyber-security is steadily growing as a result of the alarming development in computer connectivity and the sizeable number of applications associated to computers in recent years. The system also requires robust defines against the growing number of cyber threats. As a result, a possible role for cyber-security might be performed by developing intrusion detection systems (ids) to detect inconsistencies and threats in computer networks. An effective data-driven intrusion detection system has been created with the use of artificial intelligence, particularly machine learning techniques. This research proposes a novel twin support vector machine (tsvm) based security model which first considers the security features ranking according to their relevance before developing an ids model based on the significant features that have been selected. By lowering the feature dimensions, this approach not only improves predictive performance for unidentified tests but also lowers the model's computational expense. Trials are conducted using four common ml techniques to compare the results to those of the current approaches (decision tree, random decision forest, random tree, and artificial neural network). The experimental findings of this study confirm that the suggested methods may be used as learning-based models for network intrusion detection and demonstrate that, when used in the real world, they outperform conventional ml techniques.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
p.sornsuwit, and s.jaiyen, “a new hybrid machine learning for cybersecurity threat detection based on adaptive
boosting,” applied artificial intelligence, 33(5), pp.462- 482, 2019.
k.shaukat, s.luo, s.chen, and d. Liu, “cyber threat detection using machine learning techniques: a performance
evaluation perspective,”in ieee international conference on cyber warfare and security. Ieee, october2020,pp. 1-6.
q.h. vu, d.ruta, and l.cen, “gradient boosting decision trees for cyber security threats detection based on network
events logs,” in 2019ieee international conference on big data (big data). Ieee, december2019, pp. 5921-5928.
j. Lee, j. Kim, i.kim, and k. Han,“cyber threat detection based on artificial neural networks using event profiles,”ieee
access, vol. 7, pp.165607-165626, 2019.
j.h. li, “cyber security meets artificial intelligence: a survey;” frontiers of information technology & electronic
engineering, vol. 19, no.12, pp.1462-1474, 2018.
n. Rawindaran, a.jayal, e.prakash, and c.hewage, “cost benefits of using machine learning features in nids for cyber
security in uk small medium enterprises (sme),” future internet, vol. 13, no. 8, p.186, 2021.
r.prasad, v.rohokale, r.prasad, and v.rohokale, “artificial intelligence and machine learning in cyber security,” cyber
security: the lifeline of information and communication technology, pp.231-247, 2020
. 8) t.c.truong, i.zelinka, j.plucar,m.čandík, and v.šulc,“artificial intelligence and cybersecurity: past, presence, and
future,” in artificial intelligence and evolutionary computations in engineering systems, pp. 351-363, springer singapore,
i.h.sarker, y.b.abushark, f.alsolami, and a.i. khan,“intrudtree: a machine learning based cyber security intrusion
detection model,” symmetry, vol. 12, no. 5, p.754, 2020.
diro, and n.chilamkurti, “distributed attack detection scheme using deep learning approach for internet of things,”
future generation computer systems, vol. 82, pp.761-768, 2018.