Affiliation:
1. Lovely Professional University
Abstract
Abstract
The task of ensuring cyber-security has grown increasingly challenging as the alarming expansion of computer connectivity and the large number of computer-related applications has expanded recently. It also requires a sufficient protection system against a variety of cyberattacks. Detecting discrepancies and risks in a computer network, as well as creating intrusion detection systems (IDS) to aid in cyber-security. Artificial intelligence (AI), specifically machine learning (ML) approaches, were used to create a practical data-driven intrusion detection system. Two alternative intrusion detection (ID) classification approaches were compared in this study, each with its own set of use cases. Before using the two classifiers for classification, the Particle Swarm Optimization (PSO) approach was used to reduce dimensionality. The classification approaches used to characterise network anomalies were studied in this study. PSO + ANN (Artificial neural network), PSO + Decision Tree (PSO+DT) and PSO + K-Nearest Neighbor (PSO+KNN) are the three classifiers used. The detection approaches' results were confirmed using the KDD-CUP 99 dataset. On the result of the implementation, success indicators like as specificity, recall, f1-score, accuracy, precision, and consistency were used on cyber-security databases for different types of cyber-attacks. The accuracy, detection rate (DR), and false-positive rate of the two classifiers were also compared to see which one outperforms the other (FPR). Finally, the system was compared to the IDS that was already in place. In terms of detecting network anomalies, the results reveal that PSO+ANN outperforms the PSO+KNN and PSO+DT classifier algorithms.
Publisher
Research Square Platform LLC
Reference58 articles.
1. The impact of information technology on poverty alleviation in Nigeria;Mebawondu JO;Continental Journal of Information Technology,2012
2. A data mining approach to network intrusion detection;Adetunmbi AO;Journal of Computer Science & Its Applications,2007
3. Deadlock detection in agent-based virtual knowledge communities;Opeyemi OG;Annals. Computer Science Series,2010
4. On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks;Boppana RV;IEEE Transactions on Mobile Computing,2010
5. Mebawondu, J. (2018). Development of a Network Intrusion Detection System Using Neural Network M. Tech, Federal University of Technology.