Affiliation:
1. Applied College, Shaqra University, Shaqra 11961, Saudi Arabia
Abstract
Achieving cyber-security has grown increasingly tricky because of the rising concern for internet connectivity and the significant growth in software-related applications. It also needs a robust defense system to defend itself from multiple cyberattacks. Therefore, there is a need to generate a method for detecting and classifying cyber-attacks. The developed model can be integrated into three phases: pre-processing, feature selection, and classification. Initially, the min-max normalization of original data was performed to eliminate the impact of maximum or minimum values on the overall characteristics. After that, synthetic minority oversampling techniques (SMOTEs) were developed to reduce the number of minority attacks. The significant features were selected using a Hybrid Genetic Fire Hawk Optimizer (HGFHO). An optimized residual dense-assisted multi-attention transformer (Op-ReDMAT) model was introduced to classify selected features accurately. The proposed model’s performance was evaluated using the UNSW-NB15 and CICIDS2017 datasets. A performance analysis was carried out to demonstrate the effectiveness of the proposed model. The experimental results showed that the UNSW-NB15 dataset attained a higher precision, accuracy, F1-score, error rate, and recall of 97.2%, 98.82%, 97.8%, 2.58, and 98.5%, respectively. On the other hand, the CICIDS 2017 achieved a higher precision, accuracy, F1-score, and recall of 98.6%, 99.12%, 98.8%, and 98.2%, respectively.
Reference28 articles.
1. Alqahtani, H., Sarker, I.H., Kalim, A., Minhaz Hossain, S.M., Ikhlaq, S., and Hossain, S. (2020, January 26–27). Cyber intrusion detection using machine learning classification techniques. Proceedings of the Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India. Revised Selected Papers 1.
2. Cyber intrusion detection by combined feature selection algorithm;Mohammadi;J. Inf. Secur. Appl.,2019
3. Anwar, S., Mohamad Zain, J., Zolkipli, M.F., Inayat, Z., Khan, S., Anthony, B., and Chang, V. (2017). From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions. Algorithms, 10.
4. A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection;He;IEEE Access,2019
5. Ring, M., Wunderlich, S., Gruedl, D., Landes, D., and Hotho, A. (2020, May 11). Generation Scripts for the Coburg Intrusion Detection Data Sets (Cidds). Available online: https://github.com/markusring/CIDDS.