Machine Learning Approach for Intrusion Detection Systems as a Cyber Security Strategy for Small and Medium Enterprises
Author:
Baci Nevila1, Vukatana Kreshnik1, Baci Marius1
Affiliation:
1. Department of Statistics and Applied Informatics University of Tirana Nënë Tereza Square, 4 ALBANIA
Abstract
Small and medium enterprises (SMEs) are businesses that account for a large percentage of the economy in many countries, but they lack cyber security. The present study examines different supervised machine learning methods with a focus on intrusion detection systems (IDSs) that will help in improving SMEs’ security. The algorithms that are tested through a real dataset, are Naïve Bayes, Sequential minimal optimization (SMO), C4.5 decision tree, and Random Forest. The experiments are run using the Waikato Environment for Knowledge Analyses (WEKA) 3.8.4 tools and the metrics used to evaluate the results were: accuracy, false-positive rate (FPR), and total time to train and build a classification model. The results obtained from the original dataset with 130 features show a high value of accuracy, but the computation time to build the classification model was notably high for the cases of C4.5 (1 hr. and 20 mins) and SMO algorithm (4 hrs. and 20 mins). the Information Gain (IG) method was used and the result was impressive. The time needed to train the model was reduced in the order of a few minutes and the accuracy was high (above 95%). In the end, challenges that SMEs can have for choosing an IDS such as lack of scalability and autonomic self-adaptation, can be solved by using a correct methodology with machine learning techniques.
Publisher
World Scientific and Engineering Academy and Society (WSEAS)
Subject
Economics and Econometrics,Finance,Business and International Management
Reference20 articles.
1. Feizollah, A., Anuar, N. B., Salleh, R. and Wahab, A. W. A., A review on feature selection in mobile malware detection, Digital investigation, Vol. 13, 2015, pp. 22–37. 2. Faris, H., Hassonah, M. A., Ala’M, A.Z., Mirjalili, S. and Aljarah, I., A multi-verse optimizer approach for feature selection and optimizing parameters based on a robust system architecture, Neural Computing and Applications, Vol. 30, No. 8, 2018, pp. 2355–2369. 3. Identity Breach Report 2019, [Online] Available: https://4iq.com/2019-identity-breach-report/ (Last accessed September 15, 2021). 4. Yeng, P., Nimbe, P., Weyori, B., Solvoll, T. and Yang, B., Web Vulnerability Measures for SMEs, NISK, Vol 12., 2019, pp. 1-16. 5. Kshetri, N., The Economics of Cyber-Insurance, IT Professional, Vol. 20, No. 6, 2018, pp. 9-14.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Analysis of modern security plugins for wordpress;AIP Conference Proceedings;2024 2. Drift Detection and Model Update using Unsupervised AutoML in IoT;WSEAS TRANSACTIONS ON COMPUTERS;2023-12-31 3. Application of Machine Learning Techniques for Software Anomaly Detection;2023 International Conference on Applied Mathematics & Computer Science (ICAMCS);2023-08-08 4. Optimization of Expert Solutions for Events Forecasting;2023 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO);2023-04 5. Befähigung von KMU zur Nutzung von Machine-Learning-Potenzialen;Zeitschrift für wirtschaftlichen Fabrikbetrieb;2023-03-31
|
|