Implementation of Intrusion Detection Model for Detecting Cyberattacks Using Support Vector Machine

Article Preview

Abstract:

A Cyber-attack is a deliberate intent to take illegal access to one’s computer and data. The ascent of the web has turned into the groundwork of the vast majority's day-to-day schedules, and online administration has raised security worries. The rising measure of information, dividing among the cloud and the clients, additionally makes an attack surface. The attack surface has likewise extended with the ascent of organizations and the rising number of individuals utilizing them. The capacity of existing discovery plans to approve the goal and the earlier acknowledgment of assaults is falling apart. In the event that no effective assurance mechanism is carried out, the web will turn out to be substantially more helpless, expanding the gamble of information spillage or hacking. The focus here is to put forward a model (IDS) that detects network intrusions or anomaly detection by classifying all the network traffic packets as non-attack (harmless) or attack (vindictive) classes and also classifying the type of malicious classes using Support Vector Machine algorithm. The machine learning algorithm Support Vector Machine works for classification as well as regression problems. Decision boundaries are usually used in Support Vector Classification (SVC). We have used two different datasets of cybersecurity, namely KDDCUP 1999 and UNSW_NB15. The proposed model has been evaluated using performance metrics, namely accuracy, precision, recall (Detection rate), and F-measure. The test results exhibit that our framework has better identification execution for various cyberattacks. This model achieves an accuracy of 99.8 percent with the KDDCUP 1999 dataset and 98.2 percent with the UNSW_NB15 dataset, and remarkable detection rates of attacks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

772-781

Citation:

Online since:

February 2023

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2023 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Haixia Hou , Yingying Xu , Menghan Chen, Zhi Liu, Wei Guo , Mingcheng Gao, Yang Xin, And Lizhen Cui. Hierarchical Long Short-Term Memory Network for Cyberattack Detection, IEEE Access vol 8; (2020).

DOI: 10.1109/access.2020.2983953

Google Scholar

[2] Riadul Islam, Member, Rafi Ud Daula Refat, Sai Manikanta Yerram, and Hafiz Malik. Graph-Based Intrusion Detection System for Controller Area Networks, IEEE transactions on intelligent transportation systems;(2020).

DOI: 10.1109/tits.2020.3025685

Google Scholar

[3] Samson Ho, Saleh Al Jufout, Khalil Dajani2, And Mohammad Mozumdar. A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Convolutional Neural Network, IEEE Open Journal of the Computer Society;(2021).

DOI: 10.1109/ojcs.2021.3050917

Google Scholar

[4] Ian Perry, Lutzu Li, Christopher Sweet, Shao-Hsuan Su, Fu-Yuan Cheng, Shanchieh Jay Yang, and Ahmet Okutan. Differentiating and Predicting Cyberattack Behaviors Using LSTM, IEEE Conference on Dependable and Secure Computing; (2018).

DOI: 10.1109/desec.2018.8625145

Google Scholar

[5] Xueqin Zhang1, Jiahao Chen, Yue Zhou1, Liangxiu Han, And Jiajun Lin. A Multiple-Layer Representation Learning Model for Network-Based Attack Detection, IEEE Access vol. 7;(2019).

DOI: 10.1109/access.2019.2927465

Google Scholar

[6] Pathan A-SK, Azad S, Khan R, et al. security mechanisms and data access protocols in innovative wireless networks. London: Sage; (2018).

Google Scholar

[7] Yong-xiong Z, Liang-ming W, Lu-xia Y. A network attack discovery algorithm based on unbalanced sampling vehicle evolution strategy for intrusion detection. Int J Comput Appl. 2017: 1–9.

DOI: 10.1080/1206212x.2017.1397387

Google Scholar

[8] Zargar ST, Joshi J, Tipper D. A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun Surv Tutorials. 2013;15(4):2046–(2069).

DOI: 10.1109/surv.2013.031413.00127

Google Scholar

[9] Toledo AL, Wang X. Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks. IEEE Trans Inf Forensics Secur. 2008;3(3):347–358.

DOI: 10.1109/tifs.2008.926098

Google Scholar

[10] Ametepe W, Wang C, Ocansey SK, et al. Data provenance collection and security in a distributed environment: a survey. Int J Comput Appl. 2018: 70–74.

Google Scholar