Abstract

Networks are exposed to an increasing number of cyberattacks due to their vulnerabilities. So, cybersecurity strives to make networks as safe as possible, by introducing defense systems to detect any suspicious activities. However, firewalls and classical intrusion detection systems (IDSs) suffer from continuous updating of their defined databases to detect threats. The new directions of the IDSs aim to leverage the machine learning models to design more robust systems with higher detection rates and lower false alarm rates. This research presents a novel network IDS, which plays an important role in network security and faces the current cyberattacks on networks using the UNSW-NB15 dataset benchmark. Our proposed system is a dynamically scalable multiclass machine learning-based network IDS. It consists of several stages based on supervised machine learning. It starts with the Synthetic Minority Oversampling Technique (SMOTE) method to solve the imbalanced classes problem in the dataset and then selects the important features for each class existing in the dataset by the Gini Impurity criterion using the Extremely Randomized Trees Classifier (Extra Trees Classifier). After that, a pretrained extreme learning machine (ELM) model is responsible for detecting the attacks separately, “One-Versus-All” as a binary classifier for each of them. Finally, the ELM classifier outputs become the inputs to a fully connected layer in order to learn from all their combinations, followed by a logistic regression layer to make soft decisions for all classes. Results show that our proposed system performs better than related works in terms of accuracy, false alarm rate, Receiver Operating Characteristic (ROC), and Precision-Recall Curves (PRCs).

Highlights

  • Nowadays, the rapid evolution of IoT, cloud, and big data domains has reached an indescribable level, and the urgent need to use them has become unavoidable.e prevailing data through the emerging technologies have many steps in their life cycle including creation, transfer, storage, and deletion. e portable information in the data has great importance at any stage of its cycle, especially when it is related to financial transactions or governments or the military

  • After reviewing the future works related to the research topics, we noticed that the resampling techniques have improved the performance of the multiclass classification

  • Because some types of attacks exist for the same attack name in different syntaxes such as the upper and lower cases, they are unified to the same format

Read more

Summary

Introduction

The rapid evolution of IoT, cloud, and big data domains has reached an indescribable level, and the urgent need to use them has become unavoidable.e prevailing data through the emerging technologies have many steps in their life cycle including creation, transfer, storage, and deletion. e portable information in the data has great importance at any stage of its cycle, especially when it is related to financial transactions or governments or the military. E prevailing data through the emerging technologies have many steps in their life cycle including creation, transfer, storage, and deletion. E portable information in the data has great importance at any stage of its cycle, especially when it is related to financial transactions or governments or the military. Data privacy and information security were fundamental issues for reducing losses that occur by overlooking them [1]. Us, information security in terms of confidentiality, integrity, and availability (CIA triad) must be taken into consideration when developing systems. IDS is used to detect suspicious activities on the network, network-based IDS, or on the host, host-based IDS, or on both of them, hybrid IDS. It may be either software or hardware or a combination of both

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.