Harnessing Machine Learning for Adaptive Signature-Based Network Intrusion Detection: A Simulation-Driven Approach
Article Sidebar
Main Article Content
Network security is essential for data sharing on the internet. Traditional methods such as firewalls cannot detect fragmented packets and are often outmaneuvered by increasingly sophisticated attackers, resulting in productivity losses, financial damage, and reputational harm. This study investigates the use of machine learning (ML) models in developing effective intrusion detection systems (IDS) using signature-based methods. The research leverages the UNSW-NB15 dataset and compares four ML algorithms: K-Nearest Neighbor (KNN), Random Forest (RF), Bayesian Network (Bayes Net), and Decision Tree (J48), with feature reduction applied using Principal Component Analysis (PCA) to improve efficiency. The models were built and evaluated using the WEKA platform, with 10-fold cross-validation applied to assess accuracy, precision, recall, and F-measure. Results show that J48 significantly outperforms the other algorithms in terms of overall accuracy, while Bayes Net produces the least accurate results. These findings underscore the efficacy of J48 and Random Forest in signature-based IDS for network security.
Downloads
Downloads
References
W. Steingartner, D. Galinec, and A. Kozina, “Threat defense: Cyber deception approach and education for resilience in hybrid threats model,” Symmetry (Basel)., vol. 13, no. 4, pp. 1–25, 2021, doi: 10.3390/sym13040597. DOI: https://doi.org/10.3390/sym13040597
A. V. Jatti and V. J. K. K. Sonti, “Intrusion Detection Systems: A Review,” Restaur. Bus., vol. 118, no. 7, pp. 50–58, 2019, doi: 10.26643/rb.v118i7.7246. DOI: https://doi.org/10.26643/rb.v118i7.7246
P. Panagiotou, N. Mengidis, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris, “Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods,” Inf. Secur. An Int. J., vol. 50, no. x, pp. 37–48, 2021, doi: 10.11610/isij.5016. DOI: https://doi.org/10.11610/isij.5016
J. Ferdous, R. Islam, A. Mahboubi, and M. Z. Islam, “A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms,” IEEE Access, vol. 11, no. October 2023, pp. 121118–121141, 2023, doi: 10.1109/ACCESS.2023.3328351. DOI: https://doi.org/10.1109/ACCESS.2023.3328351
B. Lampe and W. Meng, “Intrusion Detection in the Automotive Domain: A Comprehensive Review,” IEEE Commun. Surv. Tutorials, vol. 25, no. 4, pp. 2356–2426, 2023, doi: 10.1109/COMST.2023.3309864. DOI: https://doi.org/10.1109/COMST.2023.3309864
T. U. Sheikh, H. Rahman, H. S. Al-Qahtani, T. Kumar Hazra, and N. U. Sheikh, “Countermeasure of Attack Vectors using Signature-Based IDS in IoT Environments,” 2019 IEEE 10th Annu. Inf. Technol. Electron. Mob. Commun. Conf. IEMCON 2019, pp. 1130–1136, 2019, doi: 10.1109/IEMCON.2019.8936231. DOI: https://doi.org/10.1109/IEMCON.2019.8936231
Stefanos Kiourkoulis, “DDoS Dataset - Use of machine learning to analyse intrusion detection performance,” Lulea Univ. Technol., p. 81, 2020, [Online]. Available: https://www.kaggle.com/devendra416/ddos-datasets/data
M. Zakariah, S. A. AlQahtani, and M. S. Al-Rakhami, “Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection,” Appl. Sci., vol. 13, no. 11, 2023, doi: 10.3390/app13116504. DOI: https://doi.org/10.3390/app13116504
J. P. Bharadiya, “A Tutorial on Principal Component Analysis for Dimensionality Reduction in Machine Learning,” Int. J. Innov. Res. Sci. Eng. Technol., vol. 8, no. 5, pp. 2028–2032, 2023, doi: 10.5281/zenodo.8002436.
N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” 2015 Mil. Commun. Inf. Syst. Conf. MilCIS 2015 - Proc., pp. 1–6, 2015, doi: 10.1109/MilCIS.2015.7348942. DOI: https://doi.org/10.1109/MilCIS.2015.7348942
I. Almomani and M. Alenezi, “Efficient Denial of Service Attacks Detection in Wireless Sensor Networks,” J. Inf. Sci. Eng., vol. 34, no. 4, pp. 977–1000, 2018, doi: 10.6688/JISE.201807_34(4).0011.
V. Kumar, A. K. Das, and D. Sinha, “UIDS: a unified intrusion detection system for IoT environment,” Evol. Intell., no. 0123456789, 2019, doi: 10.1007/s12065-019-00291-w. DOI: https://doi.org/10.1007/s12065-019-00291-w
U. Matthew, J. Kazaure, and N. Okafor, “Contemporary Development in E-Learning Education, Cloud Computing Technology & Internet of Things,” EAI Endorsed Trans. Cloud Syst., vol. 7, no. 20, p. 169173, 2021, doi: 10.4108/eai.31-3-2021.169173. DOI: https://doi.org/10.4108/eai.31-3-2021.169173
D. Singh and B. Singh, “Investigating the impact of data normalization on classification performance,” Appl. Soft Comput., vol. 97, no. xxxx, p. 105524, 2020, doi: 10.1016/j.asoc.2019.105524. DOI: https://doi.org/10.1016/j.asoc.2019.105524
S. H. Huang, “Supervised feature selection: A tutorial,” Artif. Intell. Res., vol. 4, no. 2, 2015, doi: 10.5430/air.v4n2p22. DOI: https://doi.org/10.5430/air.v4n2p22
C. C. Aggarwal, “Educational and software resources for data classification,” Data Classif. Algorithms Appl., pp. 657–665, 2014, doi: 10.1201/b17320. DOI: https://doi.org/10.1201/b17320
A. M. Rahmani et al., “Machine learning (Ml) in medicine: Review, applications, and challenges,” Mathematics, vol. 9, no. 22, pp. 1–52, 2021, doi: 10.3390/math9222970. DOI: https://doi.org/10.3390/math9222970
Rashmi Agrawal, “K-Nearest Neighbor for Uncertain Data,” Int. J. Comput. Appl., vol. 105, no. 11, pp. 13–16, 2014.
This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.