A ROBUST CYBER SECURITY THREAT DETECTION MODEL USING ARTIFICIAL INTELLIGENCE TECHNOLOGY

Main Article Content

Dr. V. NAGAGOPIRAJU
Panguluri Ashok
Kancheti Dhana LAKSHMI
Chowdam Likhitha
Mandalapu Venkata Sasi KUMAR

Abstract

The difficulty of ensuring cyber-security is steadily growing as a result of the alarming development in computer connectivity and the sizeable number of applications associated to computers in recent years. The system also requires robust defines against the growing number of cyber threats. As a result, a possible role for cyber-security might be performed by developing intrusion detection systems (ids) to detect inconsistencies and threats in computer networks. An effective data-driven intrusion detection system has been created with the use of artificial intelligence, particularly machine learning techniques. This research proposes a novel twin support vector machine (tsvm) based security model which first considers the security features ranking according to their relevance before developing an ids model based on the significant features that have been selected. By lowering the feature dimensions, this approach not only improves predictive performance for unidentified tests but also lowers the model's computational expense. Trials are conducted using four common ml techniques to compare the results to those of the current approaches (decision tree, random decision forest, random tree, and artificial neural network). The experimental findings of this study confirm that the suggested methods may be used as learning-based models for network intrusion detection and demonstrate that, when used in the real world, they outperform conventional ml techniques.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
NAGAGOPIRAJU, D. V. ., Ashok, P., LAKSHMI, K. D., Likhitha, C. ., & KUMAR, M. V. S. . (2024). A ROBUST CYBER SECURITY THREAT DETECTION MODEL USING ARTIFICIAL INTELLIGENCE TECHNOLOGY. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 15(1), 128–132. https://doi.org/10.61841/turcomat.v15i1.14553
Section
Articles

References

p.sornsuwit, and s.jaiyen, “a new hybrid machine learning for cybersecurity threat detection based on adaptive

boosting,” applied artificial intelligence, 33(5), pp.462- 482, 2019.

k.shaukat, s.luo, s.chen, and d. Liu, “cyber threat detection using machine learning techniques: a performance

evaluation perspective,”in ieee international conference on cyber warfare and security. Ieee, october2020,pp. 1-6.

q.h. vu, d.ruta, and l.cen, “gradient boosting decision trees for cyber security threats detection based on network

events logs,” in 2019ieee international conference on big data (big data). Ieee, december2019, pp. 5921-5928.

j. Lee, j. Kim, i.kim, and k. Han,“cyber threat detection based on artificial neural networks using event profiles,”ieee

access, vol. 7, pp.165607-165626, 2019.

j.h. li, “cyber security meets artificial intelligence: a survey;” frontiers of information technology & electronic

engineering, vol. 19, no.12, pp.1462-1474, 2018.

n. Rawindaran, a.jayal, e.prakash, and c.hewage, “cost benefits of using machine learning features in nids for cyber

security in uk small medium enterprises (sme),” future internet, vol. 13, no. 8, p.186, 2021.

r.prasad, v.rohokale, r.prasad, and v.rohokale, “artificial intelligence and machine learning in cyber security,” cyber

security: the lifeline of information and communication technology, pp.231-247, 2020

. 8) t.c.truong, i.zelinka, j.plucar,m.čandík, and v.šulc,“artificial intelligence and cybersecurity: past, presence, and

future,” in artificial intelligence and evolutionary computations in engineering systems, pp. 351-363, springer singapore,

i.h.sarker, y.b.abushark, f.alsolami, and a.i. khan,“intrudtree: a machine learning based cyber security intrusion

detection model,” symmetry, vol. 12, no. 5, p.754, 2020.

diro, and n.chilamkurti, “distributed attack detection scheme using deep learning approach for internet of things,”

future generation computer systems, vol. 82, pp.761-768, 2018.