A ROBUST CYBER SECURITY THREAT DETECTION MODEL USING ARTIFICIAL INTELLIGENCE TECHNOLOGY
Main Article Content
Abstract
The difficulty of ensuring cyber-security is steadily growing as a result of the alarming development in computer connectivity and the sizeable number of applications associated to computers in recent years. The system also requires robust defines against the growing number of cyber threats. As a result, a possible role for cyber-security might be performed by developing intrusion detection systems (ids) to detect inconsistencies and threats in computer networks. An effective data-driven intrusion detection system has been created with the use of artificial intelligence, particularly machine learning techniques. This research proposes a novel twin support vector machine (tsvm) based security model which first considers the security features ranking according to their relevance before developing an ids model based on the significant features that have been selected. By lowering the feature dimensions, this approach not only improves predictive performance for unidentified tests but also lowers the model's computational expense. Trials are conducted using four common ml techniques to compare the results to those of the current approaches (decision tree, random decision forest, random tree, and artificial neural network). The experimental findings of this study confirm that the suggested methods may be used as learning-based models for network intrusion detection and demonstrate that, when used in the real world, they outperform conventional ml techniques.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
References
p.sornsuwit, and s.jaiyen, “a new hybrid machine learning for cybersecurity threat detection based on adaptive
boosting,” applied artificial intelligence, 33(5), pp.462- 482, 2019.
k.shaukat, s.luo, s.chen, and d. Liu, “cyber threat detection using machine learning techniques: a performance
evaluation perspective,”in ieee international conference on cyber warfare and security. Ieee, october2020,pp. 1-6.
q.h. vu, d.ruta, and l.cen, “gradient boosting decision trees for cyber security threats detection based on network
events logs,” in 2019ieee international conference on big data (big data). Ieee, december2019, pp. 5921-5928.
j. Lee, j. Kim, i.kim, and k. Han,“cyber threat detection based on artificial neural networks using event profiles,”ieee
access, vol. 7, pp.165607-165626, 2019.
j.h. li, “cyber security meets artificial intelligence: a survey;” frontiers of information technology & electronic
engineering, vol. 19, no.12, pp.1462-1474, 2018.
n. Rawindaran, a.jayal, e.prakash, and c.hewage, “cost benefits of using machine learning features in nids for cyber
security in uk small medium enterprises (sme),” future internet, vol. 13, no. 8, p.186, 2021.
r.prasad, v.rohokale, r.prasad, and v.rohokale, “artificial intelligence and machine learning in cyber security,” cyber
security: the lifeline of information and communication technology, pp.231-247, 2020
. 8) t.c.truong, i.zelinka, j.plucar,m.čandík, and v.šulc,“artificial intelligence and cybersecurity: past, presence, and
future,” in artificial intelligence and evolutionary computations in engineering systems, pp. 351-363, springer singapore,
i.h.sarker, y.b.abushark, f.alsolami, and a.i. khan,“intrudtree: a machine learning based cyber security intrusion
detection model,” symmetry, vol. 12, no. 5, p.754, 2020.
diro, and n.chilamkurti, “distributed attack detection scheme using deep learning approach for internet of things,”
future generation computer systems, vol. 82, pp.761-768, 2018.