Multiple Classification of Cyber Attacks Using Machine Learning

With the rapid growth of technology, the Internet’s use and the number of devices connected to it are growing at a breakneck pace. As a result of this development, network traffic has increased in volume and has become more vulnerable. The focus has been on the development of learning intrusion detection systems in order to detect sophisticated and undetected threats. Because machine learning-based models achieve great accuracy in a short amount of time, they are commonly utilized in intrusion detection systems. Multiple classifications were made in this study to detect assaults on network traffic using machine learning. The model was created using the CICIDS2017 data set, which comprises both current and historical attacks. The high-performance computer was used to rapidly conduct tests on the CICIDS2017 data set, which contains around 2.8 million rows of data. We improved the performance of the machine learning models we developed by cleaning, normalizing, oversampling for an unbalanced number of labels, and reducing the size of the data set using feature selection methods. The random forest, decision tree, logistic regression, and Naive Bayes classifiers were all implemented on the pre-processed data set, and it was observed that the random forest classifier had the highest accuracy of 99.94%.

___

1. A. Thakkar, and R. Lohiya, “A review of the advancement in intrusion detection datasets,” Procedia Comput. Sci., vol. 167, pp. 636–645, 2020. [CrossRef]

2. N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, “Probabilistic techniques for intrusion detection based on computer audit data,” IEEE Trans. Syst. Man Cybern. A Syst. Hum., vol. 31, no. 4, pp. 266–274, 2001.

3. S. Rastegari, P. Hingston, and C. Lam, “Evolving statistical rulesets for network intrusion detection,” Appl. Soft Comput., vol. 33, no. C, pp. 348–359, 2015. [CrossRef]

4. S. Rajagopal, P. P. Kundapur, and H. K. S., “Towards effective network intrusion detection: From concept to creation on Azure cloud,” IEEE Access, vol. 9, pp. 19723–19742, 2021. [CrossRef]

5. I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Vol. 1. Funchal, Madeira, Portugal: ICISSP, 2018, pp. 108–116

6. A. Gharib, I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “An evaluation framework for intrusion detection dataset,” In International Conference on Information Science and Security (ICISS), Vol. 2016, 2016. Pattaya, Thailand: IEEE Publications, 2016, pp. 1–6.

7. T. Saranya, S. Sridevi, C. Deisy, T. D. Chung, and M. K. A. A. Khan, “Performance analysis of machine learning algorithms in intrusion detection system: A review,” Procedia Comput. Sci., vol. 171, pp. 1251–1260, 2020. [CrossRef]

8. H. Ahmetoğlu, and R. Daş, “Analysis of feature selection approaches in large scale cyber intelligence data with deep learning,” In 28th Signal Processing and Communications Appl. Conference (SIU). Gaziantep, Turkey: IEEE Publications, 2020, pp. 1–4.

9. A. Yulianto, P. Sukarno, and N. A. Suwastika, “Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset,” In Journal of Physics: Conference Series (vol. 1192, no. 1, pp. 012018). IOP Publishing, 2019.

10. Kurniabudi, D. Stiawan, Darmawijoyo, M. Y. Bin Idris, A. M. Bamhdi, and R. Budiarto, “CICIDS-2017 dataset feature analysis with information gain for anomaly detection,” IEEE Access, vol. 8, p. 132911–132921, 2020.

11. Z. Pelletier, and M. Abualkibash, “Evaluating the CIC IDS-2017 dataset using machine learning methods and creating multiple predictive models in the statistical computing language R,” Science, vol. 5, no. 2, pp. 187–191, 2020.

12. M. Aamir, S. S. H. Rizvi, M. A. Hashmani, M. Zubair, and J. A. Ahmad, “Machine learning classification of port scanning and DDoS attacks: A comparative analysis,” Mehran Univ. Res. J. Eng. Technol., vol. 40, no. 1, pp. 215–229, 2021. [CrossRef]

13. H. H. Yi, and Z. M. Aye, “Performance analysis of traffic classification with machine learning,” Int. J. Comput. Inf. Eng., vol. 15, no. 1, pp. 42–47, 2014.

14. H. Azzaoui, A. Z. E. Boukhamla, D. Arroyo, and A. Bensayah, “Developing new deep-learning model to enhance network intrusion classification,” Evolving Syst., vol. 13, no. 1, 17–25, 2022. [CrossRef]

15. M. S. Karaman, M. Turan, and M. A. AYDİN, “Yapay sinir ağı kullanılarak anomali tabanlı saldırı tespit modeli uygulaması,” Avrupa Bilim Teknoloji Derg., pp. 17–25, 2020. [CrossRef]

16. J. Kim, Y. Shin, and E. Choi, “An intrusion detection model based on a convolutional neural network,” J. Multimed. Inf. Syst., vol. 6, no. 4, pp. 165–172, 2019. [CrossRef]

17. D. Gonzalez-Cuautle et al., “Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detectionsystem datasets,” Appl. Sci., vol. 10, no. 3, p. 794, 2020. [CrossRef]

18. M. Sarnovsky, and J. Paralic, “Hierarchical intrusion detection using machine learning and knowledge model,” Symmetry, vol. 12, no. 2, p. 203, 2020. [CrossRef]

19. S. K. Dey, and M. M. Rahman, “Effects of machine learning approach in flow-based anomaly detection on software-defined networking,” Symmetry, vol. 12, no. 1, p. 7, 2020. [CrossRef]

20. A. Alhowaide, I. Alsmadi, and J. Tang, “Pca, random-forest and Pearson correlation for dimensionality reduction in iot ids,” In IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vol. 2020. IEEE Publications, 2020, pp. 1–6.

21. S. Sen, K. D. Gupta, and M. Ahsan, “Leveraging machine learning approach to setup software-defined network (SDN) controller rules during DDoS attack,” In, Algorithms for Intelligent Systems, Proceedings of International Joint Conference on Computational Intelligence. Singapore: Springer, (pp. 49–60), 2020. [CrossRef]

22. W. Elmasry, A. Akbulut, and A. H. Zaim, “Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic,” Comput. Netw., vol. 168, 2020. [CrossRef]

23. W. Elmasry, A. Akbulut, and A. H. Zaim, “Empirical study on multiclass classification-based network intrusion detection,” Comp. Intell., vol. 35, no. 4, pp. 919–954, 2019. [CrossRef]

24. W. Elmasry, A. Akbulut, and A. H. Zaim, “Deep learning approaches for predictive masquerade detection,” Sec. Commun. Netw., vol. 2018, 1–24, 2018. [CrossRef]

25. M. Eskandari, Z. H. Janjua, M. Vecchio, and F. Antonelli, “Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices,” IEEE Internet Things J., vol. 7, no. 8, pp. 6882–6897, 2020. [CrossRef]

26. A. S. Kyatham, M. A. Nichal, and B. S. Deore, “A novel approach for network intrusion detection using probability parameter to ensemble machine learning models,” In Fourth International Conference on Computing Methodologies and Communication (ICCMC), Erode, India: IEEE Publications, 2020, pp. 608–613.

27. G. Farahani, “Feature selection based on cross-correlation for the intrusion detection system,” Sec. Commun. Netw., vol. 2020, 1–17, 2020. [CrossRef]

28. A. Makuvaza, D. S. Jat, and A. M. Gamundani, “Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs),” SN Comput. Sci., vol. 2, no. 2, pp. 1–10, 2021. [CrossRef]

29. A. A. Abdulrahman, and M. K. Ibrahem, “Toward constructing a balanced intrusion detection dataset based on CICIDS2017,” Samarra J. Pure Appl. Sci., vol. 2, no. 3, 2020.

30. S. Singh Panwar, Y. P. Raiwani, and L. S. Panwar, “Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset,” In International Conference on Advances in Engineering Science Management & Technology (ICAESMT). Dehradun, India: Uttaranchal University, 2019.

31. J. Li, Detection of ddos Attacks Based on Dense Neural Networks, Autoencoders and Pearson Correlation Coefficient [MSc. Dissertation]. Canada: Dalhousie University, 2020.