Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering

被引:0
|
作者
Usama Ahmed [1 ]
Mohammad Nazir [2 ]
Amna Sarwar [3 ]
Tariq Ali [4 ]
El-Hadi M. Aggoune [4 ]
Tariq Shahzad [5 ]
Muhammad Adnan Khan [6 ]
机构
[1] University of Management and Technology,Department of Artificial Intelligence, School of Systems and Technology
[2] The Islamia University of Bahawalpur,Department of Computer Science and Information Technology
[3] University of Wah,Department of Computer Science
[4] University of Tabuk,Artificial Intelligence and Sensing Technologies (AIST) Research Center
[5] COMSATS University Islamabad,Department of Computer Engineering
[6] Sahiwal Campus,Department of Software, Faculty of Artificial Intelligence and Software
[7] Gachon University,undefined
关键词
D O I
10.1038/s41598-025-85866-7
中图分类号
学科分类号
摘要
Network security is crucial in today’s digital world, since there are multiple ongoing threats to sensitive data and vital infrastructure. The aim of this study to improve network security by combining methods for instruction detection from machine learning (ML) and deep learning (DL). Attackers have tried to breach security systems by accessing networks and obtaining sensitive information.Intrusion detection systems (IDSs) are one of the significant aspect of cybersecurity that involve the monitoring and analysis, with the intention of identifying and reporting of dangerous activities that would help to prevent the attack.Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Random Forest (RF), Decision Tree (DT), Long Short-Term Memory (LSTM), and Artificial Neural Network (ANN) are the vector figures incorporated into the study through the results. These models are subjected to various test to established the best results on the identification and prevention of network violation. Based on the obtained results, it can be stated that all the tested models are capable of organizing data originating from network traffic. thus, recognizing the difference between normal and intrusive behaviors, models such as SVM, KNN, RF, and DT showed effective results. Deep learning models LSTM and ANN rapidly find long-term and complex pattern in network data. It is extremely effective when dealing with complex intrusions since it is characterised by high precision, accuracy and recall.Based on our study, SVM and Random Forest are considered promising solutions for real-world IDS applications because of their versatility and explainability. For the companies seeking IDS solutions which are reliable and at the same time more interpretable, these models can be promising. Additionally, LSTM and ANN, with their ability to catch successive conditions, are suitable for situations involving nuanced, advancing dangers.
引用
收藏
相关论文
共 50 条
  • [41] Combined Deep Learning Approaches for Intrusion Detection Systems
    Alshattnawi, Sawsan
    Alshboul, Hadeel Rida
    International Journal of Interactive Mobile Technologies, 2024, 18 (19) : 144 - 155
  • [42] Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
    Liu, Hongyu
    Lang, Bo
    APPLIED SCIENCES-BASEL, 2019, 9 (20):
  • [43] ENHANCING IIOT SECURITY WITH MACHINE LEARNING AND DEEP LEARNING FOR INTRUSION DETECTION
    Awad, Omer Fawzi
    Hazim, Layth Rafea
    Jasim, Abdulrahman Ahmed
    Ata, Oguz
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2024, 37 (02) : 139 - 153
  • [44] A Review of clustering techniques based on machine learning approach in intrusion detection systems
    Shakhatreh, Ala' Yaseen Ibrahim
    Bakar, Kamalrulnizam Abu
    International Journal of Computer Science Issues, 2011, 8 (5 5-3): : 373 - 381
  • [45] Fuzzy Clustering Based Anomaly Detection for Updating Intrusion Detection Signature Files
    Padath, Anish Abraham
    Endicott-Popovsky, Barbara
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 462 - 468
  • [46] Hybrid Intrusion Detection System for RPL IoT Networks Using Machine Learning and Deep Learning
    Shahid, Usama
    Hussain, Muhammad Zunnurain
    Hasan, Muhammad Zulkifl
    Haider, Ali
    Ali, Jibran
    Altaf, Jawad
    IEEE ACCESS, 2024, 12 : 113099 - 113112
  • [47] Characterizing Realistic Signature-based Intrusion Detection Benchmarks
    Aldwairi, Monther
    Alshboul, Mohammad A.
    Seyam, Asmaa
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 97 - 103
  • [48] Network intrusion detection using machine learning approaches: Addressing data imbalance
    Ahsan, Rahbar
    Shi, Wei
    Corriveau, Jean-Pierre
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2022, 7 (01) : 30 - 39
  • [49] Practical real-time intrusion detection using machine learning approaches
    Sangkatsanee, Phurivit
    Wattanapongsakorn, Naruemon
    Charnsripinyo, Chalermpol
    COMPUTER COMMUNICATIONS, 2011, 34 (18) : 2227 - 2235
  • [50] Machine Learning and Deep Learning Approaches for Guava Disease Detection
    K. Paramesha
    Shruti Jalapur
    Shalini Hanok
    Kiran Puttegowda
    G. Manjunatha
    Bharath Kumara
    SN Computer Science, 6 (4)