Leveraging machine learning for enhanced cybersecurity: an intrusion detection system

被引:0
|
作者
Sahib, Wurood Mahdi [1 ]
Alhuseen, Zainab Ali Abd [2 ]
Saeedi, Iman Dakhil Idan [3 ]
Abdulkadhem, Abdulkadhem A. [4 ]
Ahmed, Ali [5 ]
机构
[1] Univ Babylon, Coll Med, Dept Physiol & Med Phys, Babylon, Iraq
[2] Univ Babylon, Coll Engn, Babylon, Iraq
[3] Univ Babylon, Coll Informat Technol, Dept Informat Networks, Babylon, Iraq
[4] Al Mustaqbal Univ, Coll Sci, Dept Cyber Secur, Babylon 51001, Iraq
[5] AlNoor Univ, Dept Med Labs Technol, Nineveh, Iraq
关键词
Cyber-security; ML; K-NN; Classification; Intrusion detection system;
D O I
10.1007/s11761-024-00435-6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Classification remains vital in cybersecurity since different data require different protection measures against threats. This paper compares the Decision Tree, K-Nearest Neighbor (KNN) and Logistic Regression algorithms in tackling cybersecurity datasets especially ones that are unbalanced. The performance of the models was evaluated with the help of Mean Absolute Error (MAE), Mean Squared Error (MSE), RMSE, R2 Score and Accuracy along with the Classification Report which gives precision, recall, F1-score and support of each class. From the table, it is evident that the Decision Tree classifier performs the best in terms of error rates hence obtaining the accuracy of 98. Part B: Multiple regression analysis of the comparative market analysis values, for clients the R2 Score attained was 09% and an R2 Score of 89. 56%. Despite fairly good results obtained by KNN, its accuracy was not equally effective across the minority classes. Relative to the other models, Logistic Regression, was the most accurate but it recorded the highest error rate. Based on that the results, it can be concluded that even though Decision Tree models turned out to be better for this purpose, KNN and the Logistic Regression could be better if they are to be optimized.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] An Intrusion Detection System for SDN Using Machine Learning
    Logeswari, G.
    Bose, S.
    Anitha, T.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (01): : 867 - 880
  • [22] An Investigation on Intrusion Detection System Using Machine Learning
    Patgiri, Ripon
    Varshney, Udit
    Akutota, Tanya
    Kunde, Rakesh
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1684 - 1691
  • [23] HYBRID MACHINE LEARNING TECHNIQUE FOR INTRUSION DETECTION SYSTEM
    Tahir, Hatim Mohamad
    Hasan, Wael
    Said, Abas Md
    Zakaria, Nur Haryani
    Katuk, Norliza
    Kabir, Nur Farzana
    Omar, Mohd Hasbullah
    Ghazali, Osman
    Yahya, Noor Izzah
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS, 2015, : 464 - 472
  • [24] Cascaded intrusion detection system using machine learning
    Ahamed, Md. Khabir Uddin
    Karim, Abdul
    SYSTEMS AND SOFT COMPUTING, 2025, 7
  • [25] Machine learning approach to realtime intrusion detection system
    Kim, BJ
    Kim, IK
    AI 2005: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2005, 3809 : 153 - 163
  • [26] Hybrid intrusion detection system using machine learning
    Meryem A.
    Ouahidi B.E.
    Network Security, 2020, 2020 (05) : 8 - 19
  • [27] An ensemble system for machine learning IoT intrusion detection based on enhanced artificial hummingbird algorithm
    Shi, Leyi
    Yang, Qihang
    Gao, Luhan
    Ge, Haowei
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01):
  • [28] Enhancing Intrusion Detection System Using Machine Learning and Deep Learning
    Madhusudhan, R.
    Thakur, Shubham Kumar
    Pravisha, P.
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 3, AINA 2024, 2024, 201 : 326 - 337
  • [29] A Study: Machine Learning and Deep Learning Approaches for Intrusion Detection System
    Sekhar, C. H.
    Rao, K. Venkata
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 845 - 849
  • [30] Leveraging Theory for Enhanced Machine Learning
    Audus, Debra J.
    McDannald, Austin
    DeCost, Brian
    ACS MACRO LETTERS, 2022, 11 (09) : 1117 - 1122