Machine learning for intrusion detection and network performance

Book chapter


Ibrahim Abobaker and Ahmad Musa 2021. Machine learning for intrusion detection and network performance. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)
AuthorsIbrahim Abobaker and Ahmad Musa
Abstract

Security mechanisms constitute a vital part towards the design of a computer network in modern-day organisations. In particular, the implementation of the principle of layered security to harden the network against attacks requires the introduction of checkpoints into the connectivity of components, which inevitably has an adverse impact on network performance. Moreover, advanced intrusion detection systems (IDSs) could be effectively utilised at the checkpoints of the computer network, leading to the analysis and determination of ‘optimal’ security versus performance trade-offs. To this end, a novel quantitative method is proposed for the evaluation and prediction of the aforementioned trade-offs supported by Machine Learning Algorithms (MLAs), such as Random Forest (RF) classifier, Logistic Regression (LR) and Naïve Bayes (NB) algorithms for Network Intrusion Detection Systems (NIDSs). In this context, a minimisation is employed in order to reduce the high dimensionality of datasets using Feature Selection (FS) for the dataset. Moreover, highly weighted features are used to keep false-negative (FN) low and increase the accuracy of MLAs towards the establishment of ‘optimal’ performance versus security tradeoffs. Typical numerical experiments are carried out indicating that the RF classifier is the best MLA, incorporating a subset of 19 selected features and identifying different types of attacks correctly with 99.9% of accuracy.

KeywordsComputer; Networks; Intrusion detection systems; Machine learning algorithms
Year2021
Book title2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)
Output statusPublished
ISBN9781665425742
9781665425759
Publication dates
Online2021
Publication process dates
Deposited23 Jan 2023
Digital Object Identifier (DOI)https://doi.org/10.1109/FiCloud49777.2021.00020
Official URLhttps://ieeexplore.ieee.org/document/9590237
Event 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)
Permalink -

https://repository.canterbury.ac.uk/item/939yq/machine-learning-for-intrusion-detection-and-network-performance

  • 114
    total views
  • 0
    total downloads
  • 2
    views this month
  • 0
    downloads this month

Export as

Related outputs

Comprehensive analysis of security issues in cloud-based Internet of Things: A survey
Gimba, U. A., Ariffrin, N. A. M., Musa, A. and Babangida, L. 2023. Comprehensive analysis of security issues in cloud-based Internet of Things: A survey. Journal of Computer Science & Computational Mathematics. 13 (2). https://doi.org/10.20967/jcscm.2023.02.004
Functional and performance analysis of discrete event network simulation tools
Musa, A. and Awan, I. 2022. Functional and performance analysis of discrete event network simulation tools. Simulation Modelling Practice and Theory. 116, p. 102470. https://doi.org/10.1016/j.simpat.2021.102470
The case for validating ADDIE model as a digital forensic model for peer to peer network investigation
Musa, A., Awan, I-U and Zarah, F. 2022. The case for validating ADDIE model as a digital forensic model for peer to peer network investigation. Information System Frontiers. https://doi.org/10.1007/s10796-022-10360-8
Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation
Ahmad Musa, Irfan-Ullah Awan and Ibrahim Abobaker 2021. Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE.
Self regulated learning in flipped classrooms: A systematic literature review
Rasheed Abubakar Rasheed, Amirrudin Kamsin, Nor Aniza Abdullah, Habeebah Adamu Kakudi, Auwal Shehu Ali, Ahmad Musa and Adamu Sani Yahaya 2020. Self regulated learning in flipped classrooms: A systematic literature review. International Journal of Information and Education Technology. 10 (11). https://doi.org/10.18178/ijiet.2020.10.11.1469
An investigation into peer-to-peer network security using Wireshark
Ahmad Musa, Aliyu Abubakar, Usman Abdul Gimba and Rasheed Abubakar Rasheed 2019. An investigation into peer-to-peer network security using Wireshark. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.
Transfer learning based histopathologic image classification for burns recognition
Aliyu Abubakar, Hassan Ugail, Ali Maina Bukar, Ali Ahmad Aminu and Ahmad Musa 2019. Transfer learning based histopathologic image classification for burns recognition. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.