CFP last date
20 December 2024
Reseach Article

Real-Time Intrusion Detection based on Network Monitoring and Machine Learning

by Subhadeep Chakraborty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 22
Year of Publication: 2023
Authors: Subhadeep Chakraborty
10.5120/ijca2023922955

Subhadeep Chakraborty . Real-Time Intrusion Detection based on Network Monitoring and Machine Learning. International Journal of Computer Applications. 185, 22 ( Jul 2023), 1-8. DOI=10.5120/ijca2023922955

@article{ 10.5120/ijca2023922955,
author = { Subhadeep Chakraborty },
title = { Real-Time Intrusion Detection based on Network Monitoring and Machine Learning },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2023 },
volume = { 185 },
number = { 22 },
month = { Jul },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number22/32821-2023922955/ },
doi = { 10.5120/ijca2023922955 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:26:43.357832+05:30
%A Subhadeep Chakraborty
%T Real-Time Intrusion Detection based on Network Monitoring and Machine Learning
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 22
%P 1-8
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The threat of cyber-attacks continues to grow in significance as our world becomes increasingly reliant on digital communication and data storage. Network intrusion detection aims to prevent unauthorized access, protect sensitive information and preserve digital systems' integrity. In this in-depth research study, the network-based intrusion detection methods for identifying suspicious and malicious network activities have been examined. By utilizing network monitoring techniques to capture and collect data, along with machine learning algorithms for classifying intrusive packets, network intrusion detection has been performed. Initially, Wireshark has been employed for network monitoring, successfully capturing a total of 28,889 packets and storing them in PCAP format. This PCAP data was then used for preliminary analysis to investigate the properties of the packets. Following this, the PCAP data was converted into a Comma Separated File format, facilitating the application of machine learning algorithms for further examination. During data preparation, Principal Component Analysis has been employed to detect and eliminate outliers, along with the Chi-Squared method for feature selection. The research involved testing five machine learning models on the processed data, to achieve the most effective model for intrusion detection. Ultimately, the Random Forest algorithm has excelled, boasting an outstanding accuracy rate of 99.43%. This comprehensive investigation highlights the immense potential of network-based intrusion detection methods for uncovering and addressing cyber threats on both a large and small scale.

References
  1. N. Z. Joodaki, M. B. Dowlatshahi and M. Joodaki, "A novel ensemble feature selection method through Type I fuzzy," In 2022 9th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS) IEEE., pp. (pp. 1-6)., 2022.
  2. S. Kejriwal, D. Patadia, S. Dagli and P. Tawde, "Machine Learning Based Intrusion Detection," Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1-4, 2022.
  3. X. Yao and Z.-L. Li, "Distributed stealthy traffic anomaly detection based on wavelet packet analysis," 2009 International Conference on Apperceiving Computing and Intelligence Analysis, , pp. 203-206, 2009.
  4. C. Kaushik, T. Ram and C. Ritvik, "Network Security with Network Intrusion Detection System using Machine Learning Deployed in a Cloud Infrastructure," 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 701-708, 2022.
  5. G. Fu, B. Li, Y. Yang and Q. Wei, "A Multi-Distance Ensemble and Feature Clustering Based Feature Selection Approach for Network Intrusion Detection.," In 2022 International Symposium on Sensing and Instrumentation in 5G and IoT Era (ISSI) IEEE., pp. (pp. 160-164)., 2022.
  6. P.-O. Brissaud, J. Francçis, I. Chrisment, T. Cholez and O. Bettan, "Transparent and service-agnostic monitoring of encrypted web traffic," IEEE Transactions on Network and Service Management, pp. pp.842-856, 2019.
  7. G. Yedukondalu, G. H. Bindu, J. Pavan, G. Venkatesh and A. SaiTeja, "Intrusion Detection System Framework Using Machine Learning," Third International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 1-5, 2021.
  8. B. Yang and D. Liu, "Research on network traffic identification based on machine learning and deep packet inspection," IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. pp. 1887-1891, 2019.
  9. T. Zhang and S. Bao, "A Novel Deep Neural Network Model for Computer Network Intrusion Detection Considering Connection Efficiency of Network Systems," 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 962-965, 2022.
  10. P. Xiang, C. Peng and Q. Li, "Hierarchical Association Features Learning for Network Traffic Recognition," International Conference on Information Processing and Network Provisioning (ICIPN, pp. pp. 129-133, 2022.
  11. N. D. Patel and B. M. Mehtre, "Detection of Intrusions using Support Vector Machines and Deep Neural Networks," 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 1-5, 2022.
  12. Z. Xi, Y. Zhou, D. Zhang, K. Gao, C. Sun, J. Cao, Y. Wang, M. Xu and J. Wu, "Newton: Intent-driven network traffic monitoring," IEEE/ACM Transactions on Networking, 30(2),, pp. pp.939-952, 2021.
  13. S. Rosidin, G. F. Shidik, A. Z. Fanani and F. Al Zami, "Improvement with Chi Square Selection Feature using Supervised Machine Learning Approach on Covid-19 Data.," In 2021 International Seminar on Application for Technology of Information and Communication (ISemantic) IEEE., pp. (pp. 32-36)., 2021.
  14. A. E. Putra and L. K. Wardhani, "Chi-Square Feature Selection Effect On Naive Bayes Classifier Algorithm Performance For Sentiment Analysis Document.," In 2019 7th International Conference on Cyber and IT Service Management (CITSM) (Vol. 7, ). IEEE., pp. pp. 1-7, 2019.
  15. Y. Zhai, W. Song, X. Liu, L. Liu and X. Zhao, "A chi-square statistics based feature selection method in text classification.," In 2018 IEEE 9th International conference on software engineering and service science (ICSESS). IEEE., pp. pp. 160-163, 2018.
  16. Z. Wang and X. Shu, "Feature Selection for Bayesian Inference Network in Radar Jamming Effect Analysis.," In 2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP) . IEEE., pp. (pp. 620-623), 2021.
  17. M. Lackovic, "Performance analysis of packet switched all-optical networks," Proceedings of 2003 5th International Conference on Transparent Optical Networks, , pp. 174-179, 2003.
  18. B. Mikkelsen and S. Danielsen, "Analysis of a WDM packet switch with improved performance under bursty traffic conditions due to tuneable wavelength converters," Journal of Lightwave Technology, vol. 16, no. 5, pp. 729-735, 1998.
  19. A. Singhal, A. Maan, D. Chaudhary and D. Vishwakarma, "A Hybrid Machine Learning and Data Mining Based Approach to Network Intrusion Detection," International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 1-5, 2021.
  20. S. Neupane, J. Ables, W. Anderson and S. Mittal, "Explainable intrusion detection systems (x-ids)," A survey of current methods, challenges, and opportunities, pp. pp.112392-112415, 2022.
  21. D. Hongle and Z. Lin, "Research on SDN intrusion detection based on online ensemble learning algorithm," 2020 International Conference on Networking and Network Applications (NaNA), pp. 114-118, 2020.
  22. D. Selvamani and V. Selvi, "An efficacious intellectual framework for host based intrusion detection system," Procedia Computer Science, pp. 9-17, 2019.
  23. Y. Jieun, W. Lee and H. Jeong, "Poster Abstract: A Semi-Supervised Approach for Network Intrusion Detection Using Generative Adversarial Networks," IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1-2, 2021.
Index Terms

Computer Science
Information Sciences

Keywords

Network Monitoring Intrusion Detection Classification Machine Learning Cyber Security.