A Novel Hybrid Fusion Model for Intrusion Detection Systems Using Benchmark Checklist Comparisons

Main Article Content

Widad K. Mohammed
Mohammed A. Taha
Saleh M. Mohammed

Abstract

Due to the quick development of network technology, assaults have become more sophisticated and dangerous. Numerous strategies have been put out to target different types of attacks and conduct trials using various approaches. In order to maintain network integrity and ensure network security, intrusion detection systems, or IDSs, are necessary. In this work, we investigate the effects of several feature extraction methods on IDS performance. We analyze the performance of various feature extraction techniques on two well-known intrusion detection datasets, NSL-KDD and CICIDS2017. Two datasets are used to test these approaches. By lowering dimensionality, enhancing data quality, and enabling visualization, principal component analysis (PCA) is a useful preprocessing method. But it's crucial to take into account its drawbacks and use it in conjunction with other preprocessing methods as necessary. The results are classified using the Decision Tree (DT), Random Forest (RF), Extreme Gradient Boosting (XGBoost), and Naive Bayes algorithms. This study aims to compare the final intrusion detection accuracy of each model in order to assess the performance of these approaches and gain a better understanding of the robustness and generalizability of each strategy across different dataset features. The experimental findings showed that the RF method reached a maximum accuracy of 98.57% on the NSL-KDD dataset and 97.10% on the CICIDS2017 dataset when conventional preprocessing was applied. However, with an accuracy of 97.85%, the RF model proved to be the most dependable model when used on the NSL-KDD dataset with both standard and fusion preprocessing.With standard and fusion preprocessing, the RF model achieved the best accuracy of 98.56% in the instance of the CICIDS2017 dataset. The findings demonstrated that PCA-based fusion preprocessing is not always the best option.

Article Details

Section

Articles

How to Cite

A Novel Hybrid Fusion Model for Intrusion Detection Systems Using Benchmark Checklist Comparisons (W. K. Mohammed, M. A. Taha, & S. M. Mohammed , Trans.). (2024). Mesopotamian Journal of CyberSecurity, 4(3), 216-232. https://doi.org/10.58496/MJCS/2024/024

References

J. K. Jain and A. A. Waoo, “An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System,” no. 02, pp. 33–42, 2023.

M. Markevych and M. Dawson, “A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI),” vol. XXIX, no. 3, pp. 30–37, 2023, doi: 10.2478/kbo-2023-0072.

M. Subhi, O. F. Rashid, S. A. Abdulsahib, M. K. Hussein, and S. M. Mohammed, “Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model,” Mesopotamian J. CyberSecurity, vol. 4, no. 2, pp. 120–128, 2024.

J. Byrnes, T. Hoang, N. N. Mehta, and Y. Cheng, “A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems,” pp. 218–225, 2020, doi: 10.1109/TPS-ISA50397.2020.00037.

A. Efe, “Comparison of the Host-Based Intrusion Detection Systems and Network-Based Intrusion Detection Systems,” vol. 18, no. 1, pp. 23–32, 2022, doi: 10.18466/cbayarfbe.832533.

S. Kumar, S. Gupta, and S. Arora, “Research Trends in Network-Based Intrusion Detection Systems : A Review,” IEEE Access, vol. 9, pp. 157761–157779, 2021, doi: 10.1109/ACCESS.2021.3129775.

H. Kwon, T. Kim, and M. Lee, “Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods †,” pp. 1–19, 2022.

P. P. Ioulianou, V. G. Vassilakis, I. D. Moscholios, and M. D. Logothetis, “A Signature-based Intrusion Detection System for the Internet of Things,” no. July, 2018.

S. Einy, C. Oz, and Y. D. Navaei, “The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems,” vol. 2021, 2021, doi: 10.1155/2021/6639714.

M. Janati, H. Alami, A. El, and A. El, “Fed-ANIDS : Federated learning for anomaly-based network intrusion detection systems,” Expert Syst. Appl., vol. 234, no. July, p. 121000, 2023, doi: 10.1016/j.eswa.2023.121000.

M. A. Taha, “A Review of Classifications Techniques and computer aided used for Breast Cancer Detection Medical image Features Extraction Classification,” no. 1, pp. 260–271.

I. Networks and A. Awajan, “A Novel Deep Learning-Based Intrusion Detection System for,” 2023.

M. Alazab, M. Alazab, A. Shalaginov, and A. Mesleh, “Intelligent mobile malware detection using permission requests and API calls,” Futur. Gener. Comput. Syst., vol. 107, pp. 509–521, 2020, doi: 10.1016/j.future.2020.02.002.

N. Chouhan, A. Khan, and H. Khan, “Network anomaly detection using channel boosted and residual learning based deep convolutional neural network,” Appl. Soft Comput. J., vol. 83, p. 105612, 2019, doi: 10.1016/j.asoc.2019.105612.

H. Zhang and B. Zhao, “SQL Injection Detection Based on Deep Belief Network,” 2019.

S. Promodya, T. Lasitha, J. Lasith, and Y. Pushpika, “Deep Neural Network Based Real ‑ Time Intrusion Detection System,” 2022.

C. Oumaima, C. Mouad, C. Khalid, and A. Ilyas, “Exploring the Impact of PCA Variants on Intrusion Detection System Performance,” vol. 15, no. 5, pp. 392–400, 2024.

S. Abadi, O. Avram, S. Rosset, T. Pupko, and I. Mayrose, “ModelTeller : Model Selection for Optimal Phylogenetic Reconstruction Using Machine Learning,” vol. 37, no. 11, pp. 3338–3352, 2020, doi: 10.1093/molbev/msaa154.

R. Arboretti, R. Ceccato, L. Pegoraro, and L. Salmaso, “Design choice and machine learning model performances,” no. April, pp. 3357–3378, 2022, doi: 10.1002/qre.3123.

I. Firat, F. Ertam, and A. Sengur, “Machine learning methods for cyber security intrusion detection : Datasets and comparative study,” Comput. Networks, vol. 188, no. December 2020, p. 107840, 2021, doi: 10.1016/j.comnet.2021.107840.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,” no. Cic, pp. 108–116, 2018, doi: 10.5220/0006639801080116.

G. Engelen, V. Rimmer, W. Joosen, and K. U. Leuven, “Troubleshooting an Intrusion Detection Dataset : the CICIDS2017 Case Study”.

R. Panigrahi and S. Borah, “A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems,” no. January, 2018.

M. E. Cimen, O. F. Boyraz, M. Z. Yildiz, and A. F. Boz, “A New Dorsal Hand Vein Authentication System Based on Fractal Dimension Box Counting Method,” Opt. - Int. J. Light Electron Opt., p. 165438, 2020, doi: 10.1016/j.ijleo.2020.165438.

M. M. Time-dependent et al., “Overview of PCA-Based Statistical Process- Dimensional Data Overview of PCA-Based Statistical Process-Monitoring Methods for Time-Dependent , High-Dimensional Data,” vol. 4065, no. January, 2018, doi: 10.1080/00224065.2015.11918137.

T. A. H, “Dimensionality Reduction and Classification through PCA and LDA,” vol. 122, no. 17, pp. 4–8, 2015.

M. Briscik, “I MPROVEMENT OF VARIABLES INTERPRETABILITY IN KERNEL,” 2023.

X. Deng, X. Tian, S. Chen, and C. J. Harris, “Nonlinear Process Fault Diagnosis Based on Serial Principal Component Analysis,” pp. 1–13, 2016.

J. R. Beattie and F. W. L. Esmonde-white, “Exploration of Principal Component Analysis : Deriving Principal Component Analysis Visually Using Spectra,” vol. 75, no. 4, pp. 361–375, 2021, doi: 10.1177/0003702820987847.

D. Jain and V. Singh, “Efficient Hybrid Feature Selection model for Dimensionality on Feature Efficient Hybrid Selection model for Dimensionality An Efficient Hybrid Selection model for Dimensionality Reduction on Feature Efficient Hybrid Feature Selection model for Dimensional,” Procedia Comput. Sci., vol. 132, no. Iccids, pp. 333–341, 2018, doi: 10.1016/j.procs.2018.05.188.

H. Listiyono, Z. Budiarso, S. Susilowati, and A. P. Windarto, “Comprehensive Sentiment Analysis of Religious Content Naive Bayes Algorithm Model,” vol. 8, pp. 602–611, 2024, doi: 10.30865/mib.v8i1.7062.

D. Jeevaraj, T. Vijayan, B. Karthik, and M. Sriram, “Feature Selection Model using Naive Bayes ML Algorithm for WSN Intrusion Detection System,” pp. 179–185.

Y. Zhuang and C. Singh, “Learning a Decision Tree Algorithm with Transformers,” pp. 1–24, 2024.

D. Chen, Q. Song, Y. Zhang, L. Li, and Z. Yang, “Identification of Network Traffic Intrusion Using Decision Tree,” vol. 2023, 2023, doi: 10.1155/2023/5997304.

S. Atir, S. Shamim, A. Hannan, and A. Anwar, “Intrusion detection using decision tree classifier with feature reduction technique,” vol. 42, no. 2, pp. 30–37, 2023.

S. Ben, J. Salma, M. Wali, and J. Laurent, “Forecasting gold price with the XGBoost algorithm and SHAP interaction values,” Ann. Oper. Res., no. 0123456789, 2021, doi: 10.1007/s10479-021-04187-w.

A. Prakash, J. Thangaraj, S. Roy, S. Srivastav, and J. K. Mishra, “Model-Aware XGBoost Method Towards Optimum Performance of Flexible Distributed Raman Amplifier,” vol. 15, no. 4, 2023.

Y. Villuendas-rey, “Random forest Algorithm for the Classification of Spectral Data of Astronomical Objects,” 2023.

N. Potyka and F. Toni, “Explaining Random Forests using Bipolar Argumentation and Markov Networks ( Technical Report ) arXiv : 2211 . 11699v1 [ cs . AI ] 21 Nov 2022,” pp. 1–23.

S. M. Muhammed, G. Abdul-Majeed, and M. S. Mahmoud, “Prediction of heart diseases by using supervised machine learning algorithms,” Wasit J. Pure Sci., vol. 2, no. 1, pp. 231–243, 2023.

K. C. Pai, S. A. Su, M. C. Chan, C. L. Wu, and W. C. Chao, “Explainable machine learning approach to predict extubation in critically ill ventilated patients: a retrospective study in central Taiwan,” BMC Anesthesiol., vol. 22, no. 1, pp. 1–11, 2022, doi: 10.1186/s12871-022-01888-y.

R. H. K. Al-Rubaye and A. K. TÜRKBEN, “Using Artificial Intelligence to Evaluating Detection of Cybersecurity Threats in Ad Hoc Networks”, BJN, vol. 2024, pp. 45–56, Apr. 2024.

Mohammad Aljanabi, “Safeguarding Connected Health: Leveraging Trustworthy AI Techniques to Harden Intrusion Detection Systems Against Data Poisoning Threats in IoMT Environments”, BJIoT, vol. 2023, pp. 31–37, May 2023.

A. S. . Bin Shibghatullah, “Mitigating Developed Persistent Threats (APTs) through Machine Learning-Based Intrusion Detection Systems: A Comprehensive Analysis”, SHIFRA, vol. 2023, pp. 17–25, Mar. 2023, doi: 10.70470/SHIFRA/2023/003.

Similar Articles

You may also start an advanced similarity search for this article.