Skip to main content

Machine Learning Approach to Automate Decision Support on Information System Attacks

  • Conference paper
  • First Online:
Business Intelligence (CBI 2022)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 449))

Included in the following conference series:

  • 519 Accesses

Abstract

As more software solutions are now cloud based taking advantage of the powerful computing performance of remote servers and super computers, the machine learning industry is also switching to this technology providing promising solutions such as Google Cloud Artificial Intelligence, Amazon Web Services, and Microsoft Azure Machine Learning. With the adoption of the cloud technology for nowadays computer transactions and operations, a cloud IDS solution that can compete with the emerging technology challenges is crucially needed to help network administrators secure data and prevent any intrusions. The machine learning approaches often require high computing performance and gigantic memory space to process mega datasets and come up with better prediction results. This paper introduces a new aspect of using cloud-based machine learning solution as an online computing resource for the application of machine learning concepts to predict intrusions in IDS systems based on network packet behavior, while the traditional way is to use local computer resources through data mining solutions such as Weka or Orange. We used Microsoft Azure Machine Learning Studio along with CSE-CIC-IDS 2018 dataset from the Canadian Institute for Cyber Security to apply various techniques and algorithms to come up with a powerful network model. The aim of this paper is to explain how a cloud-based data mining tool can be used for its better performance and high accuracy for data mining and building a strong intrusion detection system. As a start point, we used a saved dataset that contains a collection of anomaly detection records applied on an IDS while various attributes are registered. To differentiate between normal and anomalous traffic, two profiles are used: B-profile and M- profile to generate benign and malicious traffic respectively in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar, M.: An incorporation of artificial intelligence capabilities in cloud computing. Int. J. Eng. Comput. Sci. 5(11), 19070–19073 (2016)

    Google Scholar 

  2. Cloud, Amazon Elastic Compute. Amazon web services (2011). Retrieved 9 Nov 2011

    Google Scholar 

  3. Mund, S.: Microsoft azure machine learning. Packt Publishing Ltd (2015)

    Google Scholar 

  4. Hall, M., et al.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newsl. 11(1), 10–18 (2009)

    Google Scholar 

  5. Demšar, J., et al.: Orange: data mining toolbox in Python. J. Mach. Learn. Res. 14(1), 2349–2353 (2013)

    MATH  Google Scholar 

  6. Kanimozhi, V., Jacob, T.P.: Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. In: 2019 International Conference on Communication and Signal Processing (ICCSP). IEEE (2019)

    Google Scholar 

  7. Panigrahi, R., Borah, S.: A statistical analysis of lazy classifiers using canadian institute of cybersecurity datasets. In: Borah, S., Emilia Balas, V., Polkowski, Z. (eds.) Advances in Data Science and Management. LNDECT, vol. 37, pp. 215–222. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-0978-0_21

    Chapter  Google Scholar 

  8. Kanimozhi, V., Jacob, T.P.: Artificial intelligence outflanks all other machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express 7(3), 366–370 (2021)

    Article  Google Scholar 

  9. Gasso, G.: Logistic regression (2019)

    Google Scholar 

  10. Ou, G., Murphey, Y.L.: Multi-class pattern classification using neural networks. Pattern Recognit. 40(1), 4–18 (2007)

    Article  Google Scholar 

  11. Leevy, J.L., Khoshgoftaar, T.M.: A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 big data. J. Big Data 7(1), 1–19 (2020). https://doi.org/10.1186/s40537-020-00382-x

    Article  Google Scholar 

  12. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, pp. 108–116 (2018)

    Google Scholar 

  13. Hua, Y.: An efficient traffic classification scheme using embedded feature selection and LightGBM. In: 2020 Information Communication Technologies Conference (ICTC). IEEE (2020)

    Google Scholar 

  14. Kanimozhi, V., Jacob, T.P.: Calibration of various optimized machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. Int. J. Eng. Appl. Sci. Technol. 4(6), 209–213 (2019)

    Google Scholar 

  15. Kramer, O.: Scikit-learn. In: Kramer, O. (ed.) Machine learning for evolution strategies, pp. 45–53. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33383-0_5

    Chapter  MATH  Google Scholar 

  16. Pal, M.: Random forest classifier for remote sensing classification. Int. J. Remote Sens. 26(1), 217–222 (2005)

    Article  Google Scholar 

  17. Yigit, H.: A weighting approach for KNN classifier. In: 2013 International Conference on Electronics, Computer and Computation (ICECCO). IEEE (2013)

    Google Scholar 

  18. Rueping, S.: SVM classifier estimation from group probabilities. In: ICML (2010)

    Google Scholar 

  19. Schapire, R.E.: Explaining adaboost. In: Schölkopf, B., Luo, Z., Vovk, V. (eds.) Empirical inference, pp. 37–52. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41136-6_5

    Chapter  Google Scholar 

  20. Webb, G.I., Keogh, E., Miikkulainen, R.: Naïve Bayes. Encyclopedia Mach. Learn. 15, 713–714 (2010)

    Google Scholar 

  21. Huang, J., Ling, C.X.: Using AUC and accuracy in evaluating learning algorithms. IEEE Trans. Knowl. Data Eng. 17(3), 299–310 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Baslam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wadiai, Y., Baslam, M. (2022). Machine Learning Approach to Automate Decision Support on Information System Attacks. In: Fakir, M., Baslam, M., El Ayachi, R. (eds) Business Intelligence. CBI 2022. Lecture Notes in Business Information Processing, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-031-06458-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06458-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06457-9

  • Online ISBN: 978-3-031-06458-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics