Skip to main content

Cyberthreat Detection Using Machine Learning

  • Conference paper
  • First Online:
Emerging Technology for Sustainable Development (EGTET 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1061))

  • 161 Accesses

Abstract

Millions of users have been a victim of cyberattacks, and thousands of companies are affected as well. This paper proposes Machine Learning to be used as a method to improve the detection rates of cyberthreats in a network which is better than the traditional signature or anomaly-based methods. Machine Learning can be used to detect threats and protect systems in real time thereby reducing the damage caused by attacks to a very high extent. In this paper, five Supervised Machine Learning algorithms, Random Forest, Logistic Regression, SVM, Decision Tree and Naive Bayes, have been used with optimized parameters and tuning and lastly, a deep learning algorithm; Convolutional Neural Network (CNN) has been used, and the performances have been compared among them. The algorithms performed well with Random Forest model being the highest. The results achieved prove that Machine Learning can be implemented to develop a threat detection system for a network which would be much more secure compared to the existing methods of detection and prevention.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Bedi P, Gupta N, Jindal V (2020) Siam-IDS: handling class imbalance problem.Intrus Detect Syst Siamese Neural Netw 171:780–789

    Google Scholar 

  • Chandrashekhar AM, Raghuveer (2013) Fortification of hybrid intrusion detection system using variants of neural networks and support vector machines. Int J Netw Secur Appl

    Google Scholar 

  • Costa K, Papa J, Lisboa C, Munoz R, Albuquerque V(2019) Internet of Things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151. https://doi.org/10.1016/j.comnet.2019.01.023

  • Hamid Y, Muthukumarasamy S, Journaux L (2016) Machine learning techniques for intrusion detection: a comparative analysis 1–6. https://doi.org/10.1145/2980258.2980378

  • Haq NF, Onik AR, Hridoy MAK, Rafni M, Shah FM, Md. Farid D (2015) Application of machine learning approaches in intrusion detection system: a survey. Int J Adv Res Artifi Intell (IJARAI) 4(3)

    Google Scholar 

  • Ilievski G, Latkoski P (2021) Serbian J Electric Eng 18(2):237–254

    Article  Google Scholar 

  • Kumar Shrivas A, Dewangan A (2014) An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. Int J Comput Appl 99:8–13. https://doi.org/10.5120/17447-5392

    Article  Google Scholar 

  • Le L-V, Sinh D, Lin B-SP, Tung LP (2018) Applying big data, machine learning, and SDN/NFV to 5G traffic clustering, forecasting, and management. In: Proceedings of the 4th IEEE conference on network softwarization and workshops (NetSoft). Montreal, Canada, pp 168–176

    Google Scholar 

  • Lee W, Stolfo SJ, Mok KW (1999) A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE symposium on security and privacy (Cat. No.99CB36344), pp 120–132. https://doi.org/10.1109/SECPRI.1999.766909

  • Li W, Yi P, Wu Y et al (2014) A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J Electric Comput Eng 2014(5):1–8

    Google Scholar 

  • Mukkamala S, Sung AH (1822) Feature selection for intrusion detection with neural networks and support vector machines. J Transp Res Board 2003:33–39

    Google Scholar 

  • Omar S, Jebur H, Benqdara S (2013) An adaptive intrusion detection model based on machine learning techniques. International J Comput Appl70. https://doi.org/10.5120/11971-6640

  • Parsaei MR, Sobouti MJ, Raouf Khayami S, Javidan R (2017) Network traffic classification using machine learning techniques over software defined networks. Int J Adv Comput Sci Appl 8(7):220–225

    Google Scholar 

  • Qu F, Zhang J, Shao Z, et al. (2017) An intrusion detection model based on deep belief network. In: Vi international conference, pp 97–101

    Google Scholar 

  • Sun C, Lv K, Hu C, Xie H (2018) A double-layer detection and classification approach for network attacks. In: 27th international conference on computer communication and networks (ICCCN). IEEE, Hangzhou, China, pp 1–8

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nupur Choudhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rajbangshi, S., Wangpan, C., Chaudhury, A., Choudhury, N., Mandal, R. (2024). Cyberthreat Detection Using Machine Learning. In: Deka, J.K., Robi, P.S., Sharma, B. (eds) Emerging Technology for Sustainable Development. EGTET 2022. Lecture Notes in Electrical Engineering, vol 1061. Springer, Singapore. https://doi.org/10.1007/978-981-99-4362-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-4362-3_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-4361-6

  • Online ISBN: 978-981-99-4362-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics