Abstract
Millions of users have been a victim of cyberattacks, and thousands of companies are affected as well. This paper proposes Machine Learning to be used as a method to improve the detection rates of cyberthreats in a network which is better than the traditional signature or anomaly-based methods. Machine Learning can be used to detect threats and protect systems in real time thereby reducing the damage caused by attacks to a very high extent. In this paper, five Supervised Machine Learning algorithms, Random Forest, Logistic Regression, SVM, Decision Tree and Naive Bayes, have been used with optimized parameters and tuning and lastly, a deep learning algorithm; Convolutional Neural Network (CNN) has been used, and the performances have been compared among them. The algorithms performed well with Random Forest model being the highest. The results achieved prove that Machine Learning can be implemented to develop a threat detection system for a network which would be much more secure compared to the existing methods of detection and prevention.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bedi P, Gupta N, Jindal V (2020) Siam-IDS: handling class imbalance problem.Intrus Detect Syst Siamese Neural Netw 171:780–789
Chandrashekhar AM, Raghuveer (2013) Fortification of hybrid intrusion detection system using variants of neural networks and support vector machines. Int J Netw Secur Appl
Costa K, Papa J, Lisboa C, Munoz R, Albuquerque V(2019) Internet of Things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151. https://doi.org/10.1016/j.comnet.2019.01.023
Hamid Y, Muthukumarasamy S, Journaux L (2016) Machine learning techniques for intrusion detection: a comparative analysis 1–6. https://doi.org/10.1145/2980258.2980378
Haq NF, Onik AR, Hridoy MAK, Rafni M, Shah FM, Md. Farid D (2015) Application of machine learning approaches in intrusion detection system: a survey. Int J Adv Res Artifi Intell (IJARAI) 4(3)
Ilievski G, Latkoski P (2021) Serbian J Electric Eng 18(2):237–254
Kumar Shrivas A, Dewangan A (2014) An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. Int J Comput Appl 99:8–13. https://doi.org/10.5120/17447-5392
Le L-V, Sinh D, Lin B-SP, Tung LP (2018) Applying big data, machine learning, and SDN/NFV to 5G traffic clustering, forecasting, and management. In: Proceedings of the 4th IEEE conference on network softwarization and workshops (NetSoft). Montreal, Canada, pp 168–176
Lee W, Stolfo SJ, Mok KW (1999) A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE symposium on security and privacy (Cat. No.99CB36344), pp 120–132. https://doi.org/10.1109/SECPRI.1999.766909
Li W, Yi P, Wu Y et al (2014) A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J Electric Comput Eng 2014(5):1–8
Mukkamala S, Sung AH (1822) Feature selection for intrusion detection with neural networks and support vector machines. J Transp Res Board 2003:33–39
Omar S, Jebur H, Benqdara S (2013) An adaptive intrusion detection model based on machine learning techniques. International J Comput Appl70. https://doi.org/10.5120/11971-6640
Parsaei MR, Sobouti MJ, Raouf Khayami S, Javidan R (2017) Network traffic classification using machine learning techniques over software defined networks. Int J Adv Comput Sci Appl 8(7):220–225
Qu F, Zhang J, Shao Z, et al. (2017) An intrusion detection model based on deep belief network. In: Vi international conference, pp 97–101
Sun C, Lv K, Hu C, Xie H (2018) A double-layer detection and classification approach for network attacks. In: 27th international conference on computer communication and networks (ICCCN). IEEE, Hangzhou, China, pp 1–8
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rajbangshi, S., Wangpan, C., Chaudhury, A., Choudhury, N., Mandal, R. (2024). Cyberthreat Detection Using Machine Learning. In: Deka, J.K., Robi, P.S., Sharma, B. (eds) Emerging Technology for Sustainable Development. EGTET 2022. Lecture Notes in Electrical Engineering, vol 1061. Springer, Singapore. https://doi.org/10.1007/978-981-99-4362-3_27
Download citation
DOI: https://doi.org/10.1007/978-981-99-4362-3_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-4361-6
Online ISBN: 978-981-99-4362-3
eBook Packages: Computer ScienceComputer Science (R0)