Real-time Intrusion Detection System Using Machine Learning for Enhanced and Efficient Cybersecurity in Organizations

Main Article Content

Natdanai Kongkhunthod
Prasong Praneetpolgrang
Payap Sirinam

Abstract

The purpose of this research is to create a real-time cyber intrusion detection system using machine learning to strengthen and enhance cybersecurity within organizations. RapidMiner Studio was used to analyze intrusion data with 4 algorithms: Decision Tree, Naïve Bayes, Random Forest, and Gradient Boosted Trees. The algorithms were evaluated and compared using the Royal Air Force Cyber Intrusion Detection Dataset (RTAF Dataset) to determine their accuracy based on precision and recall values. The top 2 from 4 performing algorithms were then combined using ensemble machine learning techniques. The resulting algorithm was evaluated and compared based on precision and recall values. The algorithm with the highest performance was then used to create a real-time cyber intrusion detection system using machine learning. The results showed that the real-time cyber intrusion detection system using machine learning for strengthening and enhancing cybersecurity in organizations, developed using a software development process combined with ensemble machine learning-based real-time cyber intrusion detection using the Gradient Boosted Trees algorithm in conjunction with the Naïve Bayes algorithm using the Stacking technique, can provide prediction results with an accuracy of 99.77% and a precision of 88.59%.

Article Details

Section
Research Article

References

National Cyber Security Agency, “Cyber Threat Statistics,” 2023. [Online]. Available https://ncsa.or.th/service-statistics.html

Royal Thai Air Force, “Royal Thai air force strategy for 20 years (B.E. 2561–2580) (revised version),” 2020. [Online]. Available: https://welcome-page.rtaf.mi.th/blog/e-ksaarephyaephr-11/yuththsaastrk-ngthaph-aakaas-20-pii-ph-s-2561-2580-38

A. H. Janabi, T. Kanakis, and M. Johnson, “Overhead reduction technique for software-defined network based intrusion detection systems,” IEEE Access, vol. 10, pp. 66481–66491, 2022.

A. S. A. Aziz, S. E.-O. Hanafi, and A. E. Hassanien, “Comparison of classification techniques applied for network intrusion detection and classification,” J. Appl. Logic, vol. 24, pp. 109–118, Nov. 2017.

G. Karatas, O. Demir, and O. K. Sahingoz, “Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset,” IEEE Access, vol. 8, pp. 32150–32162, 2020.

A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges,” Cybersecurity, vol. 2, no. 1, 2019, Art. no. 20, doi: 10.1186/s42400-019-0038-7.

T. A. Alamiedy, M. Anbar, A. K. Al-Ani, B. N. Al-Tamimi, and N. Faleh, “Review on feature selection algorithms for anomaly-based intrusion detection system,” in Proc. 3rd Int. Conf. Reliable Inf. and Commun. Technol., Kuala Lumpur, Malaysia, Jun. 2018, pp. 605–619.

I. Garcia-Magarino, G. Gray, R. Lacuesta, and J. Lloret, “Survivability strategies for emerging wireless networks with data mining techniques: A case study with NetLogo and RapidMiner,” IEEE Access, vol. 6, pp. 27958–27970, 2018.

A. Karim, M. Shahroz, K. Mustofa, S. B. Belhaouari, and S. R. K. Joga, “Phishing detection system through hybrid machine learning based on URL,” IEEE Access, vol. 11, pp. 36805–36822, 2023.

T. M. Mitchell, Machine Learning. New York, NY, USA: McGraw-Hill, 1997.

H. Yin, M. Xue, Y. Xiao, K. Xia, and G. Yu, “Intrusion detection classification model on an improved k-dependence Bayesian network,” IEEE Access, vol. 7, pp. 157555–157563, 2019.

L. Jian and K.-T. Chau, “Analytical calculation of magnetic field distribution in coaxial magnetic gears,” Prog. Electromagn. Res., vol. 92, pp. 1–16, 2009.

N. Mahdi Abdulkareem and A. M. Abdulazeez, “Machine learning classification based on random forest algorithm: A review,” Int. J. Sci. Bus., vol. 5, no. 2, pp. 128–142, 2021.

W. Li, W. Wang, and W. Huo, “RegBoost: A gradient boosted multivariate regression algorithm,” Int. J. Crowd Sci., vol. 4, no. 1, pp. 60–72, 2020.

D. Stiawan, “An approach for optimizing ensemble intrusion detection systems,” IEEE Access, vol. 9, pp. 6930–6947, 2021.

H. Luo, F. Cheng, H. Yu, and Y. Yi, “SDTR: Soft decision tree regressor for tabular data,” IEEE Access, vol. 9, pp. 55999–56011, 2021.

M. Mohy-Eddine, A. Guezzaz, S. Benkirane, M. Azrour, and Y. Farhaoui, “An ensemble learning based intrusion detection model for industrial IoT security,” Big Data Mining and Analytics, vol. 6, no. 3, pp. 273–287, 2023.

S. Ismail, Z. El Mrabet, and H. Reza, “An ensemble-based machine learning approach for cyber-attacks detection in wireless sensor networks,” Appl. Sci., vol. 13, no. 1, 2022, Art. no. 30.

A. Agarwal, A. Agarwal, D. K. Verma, D. Tiwari, and R. Pandey, “A review on software development life cycle,” Int. J. Scientific Res. Comput. Sci., Eng. Inf. Technol., vol. 9, no. 3, pp. 384–388, 2023, doi: 10.32628/cseit2390387.

C. Qi, J. Diao, and L. Qiu, “On estimating model in feature selection with cross-validation,” IEEE Access, vol. 7, pp. 33454–33463, 2019.

G.-P. Fernando, A.-A. H. Brayan, A. M. Florina, C.-B. Liliana, A.-M. Héctor-Gabriel, and T.-S. Reinel, “Enhancing intrusion detection in IoT communications through ML model generalization with a new dataset (IDSAI),” IEEE Access, vol. 11, pp. 70542–70559, 2023.

L. Zou, X. Luo, Y. Zhang, X. Yang, and X. Wang, “HC-DTTSVM: A network intrusion detection method based on decision tree twin support vector machine and hierarchical clustering,” IEEE Access, vol. 11, pp. 21404–21416, 2023.

S. Ameer, “Comparative analysis of machine learning techniques for predicting air quality in smart cities,” IEEE Access, vol. 7, pp. 128325–128338, 2019.

W. Alhakami, A. ALharbi, S. Bourouis, R. Alroobaea, and N. Bouguila, “Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection,” IEEE Access, vol. 7, pp. 52181–52190, 2019.

X. Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An adaptive ensemble machine learning model for intrusion detection,” IEEE Access, vol. 7, pp. 82512–82521, 2019.

Y. Yu and N. Bian, “An intrusion detection method using few-shot learning,” IEEE Access, vol. 8, pp. 49730–49740, 2020.

Z. Wu, H. Zhang, P. Wang, and Z. Sun, “RTIDS: A robust transformer-based approach for intrusion detection system,” IEEE Access, vol. 10, pp. 64375–64387, 2022.

S. Gibson, B. Issac, L. Zhang, and S. M. Jacob, “Detecting spam email with machine learning optimized with bio-inspired metaheuristic algorithms,” IEEE Access, vol. 8, pp. 187914–187932, 2020.

R. Zhao, Y. Mu, L. Zou, and X. Wen, “A hybrid intrusion detection system based on feature selection and weighted stacking classifier,” IEEE Access, vol. 10, pp. 71414–71426, 2022.

A. A. Taha and S. J. Malebary, “An intelligent approach to credit card fraud detection using an optimized light gradient boosting machine,” IEEE Access, vol. 8, pp. 25579–25587, 2020.