TY - GEN
T1 - Cyber intrusion detection using machine learning classification techniques
AU - Alqahtani, Hamed
AU - Sarker, Iqbal H.
AU - Kalim, Asra
AU - Minhaz Hossain, Syed Md
AU - Ikhlaq, Sheikh
AU - Hossain, Sohrab
PY - 2020
Y1 - 2020
N2 - As the alarming growth of connectivity of computers and the significant number of computer-related applications increase in recent years, the challenge of fulfilling cyber-security is increasing consistently. It also needs a proper protection system for numerous cyberattacks. Thus, detecting inconsistency and attacks in a computer network and developing intrusion detection system (IDS) that performs a potential role for cyber-security. Artificial intelligence, particularly machine learning techniques, has been used to develop a useful data-driven intrusion detection system. In this paper, we employ various popular machine learning classification algorithms, namely Bayesian Network, Naive Bayes classifier, Decision Tree, Random Decision Forest, Random Tree, Decision Table, and Artificial Neural Network, to detect intrusions due to provide intelligent services in the domain of cyber-security. Finally, we test the effectiveness of various experiments on cyber-security datasets having several categories of cyber-attacks and evaluate the effectiveness of the performance metrics, precision, recall, f1-score, and accuracy.
AB - As the alarming growth of connectivity of computers and the significant number of computer-related applications increase in recent years, the challenge of fulfilling cyber-security is increasing consistently. It also needs a proper protection system for numerous cyberattacks. Thus, detecting inconsistency and attacks in a computer network and developing intrusion detection system (IDS) that performs a potential role for cyber-security. Artificial intelligence, particularly machine learning techniques, has been used to develop a useful data-driven intrusion detection system. In this paper, we employ various popular machine learning classification algorithms, namely Bayesian Network, Naive Bayes classifier, Decision Tree, Random Decision Forest, Random Tree, Decision Table, and Artificial Neural Network, to detect intrusions due to provide intelligent services in the domain of cyber-security. Finally, we test the effectiveness of various experiments on cyber-security datasets having several categories of cyber-attacks and evaluate the effectiveness of the performance metrics, precision, recall, f1-score, and accuracy.
KW - Artificial intelligence
KW - Classification
KW - Cyber-attack prediction
KW - Cyber-attacks
KW - Cybersecurity
KW - Cybersecurity analytics
KW - Intrusion detection system
KW - Intrusions
KW - Machine learning
UR - http://www.scopus.com/inward/record.url?scp=85089210821&partnerID=8YFLogxK
U2 - 10.1007/978-981-15-6648-6_10
DO - 10.1007/978-981-15-6648-6_10
M3 - Conference proceeding contribution
AN - SCOPUS:85089210821
SN - 9789811566479
T3 - Communications in Computer and Information Science
SP - 121
EP - 131
BT - Computing Science, Communication and Security
A2 - Chaubey, Nirbhay
A2 - Parikh, Satyen
A2 - Amin, Kiran
PB - Springer, Springer Nature
CY - Singapore
T2 - 1st International Conference on Computing Science, Communication and Security, COMS2 2020
Y2 - 26 March 2020 through 27 March 2020
ER -