Cargando…

Computational Intelligence Approaches in Developing Cyberattack Detection System

The Internet plays a fundamental part in relentless correspondence, so its applicability can decrease the impact of intrusions. Intrusions are defined as movements that unfavorably influence the focus of a computer. Intrusions may sacrifice the reputability, integrity, privacy, and accessibility of...

Descripción completa

Detalles Bibliográficos
Autores principales: Alzahrani, Mohammed Saeed, Alsaade, Fawaz Waselallah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8956412/
https://www.ncbi.nlm.nih.gov/pubmed/35341179
http://dx.doi.org/10.1155/2022/4705325
_version_ 1784676563455836160
author Alzahrani, Mohammed Saeed
Alsaade, Fawaz Waselallah
author_facet Alzahrani, Mohammed Saeed
Alsaade, Fawaz Waselallah
author_sort Alzahrani, Mohammed Saeed
collection PubMed
description The Internet plays a fundamental part in relentless correspondence, so its applicability can decrease the impact of intrusions. Intrusions are defined as movements that unfavorably influence the focus of a computer. Intrusions may sacrifice the reputability, integrity, privacy, and accessibility of the assets attacked. A computer security system will be traded off when an intrusion happens. The novelty of the proposed intelligent cybersecurity system is its ability to protect Internet of Things (IoT) devices and any networks from incoming attacks. In this research, various machine learning and deep learning algorithms, namely, the quantum support vector machine (QSVM), k-nearest neighbor (KNN), linear discriminant and quadratic discriminant long short-term memory (LSTM), and autoencoder algorithms, were applied to detect attacks from signature databases. The correlation method was used to select important network features by finding the features with a high-percentage relationship between the dataset features and classes. As a result, nine features were selected. A one-hot encoding method was applied to convert the categorical features into numerical features. The validation of the system was verified by employing the benchmark KDD Cup database. Statistical analysis methods were applied to evaluate the results of the proposed study. Binary and multiple classifications were conducted to classify the normal and attack packets. Experimental results demonstrated that KNN and LSTM algorithms achieved better classification performance for developing intrusion detection systems; the accuracy of KNN and LSTM algorithms for binary classification was 98.55% and 97.28%, whereas the KNN and LSTM attained a high accuracy for multiple classification (98.28% and 970.7%). Finally, the KNN and LSTM algorithms are fitting-based intrusion detection systems.
format Online
Article
Text
id pubmed-8956412
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-89564122022-03-26 Computational Intelligence Approaches in Developing Cyberattack Detection System Alzahrani, Mohammed Saeed Alsaade, Fawaz Waselallah Comput Intell Neurosci Research Article The Internet plays a fundamental part in relentless correspondence, so its applicability can decrease the impact of intrusions. Intrusions are defined as movements that unfavorably influence the focus of a computer. Intrusions may sacrifice the reputability, integrity, privacy, and accessibility of the assets attacked. A computer security system will be traded off when an intrusion happens. The novelty of the proposed intelligent cybersecurity system is its ability to protect Internet of Things (IoT) devices and any networks from incoming attacks. In this research, various machine learning and deep learning algorithms, namely, the quantum support vector machine (QSVM), k-nearest neighbor (KNN), linear discriminant and quadratic discriminant long short-term memory (LSTM), and autoencoder algorithms, were applied to detect attacks from signature databases. The correlation method was used to select important network features by finding the features with a high-percentage relationship between the dataset features and classes. As a result, nine features were selected. A one-hot encoding method was applied to convert the categorical features into numerical features. The validation of the system was verified by employing the benchmark KDD Cup database. Statistical analysis methods were applied to evaluate the results of the proposed study. Binary and multiple classifications were conducted to classify the normal and attack packets. Experimental results demonstrated that KNN and LSTM algorithms achieved better classification performance for developing intrusion detection systems; the accuracy of KNN and LSTM algorithms for binary classification was 98.55% and 97.28%, whereas the KNN and LSTM attained a high accuracy for multiple classification (98.28% and 970.7%). Finally, the KNN and LSTM algorithms are fitting-based intrusion detection systems. Hindawi 2022-03-18 /pmc/articles/PMC8956412/ /pubmed/35341179 http://dx.doi.org/10.1155/2022/4705325 Text en Copyright © 2022 Mohammed Saeed Alzahrani and Fawaz Waselallah Alsaade. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Alzahrani, Mohammed Saeed
Alsaade, Fawaz Waselallah
Computational Intelligence Approaches in Developing Cyberattack Detection System
title Computational Intelligence Approaches in Developing Cyberattack Detection System
title_full Computational Intelligence Approaches in Developing Cyberattack Detection System
title_fullStr Computational Intelligence Approaches in Developing Cyberattack Detection System
title_full_unstemmed Computational Intelligence Approaches in Developing Cyberattack Detection System
title_short Computational Intelligence Approaches in Developing Cyberattack Detection System
title_sort computational intelligence approaches in developing cyberattack detection system
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8956412/
https://www.ncbi.nlm.nih.gov/pubmed/35341179
http://dx.doi.org/10.1155/2022/4705325
work_keys_str_mv AT alzahranimohammedsaeed computationalintelligenceapproachesindevelopingcyberattackdetectionsystem
AT alsaadefawazwaselallah computationalintelligenceapproachesindevelopingcyberattackdetectionsystem