Cargando…
Computational Intelligence Approaches in Developing Cyberattack Detection System
The Internet plays a fundamental part in relentless correspondence, so its applicability can decrease the impact of intrusions. Intrusions are defined as movements that unfavorably influence the focus of a computer. Intrusions may sacrifice the reputability, integrity, privacy, and accessibility of...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8956412/ https://www.ncbi.nlm.nih.gov/pubmed/35341179 http://dx.doi.org/10.1155/2022/4705325 |
_version_ | 1784676563455836160 |
---|---|
author | Alzahrani, Mohammed Saeed Alsaade, Fawaz Waselallah |
author_facet | Alzahrani, Mohammed Saeed Alsaade, Fawaz Waselallah |
author_sort | Alzahrani, Mohammed Saeed |
collection | PubMed |
description | The Internet plays a fundamental part in relentless correspondence, so its applicability can decrease the impact of intrusions. Intrusions are defined as movements that unfavorably influence the focus of a computer. Intrusions may sacrifice the reputability, integrity, privacy, and accessibility of the assets attacked. A computer security system will be traded off when an intrusion happens. The novelty of the proposed intelligent cybersecurity system is its ability to protect Internet of Things (IoT) devices and any networks from incoming attacks. In this research, various machine learning and deep learning algorithms, namely, the quantum support vector machine (QSVM), k-nearest neighbor (KNN), linear discriminant and quadratic discriminant long short-term memory (LSTM), and autoencoder algorithms, were applied to detect attacks from signature databases. The correlation method was used to select important network features by finding the features with a high-percentage relationship between the dataset features and classes. As a result, nine features were selected. A one-hot encoding method was applied to convert the categorical features into numerical features. The validation of the system was verified by employing the benchmark KDD Cup database. Statistical analysis methods were applied to evaluate the results of the proposed study. Binary and multiple classifications were conducted to classify the normal and attack packets. Experimental results demonstrated that KNN and LSTM algorithms achieved better classification performance for developing intrusion detection systems; the accuracy of KNN and LSTM algorithms for binary classification was 98.55% and 97.28%, whereas the KNN and LSTM attained a high accuracy for multiple classification (98.28% and 970.7%). Finally, the KNN and LSTM algorithms are fitting-based intrusion detection systems. |
format | Online Article Text |
id | pubmed-8956412 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-89564122022-03-26 Computational Intelligence Approaches in Developing Cyberattack Detection System Alzahrani, Mohammed Saeed Alsaade, Fawaz Waselallah Comput Intell Neurosci Research Article The Internet plays a fundamental part in relentless correspondence, so its applicability can decrease the impact of intrusions. Intrusions are defined as movements that unfavorably influence the focus of a computer. Intrusions may sacrifice the reputability, integrity, privacy, and accessibility of the assets attacked. A computer security system will be traded off when an intrusion happens. The novelty of the proposed intelligent cybersecurity system is its ability to protect Internet of Things (IoT) devices and any networks from incoming attacks. In this research, various machine learning and deep learning algorithms, namely, the quantum support vector machine (QSVM), k-nearest neighbor (KNN), linear discriminant and quadratic discriminant long short-term memory (LSTM), and autoencoder algorithms, were applied to detect attacks from signature databases. The correlation method was used to select important network features by finding the features with a high-percentage relationship between the dataset features and classes. As a result, nine features were selected. A one-hot encoding method was applied to convert the categorical features into numerical features. The validation of the system was verified by employing the benchmark KDD Cup database. Statistical analysis methods were applied to evaluate the results of the proposed study. Binary and multiple classifications were conducted to classify the normal and attack packets. Experimental results demonstrated that KNN and LSTM algorithms achieved better classification performance for developing intrusion detection systems; the accuracy of KNN and LSTM algorithms for binary classification was 98.55% and 97.28%, whereas the KNN and LSTM attained a high accuracy for multiple classification (98.28% and 970.7%). Finally, the KNN and LSTM algorithms are fitting-based intrusion detection systems. Hindawi 2022-03-18 /pmc/articles/PMC8956412/ /pubmed/35341179 http://dx.doi.org/10.1155/2022/4705325 Text en Copyright © 2022 Mohammed Saeed Alzahrani and Fawaz Waselallah Alsaade. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Alzahrani, Mohammed Saeed Alsaade, Fawaz Waselallah Computational Intelligence Approaches in Developing Cyberattack Detection System |
title | Computational Intelligence Approaches in Developing Cyberattack Detection System |
title_full | Computational Intelligence Approaches in Developing Cyberattack Detection System |
title_fullStr | Computational Intelligence Approaches in Developing Cyberattack Detection System |
title_full_unstemmed | Computational Intelligence Approaches in Developing Cyberattack Detection System |
title_short | Computational Intelligence Approaches in Developing Cyberattack Detection System |
title_sort | computational intelligence approaches in developing cyberattack detection system |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8956412/ https://www.ncbi.nlm.nih.gov/pubmed/35341179 http://dx.doi.org/10.1155/2022/4705325 |
work_keys_str_mv | AT alzahranimohammedsaeed computationalintelligenceapproachesindevelopingcyberattackdetectionsystem AT alsaadefawazwaselallah computationalintelligenceapproachesindevelopingcyberattackdetectionsystem |