Enhancing Network Security using Hybrid Machine Learning Techniques

被引:0
|
作者
Sirenjeevi, P. [1 ]
Dhanakoti, V. [2 ]
机构
[1] SRM Valliammai Engn Coll, Dept Artificial Intelligence & Data Sci, Chennai, India
[2] SRM Valliammai Engn Coll, Dept Comp Sci & Engn, Chennai, India
关键词
Intrusion Detection; network attacks; machine learning;
D O I
10.1109/ACCAI61061.2024.10601791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is a crucial tool for establishing a safe and reliable Network computing environment, considering the widespread and ever-changing nature of cyber threats. Network Computing offers a substantial enhancement in cost metrics by dynamically providing IT services inside our present framework of resource, platform, and service consolidations. Given that the majority of cloud computing networks rely on delivering their services via the Internet, they are susceptible to encountering a range of security concerns. Hence, it is imperative to implement an Intrusion Detection System (IDS) in cloud settings to effectively identify novel and unfamiliar threats, alongside established signature-based attacks, with a notable level of precision. In the course of our analysis, we make the assumption that a "anomalous" event in a system or network is equivalent to a "intrusion" event, which occurs when there is a substantial deviation in one or more fundamental activities of the system or network. Several recent proposals have been put out with the objective of creating a hybrid detection mechanism that combines the benefits of signature-based detection techniques with the capability to identify unfamiliar assaults through anomalies. This study presents a novel anomaly detection system at the Network, the virtual machine level, which incorporates a hybrid algorithm. The technique combines the Naive Bayes algorithm and the SVM classification algorithm with k-Means clustering. The objective is to enhance the accuracy of the anomaly detection system. In regard to the general effectiveness in terms of detection rate and low false positive rate, the results of this study indicate that the suggested solution outperforms the traditional models.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] DASH Framework Using Machine Learning Techniques and Security Controls
    Shaheed, Aref
    Al-radwan, Haisam
    INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2022, 2022
  • [22] Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
    Sasikumar, K.
    Nagarajan, Sivakumar
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2025, 6 : 392 - 402
  • [23] Detection of Malware in the Network Using Machine Learning Techniques
    Yogesh, B.
    Reddy, G.Suresh
    Proceedings - 2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems, ICMACC 2022, 2022, : 204 - 211
  • [24] A Heterogeneous Ensemble Network Using Machine Learning Techniques
    Rashid, Tarik
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 335 - 339
  • [25] Network Intrusion Detection Using Machine Learning Techniques
    Almutairi, Yasmeen
    Alhazmi, Bader
    Munshi, Amr
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (03) : 193 - 206
  • [26] Enhancing Smart-Contract Security through Machine Learning: A Survey of Approaches and Techniques
    Jiang, Fan
    Chao, Kailin
    Xiao, Jianmao
    Liu, Qinghua
    Gu, Keyang
    Wu, Junyi
    Cao, Yuanlong
    ELECTRONICS, 2023, 12 (09)
  • [27] Enhancing power system security using soft computing and machine learning
    Venkatesh, P.
    Visali, N.
    ELECTRICAL ENGINEERING & ELECTROMECHANICS, 2023, (04) : 90 - 94
  • [28] Network Intrusion Detection using Hybrid Machine Learning
    Chuang, Po-Jen
    Li, Si-Han
    2019 INTERNATIONAL CONFERENCE ON FUZZY THEORY AND ITS APPLICATIONS (IFUZZY), 2019, : 289 - 293
  • [29] Machine learning models for enhancing cyber security
    Therasa, P. R.
    Shanmuganathan, M.
    Bapu, B. R. Tapas
    Sankarram, N.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 590 - 601
  • [30] A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques
    Bal, Prasanta Kumar
    Mohapatra, Sudhir Kumar
    Das, Tapan Kumar
    Srinivasan, Kathiravan
    Hu, Yuh-Chung
    SENSORS, 2022, 22 (03)