Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering (vol 15, 1726, 2025)

被引:0
|
作者
Ahmed, Usama [1 ]
Nazir, Mohammad [2 ]
Sarwar, Amna [3 ]
Ali, Tariq [4 ]
Aggoune, El-Hadi M. [4 ]
Shahzad, Tariq [5 ]
Khan, Muhammad Adnan [6 ]
机构
[1] Univ Management & Technol, Sch Syst & Technol, Dept Artificial Intelligence, Lahore 54700, Pakistan
[2] Islamia Univ Bahawalpur, Dept Comp Sci & Informat Technol, Bahawalpur, Pakistan
[3] Univ Wah, Dept Comp Sci, Wah Cantt, Pakistan
[4] Univ Tabuk, Artificial Intelligence & Sensing Technol AIST Res, Tabuk 71491, Saudi Arabia
[5] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[6] Gachon Univ, Fac Artificial Intelligence & Software, Dept Software, Seongnam Si 13120, South Korea
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
D O I
10.1038/s41598-025-92132-3
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Network security is crucial in today's digital world, since there are multiple ongoing threats to sensitive data and vital infrastructure. The aim of this study to improve network security by combining methods for instruction detection from machine learning (ML) and deep learning (DL). Attackers have tried to breach security systems by accessing networks and obtaining sensitive information.Intrusion detection systems (IDSs) are one of the significant aspect of cybersecurity that involve the monitoring and analysis, with the intention of identifying and reporting of dangerous activities that would help to prevent the attack.Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Random Forest (RF), Decision Tree (DT), Long Short-Term Memory (LSTM), and Artificial Neural Network (ANN) are the vector figures incorporated into the study through the results. These models are subjected to various test to established the best results on the identification and prevention of network violation. Based on the obtained results, it can be stated that all the tested models are capable of organizing data originating from network traffic. thus, recognizing the difference between normal and intrusive behaviors, models such as SVM, KNN, RF, and DT showed effective results. Deep learning models LSTM and ANN rapidly find long-term and complex pattern in network data. It is extremely effective when dealing with complex intrusions since it is characterised by high precision, accuracy and recall.Based on our study, SVM and Random Forest are considered promising solutions for real-world IDS applications because of their versatility and explainability. For the companies seeking IDS solutions which are reliable and at the same time more interpretable, these models can be promising. Additionally, LSTM and ANN, with their ability to catch successive conditions, are suitable for situations involving nuanced, advancing dangers.
引用
收藏
页数:1
相关论文
共 50 条
  • [21] A Deep Learning Methods for Intrusion Detection Systems based Machine Learning in MANET
    Laqtib, Safaa
    El Yassini, Khalid
    Lahcen Hasnaoui, Moulay
    4TH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA' 19), 2019,
  • [22] Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning
    Liu, Lan
    Wang, Pengcheng
    Lin, Jun
    Liu, Langzhou
    IEEE Access, 2021, 9 : 7550 - 7563
  • [23] Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning
    Liu, Lan
    Wang, Pengcheng
    Lin, Jun
    Liu, Langzhou
    IEEE ACCESS, 2021, 9 : 7550 - 7563
  • [24] Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic
    Abdulhammed, Razan
    Faezipour, Miad
    Abuzneid, Abdelshakour
    AbuMallouh, Arafat
    IEEE SENSORS LETTERS, 2019, 3 (01)
  • [25] Ransomware Detection using Machine and Deep Learning Approaches
    Alsaidi, Ramadhan A. M.
    Yafooz, Wael M. S.
    Alolofi, Hashem
    Taufiq-Hail, Ghilan Al-Madhagy
    Emara, Abdel-Hamid M.
    Abdel-Wahab, Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 112 - 119
  • [26] Survey on SDN based network intrusion detection system using machine learning approaches
    Sultana, Nasrin
    Chilamkurti, Naveen
    Peng, Wei
    Alhadad, Rabei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (02) : 493 - 501
  • [27] Survey on SDN based network intrusion detection system using machine learning approaches
    Nasrin Sultana
    Naveen Chilamkurti
    Wei Peng
    Rabei Alhadad
    Peer-to-Peer Networking and Applications, 2019, 12 : 493 - 501
  • [28] Comparative Analysis of Intrusion Detection System Using Machine Learning and Deep Learning Algorithms
    Note J.
    Ali M.
    Annals of Emerging Technologies in Computing, 2022, 6 (03) : 19 - 36
  • [29] MANET: A SURVEY ON MACHINE LEARNING-BASED INTRUSION DETECTION APPROACHES
    Laqtib, Safaa
    El Yassini, Khalid
    Hasnaoui, Moulay Lahcen
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2019, 12 (02): : 55 - 70
  • [30] Cyber Intrusion Detection System based on Machine Learning Classification Approaches
    Ogundokun, Roseline Oluwaseun
    Misra, Sanjay
    Babatunde, Akinbowale Nathaniel
    Chockalingam, Sabarathinam
    2022 INTERNATIONAL CONFERENCE ON APPLIED ARTIFICIAL INTELLIGENCE (ICAPAI), 2022, : 25 - 30