Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3436829.3436842acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsieConference Proceedingsconference-collections
research-article

Towards a Novel Intrusion Detection Architecture using Artificial Intelligence

Published: 05 January 2021 Publication History

Abstract

Artificial intelligence (AI) is a transformative technology for potential replacement of human tasks and activities within industrial, social, intellectual, and digital applications. Network intrusion detection is crucial to identify cyber-attacks in critical infrastructures where a dynamic collection and analysis of network traffic can be conducted using AI. In this research paper we develop a novel intrusion detection architecture to mitigate malicious traffic passing through cyber infrastructure of an organization. We propose to design scenarios based on AI for intelligent self-protection or alert system that will facilitate countering actual cyber-attacks. The system will utilize machine learning algorithm - Random Forest - to offer more flexibility to discover new attacks and to ensure training the system to predict them in the future. Moreover, we design spam filtering program on python to detect spam emails as per email is one of the main attacking vectors that threatens the security of critical infrastructures.

References

[1]
Rajan, H. M., Dharani, S., & Sagar, V. (2017). Artificial Intelligence in Cyber Security-an Investigation. International Research Journal of Computer Science (IRJCS) ISSN, 2393--9842.
[2]
Bingham, E., Chen, J. P., Jankowiak, M., Obermeyer, F., Pradhan, N., Karaletsos, T., ... & Goodman, N. D. (2019). Pyro: Deep universal probabilistic programming. The Journal of Machine Learning Research, 20(1), 973--978.
[3]
Müller, V. C., & Bostrom, N. (2016). Future progress in artificial intelligence: A survey of expert opinion. In Fundamental issues of artificial intelligence (pp. 555--572). Springer, Cham.
[4]
Samrin, R., & Vasumathi, D. (2017, December). Review on anomaly based network intrusion detection system. In 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) (pp. 141--147). IEEE.
[5]
Kim, J., Shin, N., Jo, S. Y., & Kim, S. H. (2017, February). Method of intrusion detection using deep neural network. In 2017 IEEE International Conference on Big Data and Smart Computing (BigComp) (pp. 313--316). IEEE.
[6]
Hamed, T., Dara, R., & Kremer, S. C. (2018). Network intrusion detection system based on recursive feature addition and bigram technique. Computers & Security, 73, 137--155.
[7]
Roshan, S., Miche, Y., Akusok, A., & Lendasse, A. (2018). Adaptive and online network intrusion detection system using clustering and extreme learning machines. Journal of the Franklin Institute, 355(4), 1752--1779.
[8]
Chen, W., Liu, T., Tang, Y., & Xu, D. (2019). Multi-level adaptive coupled method for industrial control networks safety based on machine learning. Safety Science, 120, 268--275.
[9]
Liu, J., Zhang, W., Tang, Z., Xie, Y., Ma, T., Zhang, J., ... & Niyoyita, J. P. (2020). Adaptive intrusion detection via GAGOGMM-based pattern learning with fuzzy rough set-based attribute selection. Expert Systems with Applications, 139, 112845.
[10]
Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C. D., & Stamatopoulos, P. (2003). A memory-based approach to anti-spam filtering for mailing lists. Information retrieval, 6(1), 49--73.
[11]
Breiman, L. (2001). Random forests. Machine learning, 45(1), 5--32.
[12]
Ren, J., Guo, J., Qian, W., Yuan, H., Hao, X., & Jingjing, H. (2019). Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms. Security and Communication Networks, 2019.
[13]
Sommer, R., & Paxson, V. (2010, May). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE symposium on security and privacy (pp. 305--316). IEEE.
[14]
Raschka, S. (2014). Naive bayes and text classification i-introduction and theory. arXiv preprint arXiv:1410.5329.

Index Terms

  1. Towards a Novel Intrusion Detection Architecture using Artificial Intelligence

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICSIE '20: Proceedings of the 9th International Conference on Software and Information Engineering
    November 2020
    251 pages
    ISBN:9781450377218
    DOI:10.1145/3436829
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Ain Shams University: Ain Shams University, Egypt

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 January 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Artificial Intelligence
    2. Cyber-Attacks
    3. Intrusion Detection
    4. Network Security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICSIE 2020

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 211
      Total Downloads
    • Downloads (Last 12 months)34
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media