Skip to main navigation Skip to search Skip to main content

UTILIZING MACHINE LEARNING-BASED INTRUSION DETECTION TECHNOLOGIES FOR NETWORK SECURITY

  • Rahul Kumar Sharma
  • , Arvind Kumar Pandey
  • , Bhuvana Jayabalan
  • , Preeti Naval

Research output: Contribution to journalOriginal Articlepeer-review

4 Scopus citations

Abstract

Effective intrusion detection systems (IDS) are becoming essential for maintaining computer network security due to the growing complexity of cyber-attacks. Machine Learning (ML) can increase the effectiveness of intrusion detection technology, which is an essential resource to safeguard network security. A novel ML technique for intrusion information detection called Stochastic Cat Swarm Optimized Privacy-Preserving Logistic Regression (SCSO-PPLR) is proposed. We assess intrusion detection systems using KDDCup99 dataset. The dataset is pre-processed using Z-score normalization to normalize the features. Next, Features are extracted by Principal Component Analysis (PCA). By comparing the results of the SCSO-PPLR methodology with traditional methods and using assessment criteria including accuracy, precision, recall, and F1-score, the model's performance is extensively evaluated. The study reveals that SCSO-PPLR is an acceptable strategy for intrusion detection in network security and it is effective. These insights broaden IDS and groundwork for further research on reliable cybersecurity remedies.

Original languageAmerican English
Pages (from-to)311-320
Number of pages10
JournalProceedings on Engineering Sciences
Volume6
Issue number1
DOIs
StateIndexed - 2024
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2024 Published by Faculty of Engineeringg.

Keywords

  • Intrusion Detection Systems (IDS)
  • Machine Learning
  • Network Security
  • Network attack
  • Stochastic Cat Swarm Optimized Privacy-Preserving Logistic Regression (SCSO-PPLR)
  • cybersecurity

Fingerprint

Dive into the research topics of 'UTILIZING MACHINE LEARNING-BASED INTRUSION DETECTION TECHNOLOGIES FOR NETWORK SECURITY'. Together they form a unique fingerprint.

Cite this