Intrusion Detection System for Prediction Cyber Threats based on Machine Learning Techniques
Keywords:
Intrusion Detection System (IDS), Cyber Threat Prediction, Machine Learning, Supervised Learning, Unsupervised Learning, Hybrid ModelsAbstract
The increasing development of cyber threats has urged the establishment of efficient Intrusion Detection Systems that can predict and mitigate these attacks. With the ability to predict future threats and implement mechanisms, machine learning techniques offer excellent solutions in making IDS more intelligent, autonomous, and adaptive for future threats. This paper elaborates the application of multiple ML-based techniques to detect and predict cyber threats within IDS systems, analyzing the effectiveness and performance as well as discussing the limitation areas. Comparisons among supervised, unsupervised, and hybrid models were presented to show each's capability in enhancing accuracy with an IDS and reduction of response times.
Downloads
References
A. S. Ahanger, S. M. Khan, and F. Masoodi, "An effective intrusion detection system using supervised machine learning techniques," in 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), 2021: IEEE, pp. 1639-1644.
Z. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah, and F. Ahmad, "Network intrusion detection system: A systematic study of machine learning and deep learning approaches," Transactions on Emerging Telecommunications Technologies, vol. 32, no. 1, p. e4150, 2021.
O. Al-Jarrah, A. Siddiqui, M. Elsalamouny, P. D. Yoo, S. Muhaidat, and K. Kim, "Machine-learning-based feature selection techniques for large-scale network intrusion detection," in 2014 IEEE 34th international conference on distributed computing systems workshops (ICDCSW), 2014: IEEE, pp. 177-181.
M. Al-Omari, M. Rawashdeh, F. Qutaishat, M. Alshira’H, and N. Ababneh, "An intelligent tree-based intrusion detection model for cyber security," Journal of Network and Systems Management, vol. 29, no. 2, p. 20, 2021.
H. Alqahtani, I. H. Sarker, A. Kalim, S. M. Minhaz Hossain, S. Ikhlaq, and S. Hossain, "Cyber intrusion detection using machine learning classification techniques," in Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers 1, 2020: Springer, pp. 121-131.
M. Alrowaily, F. Alenezi, and Z. Lu, "Effectiveness of machine learning based intrusion detection systems," in Security, Privacy, and Anonymity in Computation, Communication, and Storage: 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings 12, 2019: Springer, pp. 277-288.
A. O. Alzahrani and M. J. Alenazi, "Designing a network intrusion detection system based on machine learning for software defined networks," Future Internet, vol. 13, no. 5, p. 111, 2021.
S. V. Amanoul, A. M. Abdulazeez, D. Q. Zeebare, and F. Y. Ahmed, "Intrusion detection systems based on machine learning algorithms," in 2021 IEEE international conference on automatic control & intelligent systems (I2CACIS), 2021: IEEE, pp. 282-287.
U. Aslam, E. Batool, S. N. Ahsan, and A. Sultan, "Hybrid network intrusion detection system using machine learning classification and rule based learning system," International Journal of Grid and Distributed Computing, vol. 10, no. 2, pp. 51-62, 2017.
G. D. C. Bertoli et al., "An end-to-end framework for machine learning-based network intrusion detection system," IEEE Access, vol. 9, pp. 106790-106805, 2021.
K. R. Dalal and M. Rele, "Cyber Security: Threat Detection Model based on Machine learning Algorithm," in 2018 3rd International Conference on Communication and Electronics Systems (ICCES), 2018: IEEE, pp. 239-243.
S. Goel, K. Guleria, and S. N. Panda, "Anomaly based intrusion detection model using supervised machine learning techniques," in 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), 2022: IEEE, pp. 1-5.
I. H. Sarker, Y. B. Abushark, F. Alsolami, and A. I. Khan, "Intrudtree: a machine learning based cyber security intrusion detection model," Symmetry, vol. 12, no. 5, p. 754, 2020.
M. A. Hossain and M. S. Islam, "Ensuring network security with a robust intrusion detection system using ensemble-based machine learning," Array, vol. 19, p. 100306, 2023.
M. A. Khan and Y. Kim, "Deep Learning-Based Hybrid Intelligent Intrusion Detection System," Computers, Materials & Continua, vol. 68, no. 1, 2021.
S. Kumar, A. Viinikainen, and T. Hamalainen, "Machine learning classification model for network based intrusion detection system," in 2016 11th international conference for internet technology and secured transactions (ICITST), 2016: IEEE, pp. 242-249.
H. Liu and B. Lang, "Machine learning and deep learning methods for intrusion detection systems: A survey," applied sciences, vol. 9, no. 20, p. 4396, 2019.
U. S. Musa, M. Chhabra, A. Ali, and M. Kaur, "Intrusion detection system using machine learning techniques: A review," in 2020 international conference on smart electronics and communication (ICOSEC), 2020: IEEE, pp. 149-155.
N. Oliveira, I. Praça, E. Maia, and O. Sousa, "Intelligent cyber attack detection and classification for network-based intrusion detection systems," Applied Sciences, vol. 11, no. 4, p. 1674, 2021.
M. Raihan-Al-Masud and H. A. Mustafa, "Network intrusion detection system using voting ensemble machine learning," in 2019 IEEE International Conference on Telecommunications and Photonics (ICTP), 2019: IEEE, pp. 1-4.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the journal owned and operated by The Science Brigade Group retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this Journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.
