{"title":"Cyber Security Threat Detection Model Using Artificial Intelligence Technology","authors":"Rahul Mishra","doi":"10.1109/ICECAA58104.2023.10212209","DOIUrl":null,"url":null,"abstract":"The difficulty of ensuring cyber-security is steadily growing as a result of the alarming development in computer connectivity and the sizeable number of applications associated to computers in recent years. The system also requires robust defines against the growing number of cyber threats. As a result, a possible role for cyber-security might be performed by developing Intrusion Detection Systems (IDS) to detect inconsistencies and threats in computer networks. An effective data-driven intrusion detection system has been created with the use of Artificial Intelligence, particularly Machine Learning techniques. This research proposes a novel Binary Grasshopper Optimized Twin Support Vector Machine (BGOTSVM) based security model which first considers the security features ranking according to their relevance before developing an IDS model based on the significant features that have been selected. By lowering the feature dimensions, this approach not only improves predictive performance for unidentified tests but also lowers the model's computational expense. Trials are conducted using four common ML techniques to compare the results to those of the current approaches (Decision Tree, Random Decision Forest, Random Tree, and Artificial Neural Network). The experimental findings of this study confirm that the suggested methods may be used as learning-based models for network intrusion detection and demonstrate that, when used in the real world, they outperform conventional ML techniques.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA58104.2023.10212209","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The difficulty of ensuring cyber-security is steadily growing as a result of the alarming development in computer connectivity and the sizeable number of applications associated to computers in recent years. The system also requires robust defines against the growing number of cyber threats. As a result, a possible role for cyber-security might be performed by developing Intrusion Detection Systems (IDS) to detect inconsistencies and threats in computer networks. An effective data-driven intrusion detection system has been created with the use of Artificial Intelligence, particularly Machine Learning techniques. This research proposes a novel Binary Grasshopper Optimized Twin Support Vector Machine (BGOTSVM) based security model which first considers the security features ranking according to their relevance before developing an IDS model based on the significant features that have been selected. By lowering the feature dimensions, this approach not only improves predictive performance for unidentified tests but also lowers the model's computational expense. Trials are conducted using four common ML techniques to compare the results to those of the current approaches (Decision Tree, Random Decision Forest, Random Tree, and Artificial Neural Network). The experimental findings of this study confirm that the suggested methods may be used as learning-based models for network intrusion detection and demonstrate that, when used in the real world, they outperform conventional ML techniques.