Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models

IF 1.1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS
M. Akhtar, Tao Feng
{"title":"Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models","authors":"M. Akhtar, Tao Feng","doi":"10.4108/eai.1-2-2022.173293","DOIUrl":null,"url":null,"abstract":"Incorporating digital technologies into security systems is a positive development. It's time for the digital system to be appropriately protected from potential threats and attacks. An intrusion detection system can identify both external and internal anomalies in the network. There are a variety of threats out there, both active and passive. If these dangers aren't addressed, attacks and data theft could occur from the point of origin all the way to the point of destination. Machine learning is still in its infancy, despite its wide range of applications. It is possible to predict the future by using machine learning. A cyber-attack detection system is depicted in this study using machine learning models. Machine learning algorithms were trained to predict cyber-attack scores using data from prior cyber-attacks on an open source website. In order to detect an attack at its earliest possible stage, this research also examined multiple linear machine learning algorithm-based categorization models. Classifiers' accuracy is also compared in the presentation, as is the presentation itself. Balance procedures were followed. Radio Frequency and GBC have the best accuracy, at 87.93%, followed by ABC at 86.11%, BT at 81.03%, ET at 70.31%, and DT at 70.31 percent (84.48 percent ).","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.1000,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EAI Endorsed Transactions on Scalable Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eai.1-2-2022.173293","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 5

Abstract

Incorporating digital technologies into security systems is a positive development. It's time for the digital system to be appropriately protected from potential threats and attacks. An intrusion detection system can identify both external and internal anomalies in the network. There are a variety of threats out there, both active and passive. If these dangers aren't addressed, attacks and data theft could occur from the point of origin all the way to the point of destination. Machine learning is still in its infancy, despite its wide range of applications. It is possible to predict the future by using machine learning. A cyber-attack detection system is depicted in this study using machine learning models. Machine learning algorithms were trained to predict cyber-attack scores using data from prior cyber-attacks on an open source website. In order to detect an attack at its earliest possible stage, this research also examined multiple linear machine learning algorithm-based categorization models. Classifiers' accuracy is also compared in the presentation, as is the presentation itself. Balance procedures were followed. Radio Frequency and GBC have the best accuracy, at 87.93%, followed by ABC at 86.11%, BT at 81.03%, ET at 70.31%, and DT at 70.31 percent (84.48 percent ).
基于集成学习模型的网络攻击检测分类模型比较
将数字技术纳入安全系统是一项积极的发展。是时候适当地保护数字系统免受潜在的威胁和攻击了。入侵检测系统可以识别网络中的外部异常和内部异常。有各种各样的威胁,有主动的也有被动的。如果不解决这些危险,攻击和数据盗窃可能会从起点一直发生到目的地。尽管机器学习的应用范围很广,但它仍处于起步阶段。利用机器学习来预测未来是可能的。本研究使用机器学习模型描述了一个网络攻击检测系统。机器学习算法被训练来预测网络攻击得分,使用的数据来自一个开源网站先前的网络攻击。为了在尽可能早的阶段检测到攻击,本研究还检查了多个基于线性机器学习算法的分类模型。分类器的准确性也会在演示中进行比较,演示本身也是如此。遵循平衡程序。Radio Frequency和GBC准确率最高,为87.93%,ABC为86.11%,BT为81.03%,ET为70.31%,DT为70.31%(84.48%)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
EAI Endorsed Transactions on Scalable Information Systems
EAI Endorsed Transactions on Scalable Information Systems COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
2.80
自引率
15.40%
发文量
49
审稿时长
10 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信