Seyed Ebrahim Dashti, Wassan Sajit Nasser Al-Jabri, Ali Farzanehmehr
{"title":"使用机器学习方法检测网络安全绕过威胁:检测网络上的入侵者","authors":"Seyed Ebrahim Dashti, Wassan Sajit Nasser Al-Jabri, Ali Farzanehmehr","doi":"10.1002/cpe.70062","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The problem of cybersecurity has grown in importance. Machine learning (ML) systems can detect network penetration. Imbalanced data sets have a detrimental impact on typical network intrusion detection. To be more precise, seven traditional ML algorithms were tested against two versions of a fully connected neural network, one with and one without an autoencoder. Additionally, an electing classifier is suggested as a means to integrate the outcomes of these nine ML algorithms. The majority electing classifier allows for the combination of several weak classifiers into a strong classifier. The number and type of weak classifiers used will have an impact on the final ensemble classifier's performance Three distinct resampling methods oversampling, undersampling, and hybrid sampling are used to evaluate each model. Next, we will go over the specifics of the trials and how we analyzed the data. The comparison results show that the performance of the classifiers on balanced data outperforms those on (\nhttps://www.sciencedirect.com/topics/computer-science/imbalanced-data) imbalanced data, and the electing classifier outperforms the nine algorithms. A weighted <i>F</i>1 score is a good performance metric to evaluate solutions in intrusion detection systems. Due to the importance of the <i>F</i>1 score parameter, the proposed method has reached a predict of 80%, which is a significant improvement compared to related works.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detecting Network Security Bypass Threats Using Machine Learning Methods: Detecting Intruders on the Network\",\"authors\":\"Seyed Ebrahim Dashti, Wassan Sajit Nasser Al-Jabri, Ali Farzanehmehr\",\"doi\":\"10.1002/cpe.70062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>The problem of cybersecurity has grown in importance. Machine learning (ML) systems can detect network penetration. Imbalanced data sets have a detrimental impact on typical network intrusion detection. To be more precise, seven traditional ML algorithms were tested against two versions of a fully connected neural network, one with and one without an autoencoder. Additionally, an electing classifier is suggested as a means to integrate the outcomes of these nine ML algorithms. The majority electing classifier allows for the combination of several weak classifiers into a strong classifier. The number and type of weak classifiers used will have an impact on the final ensemble classifier's performance Three distinct resampling methods oversampling, undersampling, and hybrid sampling are used to evaluate each model. Next, we will go over the specifics of the trials and how we analyzed the data. The comparison results show that the performance of the classifiers on balanced data outperforms those on (\\nhttps://www.sciencedirect.com/topics/computer-science/imbalanced-data) imbalanced data, and the electing classifier outperforms the nine algorithms. A weighted <i>F</i>1 score is a good performance metric to evaluate solutions in intrusion detection systems. Due to the importance of the <i>F</i>1 score parameter, the proposed method has reached a predict of 80%, which is a significant improvement compared to related works.</p>\\n </div>\",\"PeriodicalId\":55214,\"journal\":{\"name\":\"Concurrency and Computation-Practice & Experience\",\"volume\":\"37 9-11\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2025-04-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation-Practice & Experience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70062\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70062","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
Detecting Network Security Bypass Threats Using Machine Learning Methods: Detecting Intruders on the Network
The problem of cybersecurity has grown in importance. Machine learning (ML) systems can detect network penetration. Imbalanced data sets have a detrimental impact on typical network intrusion detection. To be more precise, seven traditional ML algorithms were tested against two versions of a fully connected neural network, one with and one without an autoencoder. Additionally, an electing classifier is suggested as a means to integrate the outcomes of these nine ML algorithms. The majority electing classifier allows for the combination of several weak classifiers into a strong classifier. The number and type of weak classifiers used will have an impact on the final ensemble classifier's performance Three distinct resampling methods oversampling, undersampling, and hybrid sampling are used to evaluate each model. Next, we will go over the specifics of the trials and how we analyzed the data. The comparison results show that the performance of the classifiers on balanced data outperforms those on (
https://www.sciencedirect.com/topics/computer-science/imbalanced-data) imbalanced data, and the electing classifier outperforms the nine algorithms. A weighted F1 score is a good performance metric to evaluate solutions in intrusion detection systems. Due to the importance of the F1 score parameter, the proposed method has reached a predict of 80%, which is a significant improvement compared to related works.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.