Online and Biomedical Engineering: Web Attack Intrusion Detection System Using Machine Learning Techniques
Online and Biomedical Engineering: Web Attack Intrusion Detection System Using Machine Learning Techniques
org
https://doi.org/10.3991/ijoe.v20i03.45249
PAPER
Baklizi, M.K., Atoum, I., Alkhazaleh, M., Kanaker, H., Abdullah, N., Al-Wesabi, O.A., Otoom, A.A. (2024). Web Attack Intrusion Detection System
Using Machine Learning Techniques. International Journal of Online and Biomedical Engineering (iJOE), 20(3), pp. 24–38. https://doi.org/10.3991/ijoe.
v20i03.45249
Article submitted 2023-09-24. Revision uploaded 2023-11-15. Final acceptance 2023-11-23.
© 2024 by the authors of this article. Published under CC-BY.
24 International Journal of Online and Biomedical Engineering (iJOE) iJOE | Vol. 20 No. 3 (2024)
Web Attack Intrusion Detection System Using Machine Learning Techniques
servers, network devices, or the network itself [2]. Hence the importance of intru-
sion detection systems, which play a crucial role in addressing these attacks and
protecting against them [3]. Moreover, successful detection of new attacks requires
a vast amount of data to create models of normal behavior and anomalies [4]. The
need arises to utilize intrusion detection systems (IDSs) for training on a compel-
ling dataset [3]. This highlighted the use of supervised machine learning algorithms
to effectively analyze the data and create a predictive model that can accurately
predict new attacks [4]. An intelligent approach to identifying new attack types
involves using machine learning in combination with feature selection methods and
classification algorithms [2].
Machine learning classification techniques have been utilized in numerous pub-
lished papers to develop effective IDS using diverse datasets for different types of
attacks. The dataset for wireless sensor network intrusion detection is referred to as
WSN_DS. The dataset represents a variety of denial of service (DoS) attacks, including
blackhole, flooding, gray hole, and scheduling attacks, with 19 features and 374,661
records [5, 6]. The KDD’99 dataset was created by simulating routine and traffic
attacks in a military environment, specifically the US Air Force LAN [4]. It has 41 fea-
tures related to traffic, content, and intrinsic attacks, corresponding to four different
categories of attacks [4, 7, 8]: DoS, U2R, Prob, and R2L. The NSL KDD dataset aims to
overcome the challenges of redundancy, duplication, and data imbalance found in
the KDD 99 dataset [4]. The UNSW Canberra Cyber Range Lab’s IXIA Perfect Storm
program developed the UNSW Nb15 dataset to provide a blend of real-world normal
behaviors and simulated modern attack behaviors [4, 9]. The dataset includes nine
types of attacks, represented by 49 characteristics. Approximately 82,000 records
are used for testing, while 175,000 records are used for training. The types of attacks
are: fuzzers, analysis, DoS, backdoor, exploit, generic, reconnaissance, shellcode, and
worm. [4, 10, 11]. Another IDS dataset used to evaluate web attacks in this research is
the Canadian Institute for Cybersecurity (CIC-IDS2017). The dataset represents recent
cyberattacks as documented in the 2016 McAfee report [12]. The dataset includes
80 features extracted from network traffic, representing prevalent attack types such
as Heartbleed, DoS, Brute Force SSH, Infiltration Brute Force FTP, Web Attack, DDoS,
and Botnet [9, 12]. The rest of this article’s research is divided into the following
sections: An overview of the literature review is presented in Section II. Section III
presents the methodology of the proposed strategy. Results from the simulation are
compared and discussed in Section IV. A conclusion is provided at the end.
2 LITERATURE REVIEW
iJOE | Vol. 20 No. 3 (2024) International Journal of Online and Biomedical Engineering (iJOE) 25
Baklizi et al.
The size of the key space has a significant impact on the likelihood of a brute-
force attack [14]. This implies that brute-force attacks can only succeed when using
short keys, as longer keys result in exponentially larger key spaces.
Machine learning can be a potent tool for accurately detecting new web attacks
[23–25]. It is a subfield of artificial intelligence that involves constructing models
using algorithms trained on specific data and then applying those models to other
data to make predictions [26]. There are several different machine learning classifi-
ers, including random forest (RF), k-nearest neighbors (KNN), and Naive Bayes (NB).
• Random forest
Academics are interested in the RF algorithm due to its speed and accuracy in
categorization. In predictive modeling and machine learning approaches, the RF
involves a collection of supervised learning procedures for regression and classifica-
tion [27]. It aggregates the results and predictions from multiple decision trees [26]
to select the optimal output, as illustrated in Figure 1.
26 International Journal of Online and Biomedical Engineering (iJOE) iJOE | Vol. 20 No. 3 (2024)
Web Attack Intrusion Detection System Using Machine Learning Techniques
• K-nearest neighbor
The k-nearest neighbors (KNN) algorithm is considered one of the most funda-
mental classification techniques in machine learning, specifically in supervised
learning [28, 29]. Using KNN can yield a respectable level of accuracy in making
predictions through classification [28].
The KNN algorithm heavily relies on the value of k to determine the number of
neighbors that should be selected based on the input data, as shown in Figure 2 [30].
The KNN algorithm is simple and easy to understand and execute [28, 29]. However,
as the amount of data being used increases, finding the ideal value of k causes KNN
to become slower [30].
• Naive Bayes
Naïve Bayes, a supervised learning method, utilizes the Bayes theorem to predict
the probability of an event occurring based on previous observations of related events,
as depicted in Figure 3 [30]. The NB classifier is one of the simplest machine learning
classification algorithms. It can be used to create a fast classifier that makes rapid
predictions from a dataset [29]. However, the NB classifier does not take into account
the relationship between features for classification, which affects its accuracy [30].
iJOE | Vol. 20 No. 3 (2024) International Journal of Online and Biomedical Engineering (iJOE) 27
Baklizi et al.
The majority of these works were used for wireless sensor networks (WSNs), such
as “efficient denial of service attack detection in WSNs” [7], “A WSN intrusion detec-
tion mechanism for smart environments (SLGBM)” [31], “assessment of machine
learning techniques for WSNs denial-of-service detection” [32], “Using CNN, a deep
learning method for efficient intrusion detection in wireless networks” [33], “A com-
parison of machine learning models for WSNs cyberattack detection” [34], “anom-
aly detection using machine learning techniques in wireless sensor networks” [35],
“A lightweight multilayer machine learning detection system for WSN cyberattacks”
[36], and “performance assessment of nave Bayesian procedures for WSN cyberat-
tack detection” [37]. These are examples of machine learning techniques that have
been evaluated for their usefulness in DoS detection in WSNs. The intrusion detec-
tion system proposed by [11] is called the hybrid deep neural network for network
intrusion detection (CNN LSTM). It is commonly used for intrusion detection systems
with various types of datasets, including WSN-DS, UNSW-NB15, and CIC-IDS2017.
The project aims to develop a hybrid intrusion detection system model by com-
bining the spatial feature extraction capabilities of convolutional neural networks
with the temporal feature extraction capabilities of long- and short-term memory
networks [11].
In reference to [38], it only uses machine learning for web attacks, in partic-
ular. Using R’s statistical computing language, they proposed building many pre-
dictive models and evaluating the CIC-IDS2017 dataset [38]. The research aims to
preprocess, evaluate, and develop a prediction model using the R language with
the CIC-IDS2017 dataset to determine whether network connections are malicious.
Their research includes the following machine learning classifiers: RF and artificial
neural networks (ANN).
The accuracy results using ANN were as follows: brute force = 99.867%,
XXS = 100%, and SQL injection = 90.476%. The accuracy results for RF were as
follows: brute force = 98.009%, XXS = 99.540%, and SQL injection = 95.238%.
The summary of the evaluation of the methods presented is shown in Table 1.
3 RESEARCH METHODOLOGY
28 International Journal of Online and Biomedical Engineering (iJOE) iJOE | Vol. 20 No. 3 (2024)
Web Attack Intrusion Detection System Using Machine Learning Techniques
(Continued)
iJOE | Vol. 20 No. 3 (2024) International Journal of Online and Biomedical Engineering (iJOE) 29
Baklizi et al.
• Dataset collection
Using the platform of the Canadian Institute for Cybersecurity (CIC-IDS2017), sam-
ples of malicious and benign web attacks were collected. The Canadian Institute for
Cybersecurity has compiled the most recent harmless and widespread cyber-attacks to
include in its CIC-IDS2017 dataset, which is used for cybersecurity research. It includes
eighty features representing the most typical attack methods used today, obtained from
simulated network traffic. These features include brute force FTP, web attack, infiltra-
tion, botnet, brute force SSH, DoS, Heartbleed, and DDoS [12], [9]. This study analyzed
web attacks using the IDS dataset from the Canadian Institute for Cybersecurity (CIC-
IDS2017). The 2016 McAfee study [12] shows that the dataset represents recent attacks.
Machine learning methods will be used to further analyze web attacks using this dataset.
• Data preprocessing
Preparing the features for machine learning is referred to as data preprocess-
ing [39, 40]. Data cleaning, feature selection, and data balancing are examples of
data preparation procedures. This involves removing unnecessary or irrelevant
30 International Journal of Online and Biomedical Engineering (iJOE) iJOE | Vol. 20 No. 3 (2024)
Web Attack Intrusion Detection System Using Machine Learning Techniques
• Selection model
After preprocessing the data and selecting features, specific machine-learning
algorithms are trained, evaluated, and implemented. At this stage, we are inde-
pendently implementing machine learning techniques on the dataset using Python
in the Jupyter environment. The CIC-IDS2017 datasets are classified using classifiers
that incorporate KNN, RF, and NB, as well as 10-fold cross-validation.
• Evaluation model
The accuracy, recall, precision, and F1-score of each machine learning classifi-
er’s performance were measured. We utilized Python and the Jupyter environment
to execute these classifiers on the dataset. Section 4 provides a comprehensive
explanation of the terms being assessed.
The entire dataset has been used in experiments. This experiment utilizes
Python software and the 10-fold cross-validation procedure. In this experiment,
machine learning techniques are implemented using Python software. Python
offers an extensive set of tools for these domains and is a popular programming
language in data research, scientific computing, and machine learning [41].
Python was used to generate a 10-fold cross-validation dataset for the experiment.
The industry standard for calculating the error rate of a knowledge scheme on a
specific dataset is the 10-fold cross-validation approach. For reliable results, ten-
fold cross-validation was used [40, 42]. Moreover, the dataset is divided into ten
portions (folds) for 10-fold cross-validation. As a result, each portion of the data-
set is used once for testing and nine times for training. Measures such as recall,
accuracy, F1-score, and precision have been used to evaluate the performance of
the classifiers in machine learning techniques. The trial results are presented in
Table 2 for this analysis.
iJOE | Vol. 20 No. 3 (2024) International Journal of Online and Biomedical Engineering (iJOE) 31
Baklizi et al.
Table. 2. Results of three machine learning approaches for precision, recall, F1-score, and accuracy
In this section, we will discuss the training phase results of F1-score, preci-
sion, recall, and accuracy using the machine learning techniques employed in
our study.
TP
Precision (1)
TP FP
Where “TP” refers to the number of samples that were correctly classified as pos-
itive. FP is the percentage of samples that are incorrectly identified as positive when
they are actually negative.
The precision results for the various classifiers used in this experiment during
the training phase are displayed in Table 1. In contrast to the accuracy value of 0.99,
Figure 5 shows that the precision value of 1 for both RF and KNN is sufficient. This
demonstrates how the NB classifier was outperformed by KNN and random forest.
1.005
1 1
1
0.995
0.99
0.99
0.985
RF NB KNN
TP
Recall (2)
TP FN
32 International Journal of Online and Biomedical Engineering (iJOE) iJOE | Vol. 20 No. 3 (2024)
Web Attack Intrusion Detection System Using Machine Learning Techniques
According to the results presented in Table 1, Figure 6 clearly shows that the RF
and KNN have the highest recall values in the training phase, both of which are 1.
While the recall values of the NB classifier are equal, their precision value is 0.772%.
Where is the false negative, or FN? This is a measure of the percentage of samples
that were incorrectly identified as positive when they were actually negative.
2 1 1
0.772
0
RF NB KNN
Precision Recall
F 1 score 2 (3)
Precision Recall
1.5
1 0.99
0.861
1
0.5
RF NB KNN
TP + TN
Accuracy = (4)
FP + FN + TP + TN
where, TN occurs.
The accuracy rates for various classifiers during the training phase are presented in
Table 1 and Figure 8. The RF model has achieved a remarkable accuracy rate of 99.7883%
during the training phase. In terms of accurately classifying data, this algorithm per-
formed better. With a classification accuracy of only 77.06%, NB exhibits the lowest
accuracy. It achieved a 99.6478% accuracy rate for the KNN algorithm, demonstrating
strong performance. The RF machine learning algorithm outperformed other machine
learning algorithms in terms of accuracy in categorizing data during the training phase.
200
99.7883 77.06 99.6478
100
0
RF NB KNN
iJOE | Vol. 20 No. 3 (2024) International Journal of Online and Biomedical Engineering (iJOE) 33
Baklizi et al.
This section will examine the various common machine learning methods uti-
lized in our study and analyze their relevance to the experimental outcomes for the
different machine learning classifiers employed. During the training phase, the RF
model achieved an outstanding accuracy rate of 99.7883%.
1.02
1 1
1 0.99
0.98
RF NB KNN
2
1 0.772 1
1
0
RF NB KNN
1.5 1 0.999
0.861
1
0.5
RF NB KNN
Fig. 11. F1-score rate of various classification algorithms in the testing phase
34 International Journal of Online and Biomedical Engineering (iJOE) iJOE | Vol. 20 No. 3 (2024)
Web Attack Intrusion Detection System Using Machine Learning Techniques
used in this study. This algorithm classified the data more accurately. NB has the
lowest accuracy, with only 77.0794% of the proportion adequately identified. The
RF algorithm achieved 99.437% classification accuracy, which is considered a good
result. In terms of accuracy and classification rate during testing, the KNN method
outperformed the other algorithms.
200
99.437 77.0794 99.4916
0
RF NB KNN
The results presented in Table 1 and Figures 5 to 12 indicate that the RF classifier
outperformed the NB and KNN classifiers in terms of accuracy during the evaluation
of the training phase. During the testing and assessment phases, the KNN classifier
outperformed the RF and NB classifiers in terms of accuracy rate.
5 CONCLUSION
This study compared three machine learning classifiers for identifying web
attacks in the instruction detection system (IDS). These classifiers include the NB, RF,
and KNN classifiers. Python and the Jupyter environment were utilized to execute
these classifiers on the dataset and assess the accuracy rate. The datasets for web
attacks have been initially gathered. Data cleaning, primary feature selection, and
extraction were performed during the data preprocessing phase after obtaining the
raw CIC-IDS2017 dataset. After that, the CIC-IDS2017 datasets are classified using
various machine learning classifiers, such as KNN, RF, and NB classifiers. These
machine-learning classifiers undergo training, testing, and evaluation. Finally, the
Python software compares the detection accuracy rate, F1-score rate, recall, and
precision of several machine-learning classifiers using the CIC-IDS2017 datasets. The
experiments utilized a 10-fold cross-validation procedure. RF classifiers were found
to be the most accurate for detecting web attacks in IDS during the training phase,
according to the studies conducted. During the testing phase, the KNN classifier out-
performed the NB and RF classifiers in terms of accuracy when classifying IDS web
attacks. The results of this study will be beneficial to other researchers as they strive
to develop an effective method for a web-attack intrusion detection system.
6 REFERENCES
[1] Y. Pan et al., “Detecting web attacks with end-to-end deep learning,” J. Internet Serv. Appl.,
vol. 10, no. 1, pp. 1–22, 2019. https://doi.org/10.1186/s13174-019-0115-x
[2] D. Kshirsagar and S. Kumar, “An ensemble feature reduction method for web-attack
detection,” J. Discret. Math. Sci. Cryptogr., vol. 23, no. 1, pp. 283–291, 2020. https://doi.org/
10.1080/09720529.2020.1721861
[3] R. Panigrahi and S. Borah, “A detailed analysis of CICIDS2017 dataset for designing intru-
sion detection systems,” Int. J. Eng. Technol., vol. 7, no. 3.24, pp. 479–482, 2018.
[4] E. E. Abdallah, W. Eleisah, and A. F. Otoom, “Intrusion detection systems using
supervised machine learning techniques: A survey,” Procedia Comput. Sci., vol. 201,
pp. 205–212, 2022. https://doi.org/10.1016/j.procs.2022.03.029
iJOE | Vol. 20 No. 3 (2024) International Journal of Online and Biomedical Engineering (iJOE) 35
Baklizi et al.
[5] I. Almomani, B. Al-Kasasbeh, and M. Al-Akhras, “WSN-DS: A dataset for intrusion detec-
tion systems in wireless sensor networks,” J. Sensors, vol. 2016, pp. 1–16, 2016. https://
doi.org/10.1155/2016/4731953
[6] L. Alsulaiman and S. Al-Ahmadi, “Performance evaluation of machine learning tech-
niques for DOS detection in wireless sensor network,” Int. J. Netw. Secur. Its Appl., vol. 13,
no. 2, pp. 21–29, 2021. https://doi.org/10.5121/ijnsa.2021.13202
[7] G. A. N. Segura, S. Skaperas, A. Chorti, L. Mamatas, and C. B. Margi, “Efficient denial
of service attacks detection in wireless sensor networks,” J. Inf. Sci. Eng., vol. 34, no. 4,
pp. 977–1000, 2018. https://doi.org/10.1109/ICCWorkshops49005.2020.9145136
[8] P. Nancy, S. Muthurajkumar, S. Ganapathy, S. V. N. Santhosh Kumar, M. Selvi, and
K. Arputharaj, “Intrusion detection using dynamic feature selection and fuzzy temporal
decision tree classification for wireless sensor networks,” IET Commun., vol. 14, no. 5,
pp. 888–895, 2020. https://doi.org/10.1049/iet-com.2019.0172
[9] R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and
S. Venkatraman, “Deep learning approach for intelligent intrusion detection system,” IEEE
Access, vol. 7, no. c, pp. 41525–41550, 2019. https://doi.org/10.1109/ACCESS.2019.2895334
[10] L. Segurola-Gil, F. Zola, X. Echeberria-Barrio, and R. Orduna-Urrutia, “NBcoded: Network
attack classifiers based on encoder and naive bayes model for resource limited devices,”
Commun. Comput. Inf. Sci., pp. 55–70, 2021. https://doi.org/10.1007/978-3-030-93733-1_4
[11] A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad,
“CNN-LSTM: Hybrid deep neural network for network intrusion detection system,” IEEE
Access, vol. 10, pp. 99837–99849, 2022. https://doi.org/10.1109/ACCESS.2022.3206425
[12] A. Yulianto, P. Sukarno, and N. A. Suwastika, “Improving adaboost-based Intrusion
Detection System (IDS) performance on CIC IDS 2017 dataset,” J. Phys. Conf. Ser., vol. 1192,
pp. 1–10, 2019. https://doi.org/10.1088/1742-6596/1192/1/012018
[13] S. Vaithyasubramanian and A. Christy, “An analysis of CFG password against brute force
attack for web applications,” Contemp. Eng. Sci., vol. 8, no. 9, pp. 367–374, 2015. https://
doi.org/10.12988/ces.2015.5252
[14] F. Ayankoya and B. Ohwo, “Brute-force attack prevention in cloud computing using
one-time password and cryptographic hash function,” Int. J. Comput. Sci. Inf. Secur.,
vol. 17, no. 2, pp. 7–19, 2019. [Online]. Available: https://www.academia.edu/38523734/
Brute-Force_Attack_Prevention_in_Cloud_Computing_Using_One-Time_Password_and_
Cryptographic_Hash_Function.
[15] I. Tariq, M. A. Sindhu, R. A. Abbasi, A. S. Khattak, O. Maqbool, and G. F. Siddiqui, “Resolving
cross-site scripting attacks through genetic algorithm and reinforcement learning,”
Expert Syst. Appl., vol. 168, p. 114386, 2021. https://doi.org/10.1016/j.eswa.2020.114386
[16] I. Hydara, A. B. M. Sultan, H. Zulzalil, and N. Admodisastro, “Current state of research
on cross-site scripting (XSS) – A systematic literature review,” Inf. Softw. Technol., vol. 58,
pp. 170–186, 2015. https://doi.org/10.1016/j.infsof.2014.07.010
[17] S. Gupta and B. B. Gupta, “Cross-Site Scripting (XSS) attacks and defense mechanisms:
Classification and state-of-the-art,” Int. J. Syst. Assur. Eng. Manag., vol. 8, pp. 512–530,
2017. https://doi.org/10.1007/s13198-015-0376-0
[18] M. Alghawazi, D. Alghazzawi, and S. Alarifi, “Detection of SQL injection attack using
machine learning techniques: A systematic literature review,” J. Cybersecurity Priv.,
vol. 2, no. 4, pp. 764–777, 2022. https://doi.org/10.3390/jcp2040039
[19] S. W. Boyd and A. D. Keromytis, “SQLrand: Preventing SQL injection attacks,” Lect. Notes
Comput. Sci., vol. 3089, pp. 292–302, 2004. https://doi.org/10.1007/978-3-540-24852-1_21
[20] W. G. J. Halfond, J. Viegas, and A. Orso, “A classification of SQL injection attacks and
countermeasures,” in Proceedings of the IEEE International Symposium on Secure Software
Engineering, 2006, pp. 1–11.
36 International Journal of Online and Biomedical Engineering (iJOE) iJOE | Vol. 20 No. 3 (2024)
Web Attack Intrusion Detection System Using Machine Learning Techniques
iJOE | Vol. 20 No. 3 (2024) International Journal of Online and Biomedical Engineering (iJOE) 37
Baklizi et al.
[38] Z. Pelletier and M. Abualkibash, “Evaluating the CIC IDS-2017 dataset using machine
learning methods and creating multiple predictive models in the statistical computing
language R,” Int. Res. J. Adv. Eng. Sci., vol. 5, no. 2, pp. 187–191, 2020.
[39] S. B. Kotsiantis and D. Kanellopoulos, “Data preprocessing for supervised leaning,”
vol. 1, no. 2, pp. 111–117, 2006. https://users.ece.utexas.edu/~ethomaz/courses/dm/papers/
data-preprocessing.pdf
[40] H. Kanaker, N. A. Karim, S. A. B. Awwad, N. H. A. Ismail, J. Zraqou, and A. M. F. Alali,
“Trojan horse infection detection in cloud based environment using machine learning,”
Int. J. Interact. Mob. Technol., vol. 16, no. 24, pp. 81–106, 2022. https://doi.org/10.3991/
ijim.v16i24.35763
[41] S. Raschka and V. Mirjalili, Python Machine Learning: Machine Learning and Deep Learning
with Python. Scikit-Learn, and TensorFlow. Second edition. 2017.
[42] R. Bouckaert et al., “WEKA manual for version 3-9-1,” 2016. [Online]. Available: http://
usermanual.wiki/Document/WekaManual391.1255144600.
7 AUTHORS
Mahmoud Khalid Baklizi is an Associate Professor in Department of Computer
Sciences, Faculty of Information Technology, Isra University, Jordan (E-mail:
[email protected]).
Issa Atoum is an Associate Professor with the Software Engineering Department,
Faculty of Information Technology, The World Islamic Sciences and Education
University, Jordan (E-mail: [email protected]).
Mohammad Alkhazaleh is an Assistant Professor in Department of Computer
Sciences, Faculty of Information Technology, Isra University, Jordan (E-mail:
[email protected]).
Hasan Kanaker is an Assistant Professor in Cybersecurity department and the
Head of Cybersecurity and Computer Information System departments, Faculty of
Information Technology at Isra University, Jordan (E-mail: [email protected]).
Nibras Abdullah is an Assistant Professor in School of Computer Sciences,
Universiti Sains Malaysia, Malaysia (E-mail: [email protected]).
Ola A. Al-Wesabi is an Assistant Professor in Faculty of Computer Science
and Engineering, Hodeidah University, Hodeidah, Yemen (E-mail: ola.wosabi@
gmail.com).
Ahmed Ali Otoom is an Assistant Professor in Cybersecurity and Cloud
Computing Department, Faculty of Information Technology, Applied Science Private
University, Jordan (E-mail: [email protected]).
38 International Journal of Online and Biomedical Engineering (iJOE) iJOE | Vol. 20 No. 3 (2024)