Supervised Machine Learning Algorithms For Intrusion Detection
Supervised Machine Learning Algorithms For Intrusion Detection
Learning Algorithms
for
Intrusion Detection
prepare: Roaa almadani
INTRODUCTION
● Intrusion detection systems using supervised machine learning algorithms are
considered one of the most important tools used in the field of information
security. These systems analyze data and detect illegal activities and intrusions
into networks and systems. These systems rely on machine learning techniques to
classify data as either normal activity or a hack. These systems include training
and testing phases, where the algorithms are trained on a set of pre-labeled data to
learn the natural pattern of the data and distinguish between normal activities and
intrusions. Many supervisory machine learning algorithms are available for
intrusion detection systems, such as Gaussian Naive Bayes, Decision Tree,
Random Forest, Support Vector Machine, and Logistic Regression.
problem
&
solve
The problem of security and cyber
intrusions targeting networks is one of the
biggest issues that organizations face today.
4 2
Analysis of abnormal
Detect new intrusions behavior
The system can learn from previous attacks, The system can learn from normal and
identify common features of these attacks, and abnormal patterns and identify and warn against
use them to detect future attacks illegal behavior
NEWLY IMPLEMENTED MODELS
Support Vector
Decision Tree Model Random Forest Model
Machine Model
01 02 03 04
Infrastruct
Enemy ure Capacity Victim
analysis analysis analysis analysis
The enemy is understood The infrastructure used by Attackers' ability is Targeted victims are
by identifying the origin of the attackers is exposed, assessed to gain identified and the
the attack, the entities which includes insight into their attackers' ultimate goal
involved, motives and compromised systems, skills and is determined
sponsors, and the timeline control servers, data development
of activities. management tactics, and
data leakage paths.
Opportunities to apply in the current
Gini Impurity-based
environment.
Weighted Random
Forest (GIWRF) 01
02
Ensemble-Learning
Framework for 03
Deep Neural
Intrusion Detection Network (DNN) for
Intrusion Detection
CHALLENGE
Before researching supervised machine The need to collect a large set of There are some technical challenges
learning algorithms for intrusion detection, intrusion-related data and use it to while carrying out the research, such
you must understand the basic theory and train models. as computing power, available
concepts of machine learning and resources, programming, and
supervised learning and how to apply them dealing with big data.
in the field of intrusion detection.
References
1. Chenniappanadar, S. K., Gnanamurthy, S., Sakthivelu, V. K., & Kaliappan, V. K. (2023). A Supervised Machine Learning Based
Intrusion Detection Model for Detecting Cyber-Attacks Against Computer System. International Journal of Communication Networks
and Information Security (IJCNIS), 15(1), 1-10.
2. Abrar, I., Ayub, Z., Masoodi, F., & Bamhdi, A. M. (2020). A machine learning approach for intrusion detection system on NSL-KDD
dataset. 2020 International Conference on Smart Electronics and Communication (ICOSEC), 919-924.
3. Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic
study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32, e4150.
4. Aziz, Z. A., & Abdulazeez, A. M. (2021). Application of Machine Learning Approaches in Intrusion Detection System. Journal of Soft
Computing and Data Mining, 2, 1-13.
5. Chauhan, A., & Vamsi, P. R. (2019). Anomalous Ozone Measurements Detection Using Unsupervised Machine Learning Methods.
2019 International Conference on Signal Processing and Communication (ICSC), 69-74.
6. L. Shahbandayeva, U. Mammadzada, I. Manafova, S. Jafarli and A. Z. Adamov, "Network Intrusion Detection using Supervised and
Unsupervised Machine Learning," 2022 IEEE 16th International Conference on Application of Information and Communication
Technologies (AICT), Washington DC, DC, USA, 2022, pp. 1-7, doi: 10.1109/AICT55583.2022.10013594..
7. Ding, Y., & Zhai, Y. (2018). Intrusion detection system for NSL-KDD dataset using convolutional neural networks. Proceedings of the
2018 2nd International Conference on Computer Science and Artificial Intelligence, 81-85.