Journal of Machine and Computing


Self-Organizing Computational System for Network Anomaly Exploration using Learning Algorithms



Journal of Machine and Computing

Received On : 28 February 2023

Revised On : 12 June 2023

Accepted On : 06 July 2023

Published On : 05 October 2023

Volume 03, Issue 04

Pages : 431-445


Abstract


The forum in the nation for reporting information security flaws had 14,871 reports by the end of 2021, a 46.6% increase from 2020. The total of 5,567 high risk vulnerabilities, an increase of nearly 1,400 over the previous year. Evidently, both the total number of vulnerabilities found annually, and the total number of high-risk vulnerabilities are rising. In order for data mining technology to play a wider part in the predictive investigation of network security models, it is advised that its capability have to be improved. This paper combines the concepts of data mining (DM) with machine learning (ML), which introduces similar technologies from DM technology and security establishing collection channel, thereby finally introduces the computer network security maintenance process based on data mining in order to improve the application effect of DM in the predictive analysis of network security models. In this paper, a self-organizing neural network technique that detects denial of service (DOS) in complicated networks quickly, effectively, and precisely is introduced. It also analyses a number of frequently employed computer data mining methods, including association, clustering, classification, neural networks, regression, and web data mining. Finally, it introduces a computer data mining method based on the self-organizing (SO) algorithm. In comparison to conventional techniques, the SO algorithm-based computer data mining technology is also used in defensive detection tests against Dos attacks. A detection average accuracy rate of more than 98.56% and a detection average efficiency gain of more than 20% are demonstrated by experimental data to demonstrate that tests based on the Data Mining connected SO algorithm have superior defensive detection effects than standard algorithms.


Keywords


Self-Organizing, Geometric Neighborhood, Regression, NSL‐KDD, Over-Sampling, Under-Sampling and Data Imbalance.


  1. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Towards generating reallife datasets for network intrusion detection. IJ Network Security. 17(6), 683–701 (2015)
  2. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 973– 993, Aug. 2014, doi: 10.1016/j.jcss.2014.02.005.
  3. Uppal, H.A.M., Javed, M., Arshad, M.: An overview of intrusion detection system (IDS) along with its commonly used techniques and classifications. Int J Comput Sci Telecommun. 5(2), 20–24 (2014)
  4. N. Sun, J. Zhang, P. Rimba, S. Gao, L. Y. Zhang, and Y. Xiang, “Data-Driven Cybersecurity Incident Prediction: A Survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1744–1772, 2019, doi: 10.1109/comst.2018.2885561.
  5. P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection,” IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 686–728, 2019, doi: 10.1109/comst.2018.2847722.
  6. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Jul. 2009, doi: 10.1109/cisda.2009.5356528.
  7. R. and P. P., “Deep Learning With Conceptual View in Meta Data for Content Categorization,” Advances in Computational Intelli gence and Robotics, pp. 176–191, 2021, doi: 10.4018/978-1-7998-2108-3.ch007.
  8. Yin, Y. Zhu, J. Fei, and X. He, “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks,” IEEE Access, vol. 5, pp. 21954–21961, 2017, doi: 10.1109/access.2017.2762418.
  9. Z. Li, Z. Qin, K. Huang, X. Yang, and S. Ye, “Intrusion Detection Using Convolutional Neural Network s for Representation Learning,” Lecture Notes in Computer Science, pp. 858–866, 2017, doi: 10.1007/978-3-319-70139-4_87.
  10. J. Yogapriya, C. Saravanabhavan, R. Asokan, Ila. Vennila, P. Preethi, and B. Nithya, “A Study of Image Retrieval System Based on Feature Extraction, Selection, Classification and Similarity Measurements,” Journal of Medical Imaging and Health Informatics, vol. 8, no. 3, pp. 479–484, Mar. 2018, doi: 10.1166/jmihi.2018.2326.
  11. Z. Chen, C. K. Yeo, B. S. Lee, and C. T. Lau, “Autoencoder-based network anomaly detection,” 2018 Wireless Telecommunications Symposium (WTS), Apr. 2018, doi: 10.1109/wts.2018.8363930.
  12. M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. Lloret, “Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT,” Sensors, vol. 17, no. 9, p. 1967, Aug. 2017, doi: 10.3390/s17091967.
  13. Preethi. P and Asokan. R, “Neural Network Oriented RONI Prediction for Embedding Process with Hex Code Encryption in DICOM Images,” 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Dec. 2020, doi: 10.1109/icacccn51052.2020.9362880.
  14. G. Caminero, M. Lopez-Martin, and B. Carro, “Adversarial environment reinforcement learning algorithm for intrusion detection,” Computer Networks, vol. 159, pp. 96–109, Aug. 2019, doi: 10.1016/j.comnet.2019.05.013.
  15. P. Palanisamy, A. Padmanabhan, A. Ramasamy, and S. Subramaniam, “Remote Patient Activity Monitoring System by Integrating IoT Sensors and Artificial Intelligence Techniques,” Sensors, vol. 23, no. 13, p. 5869, Jun. 2023, doi: 10.3390/s23135869.
  16. KumarShrivas and A. Kumar Dewangan, “An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL- KDD Data Set,” International Journal of Computer Applications, vol. 99, no. 15, pp. 8–13, Aug. 2014, doi: 10.5120/17447-5392.
  17. Y. Zhou, G. Cheng, S. Jiang, and M. Dai, “Building an efficient intrusion detection system based on feature selection and ensemble classifier,” Computer Networks, vol. 174, p. 107247, Jun. 2020, doi: 10.1016/j.comnet.2020.107247.
  18. P. Preethi and R. Asokan, “An Attempt to Design Improved and Fool Proof Safe Distribution of Personal Healthcare Records for Cloud Computing,” Mobile Networks and Applications, vol. 24, no. 6, pp. 1755–1762, Oct. 2019, doi: 10.1007/s11036-019-01379-4.
  19. P. D. Shenoy, K. G. Srinivasa, K. R. Venugopal, and L. M. Patnaik, “Dynamic Association Rule Mining using Genetic Algorithms,” Intelligent Data Analysis, vol. 9, no. 5, pp. 439–453, Nov. 2005, doi: 10.3233/ida-2005-9503.
  20. P. Deepa Shenoy, K. G. Srinivasa, K. R. Venugopal, and L. M. Patnaik, “Evolutionary Approach for Mining Association Rules on Dynamic Databases,” Lecture Notes in Computer Science, pp. 325–336, 2003, doi: 10.1007/3-540-36175-8_32.
  21. S. J. Rizvi and J. R. Haritsa, “Maintaining Data Privacy in Association Rule Mining,” VLDB ’02: Proceedings of the 28th Inter national Conference on Very Large Databases, pp. 682–693, 2002, doi: 10.1016/b978-155860869-6/50066-4.
  22. S. M. Darwish, M. M. Madbouly, and M. A. El-Hakeem, “A Database Sanitizing Algorithm for Hiding Sensitive Multi-Level Association Rule Mining,” International Journal of Computer and Communication Engineering, vol. 3, no. 4, pp. 285–293, 2014, doi: 10.7763/ijcce.2014.v3.337.
  23. J. Vaidya and C. Clifton, “Privacy preserving association rule mining in vertically partitioned data,” Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, Jul. 2002, doi: 10.1145/775047.775142.
  24. J. Vaidya and C. Clifton, “Secure set intersection cardinality with application to association rule mining,” Journal of Computer Security, vol. 13, no. 4, pp. 593–622, Oct. 2005, doi: 10.3233/jcs-2005-13401.
  25. M. R. B. Diwate and A. Sahu, “Efficient Data Mining in SAMS through Association Rule,” International Journal of Electronics Communication and Computer Engineering, vol. 5, no. 3, pp. 593–597, 2014.

Acknowledgements


We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Preethi P, Lalitha K and Yogapriya J, “Self-Organizing Computational System for Network Anomaly Exploration using Learning Algorithms”, Journal of Machine and Computing, vol.3, no.4, pp. 431-445, October 2023. doi: 10.53759/7669/jmc202303035.


Copyright


© 2023 Preethi P, Lalitha K and Yogapriya J. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.