A Defensive Framework Against Metigatic Generic Attacks Targeting Network Imbalance in Machine Learning-Based Cyber Defense Systems

Authors

  • Vineeta Shrivastava Research Scholar, Department of Computer Science and Engineering, LNCT University, Bhopal, M.P.
  • Dr. Sakshi Rai Professor, Department of Computer Science and Engineering, LNCT University, Bhopal, M.P.

DOI:

https://doi.org/10.29070/mzrc2k24

Keywords:

Metigatic Generic Attack, Network Imbalancing, Machine Learning, Network Intrusion Detection System (NIDS), Adversarial Training, Dataset Balancing

Abstract

The increasing complexity of cyber threats is making it harder for traditional intrusion detection systems to identify adaptive and subtle attacks. Machine learning (ML)-powered network intrusion detection systems (NIDS) are more capable of detecting threats, but they may be compromised by generic attacks. This can result in network imbalances and poor model performance since hostile traffic is under-represented. In order to improve ML-based NIDS, this research proposes a metigatic defensive architecture. The framework incorporates methods such as adversarial training, dataset balancing, feature preprocessing, feature engineering, and model fine-tuning. We construct realistic adversarial traffic samples with feature interdependencies and protocol compliance to evaluate and enhance the resilience of the model. Tested on the UNSW-NB15 and NSL-KDD datasets, the results demonstrate considerable improvements in accuracy, recall, and precision, particularly for under-represented or adversarial perturbed attacks. According to the results, the proposed architecture mitigates the impact of traffic imbalance brought on by generic attacks, providing a workable and scalable approach for robust intrusion detection in dynamic network environments.

References

Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE Symposium on Security and Privacy, 305–316.

Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research, 16, 321–357.

Zhang, J., Zulkernine, M., & Haque, A. (2019). Random-forest-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 38(5), 649–659.

Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50

S. R. Safavian and D. Landgrebe. A survey of decision tree classifier methodology. IEEE Transactions on Systems, Man, and Cybernetics, 21(3), pages 660–674, 1991.

S. Zhang, C. Li, and J. Jiang. A Random Forest-Based Anomaly Detection System for Network Intrusion Detection. Security and Communication Networks, vol. 2018, Article ID 9671863, 2018.

R. Vinayakumar, K. P. Soman, and P. Poornachandran. Applying Convolutional Neural Network for Network Intrusion Detection. Journal of Network and Computer Applications, 2017.

C. Yin, Y. Zhu, J. Fei, and X. He. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 2017.

S. Roy, W. H. Cheung, and A. Roy. LSTM networks for intrusion detection. In IEEE International Conference on Computer and Information Technology, 2017

G Emile S, Mbungu Kala, “Critical Role of Cyber Security in Global Economy”, Open Journal of Safety Science and Technology, Vol. 13, pp. 231-248, 2023. doi: 10.4236/ojsst.2023.134012.

Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber security." computers & security, Vol. 38, pp. 97-102, 2013.

Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani. A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pages 1–6. IEEE, 2009.

Nour Moustafa and Jill Slay. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 Military Communications and Information Systems Conference (MilCIS), pages 1–6. IEEE, 2015.

J W Goodell and S. Corbet, Commodity market exposure to energy firm distress: Evidence from the colonial pipeline ransomware attack,’’Finance Res. Lett., vol. 51, Jan. 2023, Art. no. 103329

R. Alkhadra, J. Abuzaid, M. AlShammari, and N. Mohammad, ‘‘Solar winds hack: In-depth analysis and countermeasures,’’ in Proc. 12th Int. Conf. Comput. Commun. Netw. Technol. (ICCCNT), Jul. 2021, pp. 1–7.

Cobalt https://www.cobalt.io/blog/biggest-cybersecurity-attacks-inhistory

Downloads

Published

2024-10-01

How to Cite

[1]
“A Defensive Framework Against Metigatic Generic Attacks Targeting Network Imbalance in Machine Learning-Based Cyber Defense Systems”, JASRAE, vol. 21, no. 7, pp. 601–613, Oct. 2024, doi: 10.29070/mzrc2k24.

How to Cite

[1]
“A Defensive Framework Against Metigatic Generic Attacks Targeting Network Imbalance in Machine Learning-Based Cyber Defense Systems”, JASRAE, vol. 21, no. 7, pp. 601–613, Oct. 2024, doi: 10.29070/mzrc2k24.