Intrusion Detection System with Machine Learning and Multiple Datasets
- URL: http://arxiv.org/abs/2312.01941v1
- Date: Mon, 4 Dec 2023 14:58:19 GMT
- Title: Intrusion Detection System with Machine Learning and Multiple Datasets
- Authors: Haiyan Xuan (1), Mohith Manohar (2) ((1) Carmel High School, (2)
Columbia University)
- Abstract summary: In this paper, an enhanced intrusion detection system (IDS) that utilizes machine learning (ML) is explored.
Ultimately, this improved system can be used to combat the attacks made by unethical hackers.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As Artificial Intelligence (AI) technologies continue to gain traction in the
modern-day world, they ultimately pose an immediate threat to current
cybersecurity systems via exploitative methods. Prompt engineering is a
relatively new field that explores various prompt designs that can hijack large
language models (LLMs). If used by an unethical attacker, it can enable an AI
system to offer malicious insights and code to them. In this paper, an enhanced
intrusion detection system (IDS) that utilizes machine learning (ML) and
hyperparameter tuning is explored, which can improve a model's performance in
terms of accuracy and efficacy. Ultimately, this improved system can be used to
combat the attacks made by unethical hackers. A standard IDS is solely
configured with pre-configured rules and patterns; however, with the
utilization of machine learning, implicit and different patterns can be
generated through the models' hyperparameter settings and parameters. In
addition, the IDS will be equipped with multiple datasets so that the accuracy
of the models improves. We evaluate the performance of multiple ML models and
their respective hyperparameter settings through various metrics to compare
their results to other models and past research work. The results of the
proposed multi-dataset integration method yielded an accuracy score of 99.9%
when equipped with the XGBoost and random forest classifiers and
RandomizedSearchCV hyperparameter technique.
Related papers
- Optimize Incompatible Parameters through Compatibility-aware Knowledge Integration [104.52015641099828]
Existing research excels in removing such parameters or merging the outputs of multiple different pretrained models.
We propose Compatibility-aware Knowledge Integration (CKI), which consists of Deep Assessment and Deep Splicing.
The integrated model can be used directly for inference or for further fine-tuning.
arXiv Detail & Related papers (2025-01-10T01:42:43Z) - Optimized IoT Intrusion Detection using Machine Learning Technique [0.0]
Intrusion detection systems (IDSs) are essential for defending against a variety of attacks.
The functional and physical diversity of IoT IDS systems causes significant issues.
For peculiarity-based IDS, this study proposes and implements a novel component selection and extraction strategy.
arXiv Detail & Related papers (2024-12-03T21:23:54Z) - SONAR: A Synthetic AI-Audio Detection Framework and Benchmark [59.09338266364506]
SONAR is a synthetic AI-Audio Detection Framework and Benchmark.
It aims to provide a comprehensive evaluation for distinguishing cutting-edge AI-synthesized auditory content.
It is the first framework to uniformly benchmark AI-audio detection across both traditional and foundation model-based deepfake detection systems.
arXiv Detail & Related papers (2024-10-06T01:03:42Z) - Impacts of Data Preprocessing and Hyperparameter Optimization on the Performance of Machine Learning Models Applied to Intrusion Detection Systems [0.8388591755871736]
Intrusion Detection Systems (IDS) have been continuously improved.
Many of them incorporate machine learning (ML) techniques to identify threats.
This article aims to present a study that fills this research gap.
arXiv Detail & Related papers (2024-07-15T14:30:25Z) - Automatic AI Model Selection for Wireless Systems: Online Learning via Digital Twinning [50.332027356848094]
AI-based applications are deployed at intelligent controllers to carry out functionalities like scheduling or power control.
The mapping between context and AI model parameters is ideally done in a zero-shot fashion.
This paper introduces a general methodology for the online optimization of AMS mappings.
arXiv Detail & Related papers (2024-06-22T11:17:50Z) - Explainable AI for Comparative Analysis of Intrusion Detection Models [20.683181384051395]
This research analyzes various machine learning models to the tasks of binary and multi-class classification for intrusion detection from network traffic.
We trained all models to the accuracy of 90% on the UNSW-NB15 dataset.
We also discover that Random Forest provides the best performance in terms of accuracy, time efficiency and robustness.
arXiv Detail & Related papers (2024-06-14T03:11:01Z) - A Simple Framework to Enhance the Adversarial Robustness of Deep
Learning-based Intrusion Detection System [5.189166936995511]
We propose a novel IDS architecture that can enhance the robustness of IDS against adversarial attacks.
The proposed-IDS consists of three components: DL-based IDS, adversarial example detector, and ML-based IDS.
In our experiments, we observe a significant improvement in the prediction performance of the IDS when subjected to adversarial attack.
arXiv Detail & Related papers (2023-12-06T02:33:12Z) - Incremental Online Learning Algorithms Comparison for Gesture and Visual
Smart Sensors [68.8204255655161]
This paper compares four state-of-the-art algorithms in two real applications: gesture recognition based on accelerometer data and image classification.
Our results confirm these systems' reliability and the feasibility of deploying them in tiny-memory MCUs.
arXiv Detail & Related papers (2022-09-01T17:05:20Z) - Using Data Assimilation to Train a Hybrid Forecast System that Combines
Machine-Learning and Knowledge-Based Components [52.77024349608834]
We consider the problem of data-assisted forecasting of chaotic dynamical systems when the available data is noisy partial measurements.
We show that by using partial measurements of the state of the dynamical system, we can train a machine learning model to improve predictions made by an imperfect knowledge-based model.
arXiv Detail & Related papers (2021-02-15T19:56:48Z) - Omni: Automated Ensemble with Unexpected Models against Adversarial
Evasion Attack [35.0689225703137]
A machine learning-based security detection model is susceptible to adversarial evasion attacks.
We propose an approach called Omni to explore methods that create an ensemble of "unexpected models"
In studies with five types of adversarial evasion attacks, we show Omni is a promising approach as a defense strategy.
arXiv Detail & Related papers (2020-11-23T20:02:40Z) - SUOD: Accelerating Large-Scale Unsupervised Heterogeneous Outlier
Detection [63.253850875265115]
Outlier detection (OD) is a key machine learning (ML) task for identifying abnormal objects from general samples.
We propose a modular acceleration system, called SUOD, to address it.
arXiv Detail & Related papers (2020-03-11T00:22:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.