A Real-time LAN/WAN and Web Attack Prediction Framework Using Hybrid Machine Learning Model
Keywords:Network intrusion detection, web security, classification algorithm, random forest, packet sniffer.
Real-time network attacks have become an increasingly serious issue to LAN/WAN security in recent years. As the size of the network flow increases, it becomes difficult to pre-process and analyze the network packets using the traditional network intrusion detection tools and techniques. Traditional NID tools and techniques require high computational memory and time to process large number of packets in incremental manner due to limited buffer size. Web intrusion detection is also one of the major threat to real-time web applications due to unauthorized userâ€™s request to web server and online databases. In this paper, a hybrid real-time LAN/WAN and Web IDS model is designed and implemented using the machine learning classifier. In this model, different types of attacks are detected and labelled prior to train the machine learning model. Future network packets are predicted using the trained machine learning classifier for attack prediction. Experimental results are simulated on real-time LAN/WAN network and client-server web application for performance analysis. Simulated results show that the proposed machine learning based attack detection model is better than the traditional statistical and rule based learning models in terms of time, detection rate are concerned.
 R. Kaur ad S. Singh, â€œA survey of Machine learning and social network analysis based anomaly detection techniquesâ€, Egyptian Informatics Journal (2016) 17, pp. 199â€“216.
 J. David and C. Thomas, â€œDDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Trafficâ€, 2nd International Symposium on Big Data and Cloud Computing (ISBCCâ€™15), pp. 30-36.
 S. Duque and Dr .Md. Nizam bin Omar, â€œUsing Machine learning Algorithms for Developing a Model for Intrusion Detection System (IDS)â€, â€œComplex Adaptive Systems, Publication 5 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science and Technology 2015-San Jose, CA.
 A.Verma and V. Ranga, â€œStatistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learningâ€, â€œ6th international conference on smart computing and communications, ICCSCC 2017, Dec 2017, Kurukshetra, India.
 R. M. Elbasiony, E. A. Sallam, T. E. Eltobely and M. M. Fahmy, â€œA hybrid network intrusion detection framework based on random forests and weighted k-meansâ€, Ain Shams Engineering Journal (2013) 4, 753â€“762.
 B. Agarwal and N. Mittal, â€œHybrid Approach for Detection of Anomaly Network Traffic using Machine learning Techniquesâ€, â€œ2nd International Conference on Communication, Computing & Security [ICCCS-2012]â€.
 Md. H. Ali, B. A. Dawood AL Mohammed, M. A. Binti Ismail and Md. F. Zolkipli, â€œA new intrusion detection system based on Fast Learning Network and Particle swarm optimizationâ€.
 Md. Al-Qurishi, M. Alrubaian, Sk Md Mizanur Rahman, A. Alamri and Md. Mehedi Hassan, â€œA prediction system of Web DDOS attack in social network using deep-regression modelâ€, Future Generation Computer Systems , 2017.
 M. Mazini, B. Shirazi and I. Mahdavi, â€œAnomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithmsâ€, Journal of King Saud University â€“ Computer and Information Sciences.
 A.Sayed A. Aziz, Sanaa EL-OlaHanafi and Aboul EllaHassanien, â€œComparison of classification techniques applied for network intrusion detection and classificationâ€, Journal ofAppliedLogic24(2017)109â€“118.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).