A Real-time LAN/WAN and Web Attack Prediction Framework Using Hybrid Machine Learning Model

  • Authors

    • Mohammad Arshad
    • Md. Ali Hussain
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.17774
  • Network intrusion detection, web security, classification algorithm, random forest, packet sniffer.
  • Real-time network attacks have become an increasingly serious issue to LAN/WAN security in recent years. As the size of the network flow increases, it becomes difficult to pre-process and analyze the network packets using the traditional network intrusion detection tools and techniques. Traditional NID tools and techniques require high computational memory and time to process large number of packets in incremental manner due to limited buffer size. Web intrusion detection is also one of the major threat to real-time web applications due to unauthorized user’s request to web server and online databases. In this paper, a hybrid real-time LAN/WAN and Web IDS model is designed and implemented using the machine learning classifier. In this model, different types of attacks are detected and labelled prior to train the machine learning model. Future network packets are predicted using the trained machine learning classifier for attack prediction. Experimental results are simulated on real-time LAN/WAN network and client-server web application for performance analysis. Simulated results show that the proposed machine learning based attack detection model is better than the traditional statistical and rule based learning models in terms of time, detection rate are concerned.

     

     

  • References

    1. [1] R. Kaur ad S. Singh, “A survey of Machine learning and social network analysis based anomaly detection techniquesâ€, Egyptian Informatics Journal (2016) 17, pp. 199–216.

      [2] J. David and C. Thomas, “DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Trafficâ€, 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15), pp. 30-36.

      [3] S. Duque and Dr .Md. Nizam bin Omar, “Using Machine learning Algorithms for Developing a Model for Intrusion Detection System (IDS)â€, “Complex Adaptive Systems, Publication 5 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science and Technology 2015-San Jose, CA.

      [4] A.Verma and V. Ranga, “Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learningâ€, “6th international conference on smart computing and communications, ICCSCC 2017, Dec 2017, Kurukshetra, India.

      [5] R. M. Elbasiony, E. A. Sallam, T. E. Eltobely and M. M. Fahmy, “A hybrid network intrusion detection framework based on random forests and weighted k-meansâ€, Ain Shams Engineering Journal (2013) 4, 753–762.

      [6] B. Agarwal and N. Mittal, “Hybrid Approach for Detection of Anomaly Network Traffic using Machine learning Techniquesâ€, “2nd International Conference on Communication, Computing & Security [ICCCS-2012]â€.

      [7] Md. H. Ali, B. A. Dawood AL Mohammed, M. A. Binti Ismail and Md. F. Zolkipli, “A new intrusion detection system based on Fast Learning Network and Particle swarm optimizationâ€.

      [8] Md. Al-Qurishi, M. Alrubaian, Sk Md Mizanur Rahman, A. Alamri and Md. Mehedi Hassan, “A prediction system of Web DDOS attack in social network using deep-regression modelâ€, Future Generation Computer Systems , 2017.

      [9] M. Mazini, B. Shirazi and I. Mahdavi, “Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithmsâ€, Journal of King Saud University – Computer and Information Sciences.

      [10] A.Sayed A. Aziz, Sanaa EL-OlaHanafi and Aboul EllaHassanien, “Comparison of classification techniques applied for network intrusion detection and classificationâ€, Journal ofAppliedLogic24(2017)109–118.

  • Downloads

  • How to Cite

    Arshad, M., & Ali Hussain, M. (2018). A Real-time LAN/WAN and Web Attack Prediction Framework Using Hybrid Machine Learning Model. International Journal of Engineering & Technology, 7(3.12), 1128-1136. https://doi.org/10.14419/ijet.v7i3.12.17774