INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )
E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 10 NO. 3 2024
DOI: 10.56201/ijcsmt.v10.no3.2024.pg105.120
K. C. Eme, V.I. Anireh & N. D. Nwiabu
Network traffic forecast is a critical aspect of network management and cybersecurity, encompassing the prediction and analysis of data transmission patterns within computer networks. As the volume and complexity of network traffic continue to increase exponentially, accurate forecasting becomes indispensable for ensuring efficient resource allocation, optimizing network performance, and detecting potential security threats. Object Oriented Analysis and Design (OOAD) was adopted as the research methodology, and python was used as the programming language. An experiment was conducted to detect malicious traffic on network systems using a hybrid approach of firefly algorithm and cortical learning, encompassing two phases: Exploratory Data Analysis (EDA) and training of the Random Forest Classifier. In the EDA phase, techniques were employed to address dataset imbalance in the NSL-KDD dataset through random oversampling, alongside identifying the ten most important features using Isolation Forest. During the model training phase, parameters were initialized for both algorithms, leading to iterative optimization to achieve an optimal balance between exploration and exploitation crucial for capturing complex network traffic patterns. Evaluation of the model's outcomes, including training and testing results, was conducted using classification reports and confusion matrices. The model showcased promising results, achieving an accuracy of 99.9% in detecting malicious network traffic, and significantly outperformed existing systems, demonstrating the efficacy of the hybrid approach in network intrusion detection. This study underscores the effectiveness of the hybrid approach, offering superior performance compared to traditional methods.
- Network Traffic Forest, Cortical Learning, Intrusion Detection, Machine Learning
Abdulhammed, R., Faezipour, M., Abuzneid, A., & AbuMallouh, A. (2018). Deep and machine
learning approaches for anomaly-based intrusion detection of imbalanced network
traffic. IEEE sensors letters, 3(1), 1-4.
Abosata, N., Al?Rubaye, S., Tsourdos, A., & Emmanouilidis, C. (2021). Internet of things for
system integrity: a comprehensive survey on security, attacks and countermeasures for
industrial applications. Sensors, 21(11), 3654. https://doi.org/10.3390/s21113654
Ahmed, K., Tahir, M., Habaebi, M., Lau, S., & Ahad, A. (2021). Machine learning for
authentication and authorization in IoT: taxonomy, challenges and future research
direction. Sensors, 21(15), 5122. https://doi.org/10.3390/s21155122
Albulayhi, K., Smadi, A., Sheldon, F., & Abercrombie, R. (2021). IoT intrusion detection
taxonomy,
reference
architecture,
and
analyses.
Sensors,
21(19),
https://doi.org/10.3390/s21196432
Caminero, G., Lopez-Martin, M., & Carro, B. (2019). Adversarial environment reinforcement
learning algorithm for intrusion detection. Computer Networks, 159, 96-109.
Elsherif, A. (2018). Automatic intrusion detection system using deep recurrent neural network
paradigm. Journal of Information Security and Cybercrimes Research, 1(1), 21-31.
Feng, J., Shen, L., Chen, Z., Wang, Y., & Li, H. (2020). A two-layer deep learning method for
android malware detection using network traffic. IEEE Access, 8, 125786-125796.
Hwang, R. H., Peng, M. C., Huang, C. W., Lin, P. C., & Nguyen, V. L. (2020). An unsupervised
deep learning model for early network traffic anomaly detection. IEEE Access, 8, 30387-
Meena, S., Dhaka, V., Sinwar, D., Kavita, ., Ijaz, M., & Wo?niak, M. (2021). A survey of deep
convolutional neural networks applied for prediction of plant leaf diseases. Sensors, 21(14),
https://doi.org/10.3390/s21144749
Mitsuhashi, R., Satoh, A., Jin, Y., Iida, K., Shinagawa, T., & Takai, Y. (2021). Identifying
malicious dns tunnel tools from doh traffic using hierarchical machine learning
classification. In Information Security: 24th International Conference, ISC 2021, Virtual
Event, November 10–12, 2021, Proceedings 24 (pp. 238-256). Springer International
Publishing.
Rajesh, L., & Satyanarayana, P. (2021). Evaluation of machine learning algorithms for
detection of malicious traffic in scada network. Journal of Electrical Engineering &
Technology, 1-16.
Rose, J. R., Swann, M., Bendiab, G., Shiaeles, S., & Kolokotronis, N. (2021, June). Intrusion
detection using network traffic profiling and machine learning for IoT. In 2021 IEEE 7th
International Conference on Network Softwarization (NetSoft) (pp. 409-415). IEEE.
Sarhan, M., Layeghy, S., & Portmann, M. (2022). Towards a standard feature set for network
intrusion detection system datasets. Mobile networks and applications, 1-14.
Sethi, K., Sai Rupesh, E., Kumar, R., Bera, P., & Venu Madhav, Y. (2020). A context-aware
robust intrusion detection system: a reinforcement learning-based approach. International
Journal of Information Security, 19, 657-678.
Sun, W., Tang, M., Zhang, L., Huo, Z., & Shu, L. (2020). A survey of using swarm intelligence
algorithms in IoT. Sensors, 20(5), 1420. https://doi.org/10.3390/s20051420
Zellner, M., Abbas, A., Budescu, D., & Galstyan, A. (2021). A survey of human judgement
and
quantitative
forecasting
methods.
Royal
Society
Open
Science,
8(2).
https://doi.org/10.1098/rsos.201187