Secured Cyber-Internet Security in Intrusion Detection with Machine Learning Techniques

Authors

  • Aarthi C Professor, Department of ECE, Sengunthar Engineering College, Tiruchengode, Tamilnadu.
  • Saranya K Department of Computer Science and Engineering, Bannari Amman Institute of Technology, sathyamangalam, Tamil Nadu, India
  • Naga Saranya N Associate Professor, Department of Computer Applications, Saveetha College of Liberal Arts & Science, SIMATS, Chennai, India
  • Ponlatha S Department of ECE, Mahendra Engineering College, Namakkal, India.

DOI:

https://doi.org/10.22399/ijcesen.491

Keywords:

Cybersecurity, Machine Learning, Security, Hybrid Model

Abstract

The rapid proliferation of Internet-connected devices has elevated the significance of cybersecurity, making intrusion detection a critical aspect of maintaining network integrity. Traditional security measures often fail to provide adequate protection against sophisticated attacks, necessitating advanced and robust solutions. This paper introduces a comprehensive cyber-internet security framework that leverages machine learning techniques for real-time intrusion detection and prevention. The proposed methodology employs a hybrid approach, integrating supervised and unsupervised learning models to detect anomalies and classify intrusions effectively. Specifically, a combination of Support Vector Machine (SVM), Decision Trees (DT), and K-means clustering is used to enhance detection accuracy and reduce false-positive rates.

The experimental results demonstrate that the proposed model achieved a detection accuracy of 97.8%, a precision of 96.5%, and a recall of 95.2% on the NSL-KDD dataset. The implementation also reduced the false-positive rate to 1.2% and the computational overhead by 15% compared to traditional detection systems. Additionally, the proposed system was tested on real-time traffic data, where it successfully identified and mitigated various cyber threats, including Distributed Denial of Service (DDoS) attacks and network infiltrations, with minimal latency and high reliability.

In conclusion, the study presents an efficient and secured cyber-internet security framework that significantly enhances intrusion detection capabilities using machine learning techniques. The proposed system provides a scalable and adaptive solution for securing critical infrastructure and networks against evolving cyber threats, making it an ideal candidate for deployment in real-world cybersecurity applications.

References

Zhang, J., Li, X., & Wang, L. (2020). Precision agriculture technologies for improving crop yield and reducing environmental impact. Agricultural Systems, 178, 102763. DOI:10.1201/B19336Corpus ID: 114417058

Li, X., Zhang, C., & Wang, Y. (2019). IoT-based precision agriculture: An overview and future perspectives. Computers and Electronics in Agriculture, 168, 105992. doi: 10.1109/ACCESS.2020.2970118

Shah, D., Singh, M., & Sahu, A. (2021). Real-time monitoring and automation in precision agriculture using IoT. Journal of Sensor and Actuator Networks, 10(1), 10.

Nguyen, T., Singh, A., & Yadav, P. (2020). A review of IoT-based applications in precision agriculture. Journal of Agricultural Science and Technology, 22(2), 1-15.

Singh, A., Yadav, S., & Singh, M. (2018). Low-power IoT and WSN-based systems for agricultural applications. International Journal of Precision Agriculture, 3(4), 245-256.

Shah, D., Gupta, R., & Yadav, A. (2020). Advanced sensor technologies for precision agriculture: A review. Sensors, 20(14), 3926.

Kumar, P., Patel, D., & Sharma, V. (2019). Smart farming with IoT and WSN: Challenges and solutions. Journal of Agricultural and Environmental Information, 4(3), 131-145.

Li, Z., Zhang, B., & Huang, L. (2020). Application of variable rate technology in precision agriculture: A review. Biosystems Engineering, 196, 55-67.

Zhou, J., Wu, Q., & Liu, M. (2021). Energy-efficient IoT frameworks for smart agriculture. IEEE Internet of Things Journal, 8(12), 9835-9847.

Zhang, C., Sun, Y., & Liu, H. (2020). Energy-efficient communication protocols for IoT and WSN-based precision agriculture. IEEE Transactions on Green Communications and Networking, 4(4), 1193-1205.

Wu, Y., Liu, J., & Zhang, T. (2021). Low-power adaptive sensor networks for smart agriculture. IEEE Access, 9, 98761-98770.

Li, X., Zhang, Y., & Wang, R. (2018). Adaptive clustering algorithms for energy-efficient WSNs in agriculture. IEEE Access, 6, 46548-46559.

Sharma, D., Patel, A., & Shah, M. (2019). Overcoming communication challenges in IoT-based precision agriculture. Journal of Agricultural Research, 5(1), 112-125.

Li, Y., Zhou, X., & Wang, P. (2019). Multi-hop communication in WSNs for agricultural applications. Journal of Sensor Technology, 8(3), 222-235.

Wang, T., Yang, H., & Zhang, L. (2020). Location-aware clustering for IoT-based precision agriculture. IEEE Transactions on Network and Service Management, 17(3), 1495-1507.

Zhou, P., Liu, Y., & Wang, Q. (2019). Multi-hop clustering algorithms for WSNs in precision agriculture. IEEE Access, 7, 76488-76499.

Singh, M., Sharma, A., & Patel, D. (2019). Energy-efficient location-aware IoT frameworks for smart farming. Sensors, 19(17), 3798.

Zhao, J., Zhang, Y., & Wang, H. (2021). Cost-effective IoT solutions for small-scale precision agriculture. Journal of Agricultural Engineering Research, 14(1), 92-101.

Kumar, A., Singh, R., & Sharma, V. (2021). Low-cost WSN solutions for precision agriculture in developing regions. International Journal of Agricultural Technology, 17(3), 1081-1095.

Li, Y., Zhou, X., & Zhao, T. (2018). Scalable and low-cost WSN frameworks for smart agriculture. IEEE Access, 6, 30904-30912.

Wang, H., Yang, F., & Zhang, C. (2020). Multifunctional sensor networks for IoT-based precision agriculture. Journal of Sensor and Actuator Networks, 9(2), 26.

Shah, M., Zhang, Y., & Liu, L. (2020). Hybrid communication protocols for energy-efficient WSNs in agriculture. IEEE Sensors Journal, 20(23), 14078

Maheshwari, R.U., Kumarganesh, S., K V M, S. et al. (2024). Advanced Plasmonic Resonance-enhanced Biosensor for Comprehensive Real-time Detection and Analysis of Deepfake Content. Plasmonics. https://doi.org/10.1007/s11468-024-02407-0

Maheshwari, R. U., Paulchamy, B., Arun, M., Selvaraj, V., & Saranya, N. N. (2024). Deepfake Detection using Integrate-backward-integrate Logic Optimization Algorithm with CNN. International Journal of Electrical and Electronics Research, 12(2), 696-710. https://doi.org/10.37391/IJEER.120248

Maheshwari, R. U., & Paulchamy, B. (2024). Securing online integrity: a hybrid approach to deepfake detection and removal using Explainable AI and Adversarial Robustness Training. Automatika, 65(4), 1517-1532. https://doi.org/10.1080/00051144.2024.2400640

M, P., B, J., B, B., G, S., & S, P. (2024). Energy-efficient and location-aware IoT and WSN-based precision agricultural frameworks. International Journal of Computational and Experimental Science and Engineering, 10(4);585-591. https://doi.org/10.22399/ijcesen.480

Guven, M. (2024). A Comprehensive Review of Large Language Models in Cyber Security. International Journal of Computational and Experimental Science and Engineering, 10(3);507-516. https://doi.org/10.22399/ijcesen.469

Agnihotri, A., & Kohli, N. (2024). A novel lightweight deep learning model based on SqueezeNet architecture for viral lung disease classification in X-ray and CT images. International Journal of Computational and Experimental Science and Engineering, 10(4);592-613. https://doi.org/10.22399/ijcesen.425

ÇOŞGUN, A. (2024). Estimation Of Turkey’s Carbon Dioxide Emission with Machine Learning. International Journal of Computational and Experimental Science and Engineering, 10(1);95-101. https://doi.org/10.22399/ijcesen.302

Türkmen, G., Sezen, A., & Şengül, G. (2024). Comparative Analysis of Programming Languages Utilized in Artificial Intelligence Applications: Features, Performance, and Suitability. International Journal of Computational and Experimental Science and Engineering, 10(3);461-469. https://doi.org/10.22399/ijcesen.342

guven, mesut. (2024). Dynamic Malware Analysis Using a Sandbox Environment, Network Traffic Logs, and Artificial Intelligence. International Journal of Computational and Experimental Science and Engineering, 10(3);480-490. https://doi.org/10.22399/ijcesen.460

S, P. S., N. R., W. B., R, R. K., & S, K. (2024). Performance Evaluation of Predicting IoT Malicious Nodes Using Machine Learning Classification Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3);341-349. https://doi.org/10.22399/ijcesen.395

Polatoglu, A. (2024). Observation of the Long-Term Relationship Between Cosmic Rays and Solar Activity Parameters and Analysis of Cosmic Ray Data with Machine Learning. International Journal of Computational and Experimental Science and Engineering, 10(2);189-199. https://doi.org/10.22399/ijcesen.324

Downloads

Published

2024-10-11

How to Cite

C, A., K, S., N, N. S., & S, P. (2024). Secured Cyber-Internet Security in Intrusion Detection with Machine Learning Techniques. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.491

Issue

Section

Research Article