Machine Learning-Based Intrusion Detection: A Comparative Analysis among Datasets and Innovative Feature Reduction for Enhanced Cybersecurity
Keywords:
Intrusion Detection Systems, Cybersecurity, Machine Learning, Performance Metrics, Network SecurityAbstract
: In the rapidly establishing digital area, the upward push of cyber threats furnishes growing issues in safeguarding statistics, consequently needing the expansion of strong intrusion detection systems (IDS). This study gives an in-depth analysis of Intrusion Detection Systems (IDS), evaluating its class, commonly applied methodology, and the vital position of datasets inside the assessment process. The exploration spans the incorporation of device learning and deep mastering in IDS, demonstrating the cutting-edge qualities and breakthroughs that boost network security. The exam closes with a radical evaluation of general performance signs, along with precision, recall, F1 score, and accuracy, throughout ten illustrations. These indications offer focused and diffused insights regarding the machine's ability to correctly identify and respond with cyber-assaults. This study gives useful insights to aid cybersecurity specialists in upgrading their intrusion detection strategies for increased resilience towards transforming cyber threats. It covers the vital goal of keeping virtual belongings that companies are presently facing.
Downloads
References
M.Preetha, et al., “Ant Colony Optimisation With Levy Based Unequal Clustering And Routing (ACO-UCR) Technique For Wireless Sensor Networks”, Journal of Circuits, Systems, and Computers, ISSN: 0218-1266 (print); 1793-6454 (web) Vol .33, Issue3, July 24, 2023. DOI: 10.1142/S0218126624500439
M. Parto, C. Saldana, and T. Kurfess, “A novel three-layer IoT architecture for shared, private, scalable, and real-time machine learning from ubiquitous cyber-physical systems,” Procedia Manuf., vol. 48, no. 2019, pp. 959–967, 2020, doi: 10.1016/j.promfg.2020.05.135.
I. Zakariyya, H. Kalutarage, and M. O. Al-Kadri, “Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring,” Comput. Secur., vol. 133, no. June, p. 103388, 2023, doi: 10.1016/j.cose.2023.103388.
M.Preetha et al., “Efficient Re-clustering with Novel Fuzzy Based Grey Wolf Optimization for Hotspot Issue Mitigation and Network Lifetime Enhancement,” Journal of Ad Hoc & Sensor Wireless Networks, Vol. 56, Issue 4, page No-273-297, Sep 2023
N. Jeffrey, Q. Tan, and J. R. Villar, “A hybrid methodology for anomaly detection in Cyber–Physical Systems,” Neurocomputing, vol. 568, no. November 2023, p. 127068, 2024, doi: 10.1016/j.neucom.2023.127068.
Z. Song, A. R. Mishra, and S. P. Saeidi, “Technological capabilities in the era of the digital economy for integration into cyber-physical systems and the IoT using decision-making approach,” J. Innov. Knowl., vol. 8, no. 2, p. 100356, 2023, doi: 10.1016/j.jik.2023.100356.
Preetha M et al.,“CMAC-An Efficient Energy Postulate Based on Energy Cost Modeling in Wireless Sensor Network”, Asian Journal of Information Technology, vol.12, issue.6, pp. 176-183, 2013,ISSN 1682-3915
M. Wazid, A. K. Das, V. Chamola, and Y. Park, “Uniting cyber security and machine learning: Advantages, challenges and future research,” ICT Express, vol. 8, no. 3, pp. 313–321, 2022, doi: 10.1016/j.icte.2022.04.007.
P. Wang, Z. Man, Z. Cao, J. Zheng, and Y. Zhao, “Dynamics modelling and linear control of quadcopter,” Int. Conf. Adv. Mechatron. Syst. ICAMechS, vol. 0, pp. 498–503, 2016, doi: 10.1109/ICAMechS.2016.7813499.
Y. P. Tsang, T. Yang, Z. S. Chen, C. H. Wu, and K. H. Tan, “How is extended reality bridging human and cyber-physical systems in the IoT-empowered logistics and supply chain management?,” Internet of Things (Netherlands), vol. 20, no. June, 2022, doi: 10.1016/j.iot.2022.100623.
M. Preetha et al., “A Preliminary Analysis by using FCGA for Developing Low Power Neural Network Controller Autonomous Mobile Robot Navigation”, International Journal of Intelligent Systems and Applications in Engineering (IJISAE), ISSN:2147-6799, 2023
G. Epiphaniou, M. Hammoudeh, H. Yuan, C. Maple, and U. Ani, “Digital twins in cyber effects modelling of IoT/CPS points of low resilience,” Simul. Model. Pract. Theory, vol. 125, no. March 2022, p. 102744, 2023, doi: 10.1016/j.simpat.2023.102744.
M. M. Hossain, M. A. Kashem, N. M. Nayan, and M. A. Chowdhury, “A Medical Cyber-physical system for predicting maternal health in developing countries using machine learning,” Healthc. Anal., vol. 5, no. May 2023, p. 100285, 2024, doi: 10.1016/j.health.2023.100285.
Z. Noor, S. Hina, F. Hayat, and G. A. Shah, “An intelligent context-aware threat detection and response model for smart cyber-physical systems,” Internet of Things (Netherlands), vol. 23, no. June, p. 100843, 2023, doi: 10.1016/j.iot.2023.100843.
M. Catillo, A. Pecchia, and U. Villano, “CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders,” Comput. Secur., vol. 129, p. 103210, 2023, doi: 10.1016/j.cose.2023.103210.
M. Preetha et al., “Deep Learning-Driven Real-Time Multimodal Healthcare Data Synthesis”, International Journal of Intelligent Systems and Applications in Engineering (IJISAE), ISSN:2147-6799, Vol.12, Issue 5, page No-360-369, 2024
M. Al-Hawawreh and N. Moustafa, “Explainable deep learning for attack intelligence and combating cyber–physical attacks,” Ad Hoc Networks, vol. 153, no. April 2023, 2024, doi: 10.1016/j.adhoc.2023.103329.
A. Aldhaheri, F. Alwahedi, M. A. Ferrag, and A. Battah, “Deep learning for cyber threat detection in IoT networks: A review,” Internet Things Cyber-Physical Syst., vol. 4, no. September 2023, pp. 110–128, 2024, doi: 10.1016/j.iotcps.2023.09.003.
Preetha M et al., “A Survey on Misbehavior Report Authentication Scheme of Selfish node Detection Using Collaborative Approach in MANET”, International Journal of Engineering Science and Computing, vol. 6, no. 5, pp. 5381-5384, ISSN 2321-3361
I. Singh, D. Centea, and M. Elbestawi, “IoT, IIoT and Cyber-Physical Systems Integration in the SEPT Learning Factory,” Procedia Manuf., vol. 31, pp. 116–122, 2019, doi: 10.1016/j.promfg.2019.03.019.
M. Kato, T. Kizaki, T. Uwano, K. Iijima, and Y. Kakinuma, “Development of temperature analysis environment for Cyber-Physical Systems on IoT platform: a study of dynamical properties under temperature change in machine tool spindle unit using carbon fiber reinforced plastics,” Procedia CIRP, vol. 107, no. March, pp. 1485–1490, 2022, doi: 10.1016/j.procir.2022.05.179.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.