skip to main content
article

Network Information Security Monitoring Under Artificial Intelligence Environment

Published: 21 June 2024 Publication History

Abstract

At present, network attack means emerge in endlessly. The detection technology of network attack must be constantly updated and developed. Based on this, the two stages of network attack detection (feature selection and traffic classification) are discussed. The improved bat algorithm (O-BA) and the improved random forest algorithm (O-RF) are proposed for optimization. Moreover, the NIS system is designed based on the Agent concept. Finally, the simulation experiment is carried out on the real data platform. The results showed that the detection precision, accuracy, recall, and F1 score of O-BA are significantly higher than those of references [17], [18], [19], and [20], while the false positive rate is the opposite (P < 0.05). The detection precision, accuracy, recall, and F1 score of O-RF algorithm are significantly higher than those of Apriori, ID3, SVM, NSA, and O-RF algorithm, while the false positive rate is significantly lower than that of Apriori, ID3, SVM, NSA, and O-RF algorithm (P < 0.05).

References

[1]
Al-Hawawreh, M., Moustafa, N., & Slay, J. (2024). A threat intelligence framework for protecting smart satellite-based healthcare networks. Neural Computing & Applications, 36(1), 15–35. 34518744.
[2]
Andrade-Hoz, J., Wang, Q., & Alcaraz-Calero, J. M. (2024). Infrastructure-wide and intent-based networking dataset for 5G-and-beyond AI-driven autonomous networks. Sensors (Basel), 24(3), 783. 38339500.
[3]
Biehler, M., Zhong, Z., & Shi, J. (2024). SAGE: Stealthy Attack Generation in cyber-physical systems. IISE Transactions, 56(1), 54–68.
[4]
Cao, D. M., Sayed, M. A., Islam, M. T., Mia, M. T., Ayon, E. H., Ghosh, B. P., Ray, R. K., & Raihan, A. (2024). Advanced cybercrime detection: A comprehensive study on supervised and unsupervised machine learning approaches using real-world datasets. Journal of Computer Science and Technology Studies, 6(1), 40–48.
[5]
Cao, J., Pan, B., & Zou, X. (2024). Flow monitoring system and abnormal log traffic mode detection based on artificial intelligence. Optical and Quantum Electronics, 56(1), 112.
[6]
Casado-Vara, R., Severt, M., Díaz-Longueira, A., Rey, Á. M. D., & Calvo-Rolle, J. L. (2024). Dynamic malware mitigation strategies for IoT networks: A mathematical epidemiology approach. Mathematics, 12(2), 250.
[7]
Emil Selvan, G. S. R., Daniya, T., Ananth, J. P., & Suresh Kumar, K. (2024). Network intrusion detection and mitigation using hybrid optimization integrated deep Q network. Cybernetics and Systems, 55(1), 107–123.
[8]
Ertem, M., & Bi̇er, V. M. (2024). Optimal defense strategies against intelligent cyber attacks. Journal of Innovative Engineering and Natural Science, 4(1), 245–262.
[9]
Ezhilarasi, M., Gnanaprasanambikai, L., Kousalya, A., & Shanmugapriya, M. (2023). A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks. Soft Computing, 27(7), 4157–4168.
[10]
Hasas, A., Zarinkhail, M. S., Hakimi, M., & Quchi, M. M. (2024). Strengthening digital security: Dynamic attack detection with LSTM, KNN, and random forest. Journal of Computer Science and Technology Studies, 6(1), 49–57.
[11]
Kan, D., & Fang, X. (2024). Event log anomaly detection method based on auto-encoder and control flow. Multimedia Systems, 30(1), 29.
[12]
Karthikeyan, M., Manimegalai, D., & RajaGopal, K. (2024). Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection. Scientific Reports, 14(1), 231. 38168562.
[13]
Kong, L., Luo, M., Cheng, J., Katib, I., Shi, K., & Zhong, S. (2024). Security‐based fault detection filtering design for fuzzy singular semi‐Markovian jump systems via improved dynamic event‐triggering and quantization protocols. International Journal of Adaptive Control and Signal Processing, 38(1), 39–75.
[14]
Li, X., Li, Y., & He, H. (2024). Computer network virus defense with data mining-based active protection. Scalable Computing: Practice and Experience, 25(1), 45–54.
[15]
Najafi Mohsenabad, H., & Tut, M. A. (2024). Optimizing cybersecurity attack detection in computer networks: A comparative analysis of bio-inspired optimization algorithms using the CSE-CIC-IDS 2018 dataset. Applied Sciences (Basel, Switzerland), 14(3), 1044.
[16]
Nayomi, B. D. D., Mallika, S. S., Sowmya, T., Janardhan, G., Laxmikanth, P., & Bhavsingh, M. (2024). A cloud-assisted framework utilizing blockchain, machine learning, and artificial intelligence to countermeasure phishing attacks in smart cities. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 313–327. https://www.ijisae.org/index.php/IJISAE/article/view/3419.
[17]
Palma, C., Ferreira, A., & Figueiredo, M. (2024). Explainable machine learning for malware detection on android applications. Information (Basel), 15(1), 25.
[18]
Rzym, G., Masny, A., & Chołda, P. (2024). Dynamic telemetry and deep neural networks for anomaly detection in 6G software-defined networks. Electronics (Basel), 13(2), 382.
[19]
Sami, T. M. G., Zeebaree, S. R., & Ahmed, S. H. (2024). A novel multi-level hashing algorithm to enhance internet of things devices’ and networks’ security. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 676–696. https://www.ijisae.org/index.php/IJISAE/article/view/3502.
[20]
Siddamsetti, S., & Srivenkatesh, M. (2024). Deep blockchain approach for anomaly detection in the bitcoin network. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 581–595. https://ijisae.org/index.php/IJISAE/article/view/3956.
[21]
Tenepalli, D., & TM, N. (2024). A systematic review on IoT and machine learning algorithms in e-healthcare. International Journal of Computing and Digital Systems, 15(1), 1–14. http://137.117.138.59/handle/123456789/5274
[22]
Wang, D., Li, F., Liu, K., & Zhang, X. (2024). Real-time cyber-physical security solution leveraging an integrated learning-based approach. ACM Transactions on Sensor Networks, 20(2), 1–22.
[23]
Wani, M. S., Rademacher, M., Horstmann, T., & Kretschmer, M. (2024). Security vulnerabilities in 5G non-stand-alone networks: A systematic analysis and attack taxonomy. Journal of Cybersecurity and Privacy, 4(1), 23–40.
[24]
Yun, K., Yun, H., Lee, S., Oh, J., Kim, M., Lim, M., Lee, J., Kim, C., Seo, J., & Choi, J. (2024). A study on machine learning-enhanced roadside unit-based detection of abnormal driving in autonomous vehicles. Electronics (Basel), 13(2), 288.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image International Journal of Information Security and Privacy
International Journal of Information Security and Privacy  Volume 18, Issue 1
Oct 2024
423 pages

Publisher

IGI Global

United States

Publication History

Published: 21 June 2024

Author Tags

  1. Bat Algorithm
  2. Network Attack
  3. Network Information Security
  4. Random Forest Algorithm

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media