The effectiveness of deploying machine learning techniques in information security to detect nine attacks: UNSW-NB15 dataset as a case study

dc.contributor.authorAl-Obaidi, Abdullah
dc.contributor.authorIbrahim, Abdullahi Abdu
dc.contributor.authorKhaleel, Arshad M.
dc.date.accessioned2023-11-14T13:54:41Z
dc.date.available2023-11-14T13:54:41Z
dc.date.issued2023en_US
dc.departmentEnstitüler, Lisansüstü Eğitim Enstitüsü, Bilişim Teknolojileri Ana Bilim Dalıen_US
dc.description.abstractThe expanding landscape of cyber threats, alongside the diminished effectiveness of traditional detection methods, has necessitated the exploration of machine learning (ML) techniques in information security. This study investigates the potential of various ML techniques in detecting a myriad of network threats using the UNSW-NB15 dataset, a comprehensive repository of diverse network attack instances. The dataset is initially analyzed and subsequently prepared for ML algorithms by transforming non-numerical attributes into numerical features using the popular “Label Encoder” encoding method. Subsequently, an array of ML techniques, including Decision Tree, Random Forest, Gradient Boosting, XGB, AdaBoost, MLP, and Voting, is deployed on the prepared dataset. Three experimental setups were designed: 1) Binary classification to distinguish between normal and malicious attack types. 2) Multiclass classification to differentiate among various malicious attack types. 3) An enhancement experiment to improve upon the second experimental setup. These experiments were conducted to evaluate the ability of each algorithm to discern among the malicious attack types represented in the UNSW-NB15 dataset. The results suggest that the voting classifier exhibited superior performance in the attack detection process. Furthermore, the XGB algorithm demonstrated higher evaluation metrics compared to other techniques. Consequently, the XGB algorithm outperformed others regarding the performance measures used in the detection process. This study offers valuable insights into the application of ML techniques in enhancing information security and detection efficacy of complex cyber threats.en_US
dc.identifier.citationAl-Obaidi, A., Ibrahim, A. A., Khaleel, A. M. (2023). The effectiveness of deploying machine learning techniques in information security to detect nine attacks: UNSW-NB15 dataset as a case study. Mathematical Modelling of Engineering Problems, 10(5), 1557-1565.en_US
dc.identifier.endpage1565en_US
dc.identifier.issn2369-0739
dc.identifier.issue5en_US
dc.identifier.scopus2-s2.0-85175234697
dc.identifier.scopusqualityQ3
dc.identifier.startpage1557en_US
dc.identifier.urihttps://hdl.handle.net/20.500.12939/4234
dc.identifier.volume10en_US
dc.indekslendigikaynakScopus
dc.institutionauthorAl-Obaidi, Abdullah
dc.institutionauthorIbrahim, Abdullahi Abdu
dc.language.isoen
dc.publisherInternational Information and Engineering Technology Associationen_US
dc.relation.ispartofMathematical Modelling of Engineering Problems
dc.relation.isversionof10.18280/mmep.100507en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - İdari Personel ve Öğrencien_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectDetection processen_US
dc.subjectInformation securityen_US
dc.subjectMachine learningen_US
dc.subjectUNSWNB15en_US
dc.titleThe effectiveness of deploying machine learning techniques in information security to detect nine attacks: UNSW-NB15 dataset as a case study
dc.typeArticle

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
mmep_10.05_07.pdf
Boyut:
1.11 MB
Biçim:
Adobe Portable Document Format
Açıklama:
Tam Metin / Full Text
Lisans paketi
Listeleniyor 1 - 1 / 1
[ X ]
İsim:
license.txt
Boyut:
1.44 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: