Next Article in Journal
An Interleaved Segmented Spectrum Analysis: A Measurement Technique for System Frequency Response and Fault Detection
Next Article in Special Issue
WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City
Previous Article in Journal
A Systematic Review of Wearable Sensor-Based Technologies for Fall Risk Assessment in Older Adults
Previous Article in Special Issue
Blockchain-Based Smart Home Networks Security Empowered with Fused Machine Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology

by
Muhammad Umar Nasir
1,†,
Safiullah Khan
2,†,
Shahid Mehmood
1,†,
Muhammad Adnan Khan
3,*,
Muhammad Zubair
4 and
Seong Oun Hwang
5,*
1
Riphah School of Computing & Innovation, Faculty of Computing, Riphah International University, Lahore Campus, Lahore 54000, Pakistan
2
Department of IT Convergence Engineering, Gachon University, Seongnam 13120, Korea
3
Pattern Recognition and Machine Learning Lab, Department of Software, Gachon University, Seongnam 13557, Korea
4
Faculty of Computing, Riphah International University, Islamabad Campus, Islamabad 45000, Pakistan
5
Department of Computer Engineering, Gachon University, Seongnam 13120, Korea
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2022, 22(18), 6755; https://doi.org/10.3390/s22186755
Submission received: 16 June 2022 / Revised: 1 September 2022 / Accepted: 4 September 2022 / Published: 7 September 2022
(This article belongs to the Special Issue Security of IoT-Enabled Infrastructures in Smart Cities)

Abstract

:
The study presents a framework to analyze and detect meddling in real-time network data and identify numerous meddling patterns that may be harmful to various communication means, academic institutes, and other industries. The major challenge was to develop a non-faulty framework to detect meddling (to overcome the traditional ways). With the development of machine learning technology, detecting and stopping the meddling process in the early stages is much easier. In this study, the proposed framework uses numerous data collection and processing techniques and machine learning techniques to train the meddling data and detect anomalies. The proposed framework uses support vector machine (SVM) and K-nearest neighbor (KNN) machine learning algorithms to detect the meddling in a network entangled with blockchain technology to ensure the privacy and protection of models as well as communication data. SVM achieves the highest training detection accuracy (DA) and misclassification rate (MCR) of 99.59% and 0.41%, respectively, and SVM achieves the highest-testing DA and MCR of 99.05% and 0.95%, respectively. The presented framework portrays the best meddling detection results, which are very helpful for various communication and transaction processes.

1. Introduction

A network invasion is a brief interruption in regular network activity. Some outbreaks are maliciously produced by attackers, such as a denial of service (DoS) assault on an internet protocol (IP) network, while others are entirely accidental, such as an overpass collapsing into a busy road network [1]. Rapid detection is required to launch a rapid reaction, such as dispatching an ambulance following a traffic accident or sounding an alert when a surveillance network detects an intruder. Data are collected at a rapid pace by network monitoring equipment. As a result, developing an efficient anomaly detection system entails extracting important information from enormous amounts of noisy and big data. It is also critical to develop distributed algorithms since networks have bandwidth and power restrictions, and communication costs must be kept to a minimum. With the sophistication and innovation of technology, software, and network topologies, cyber intrusions continue to evolve. To protect the network from hostile cybersecurity threats, intrusion detection systems are highly recommended [1]. There are firewalls and other rule-based security mechanisms in place, which are commonly utilized to safeguard contemporary data centers against network threats. Large distributed multi-cloud systems, on the other hand, would need a large number of complicated rules, which might be costly, time-consuming, and error-prone [2]. Furthermore, developments in computing have enabled attackers to scale attacks, such as the emergence of distributed DoS (DDoS) attacks, which are seldom detected by ordinary firewalls [3]. As a result, using a firewall alone is insufficient to offer total system security in multi-cloud environments.
Deep neural networks can learn complicated patterns of abnormalities directly from network traffic data; therefore, machine learning approaches have attracted a lot of attention in recent years [4]. Real-world traffic data, on the other hand, are large-scale, noise-labeled, and imbalanced in class. In other words, there are millions of samples in the traffic data that are unevenly distributed, with infrequent abnormalities and far too much typical traffic data. The majority of current network datasets do not fulfill real-world requirements and are therefore unsuitable for modern networks. Furthermore, conventional datasets, such as kddcup99 [5] and UNSW-NB15 [6], have received a lot of attention in the literature. These datasets have enabled methods to achieve great throughput. As a result, in this study, we focus on the problem of large-scale (millions of scales) and highly imbalanced traffic data by training, validating, and testing the suggested solution using the ZYELL dataset [7,8].
In this paper, the data were collected using IoT technology, which can access data from different cloud environments including vehicular networks and numerous cooperation. Thus, the collected data were in massive amounts and transmitted using IoT technology without any delays and lag toward the data pre-processing layer and were then saved in blockchain technology-secured clouds.
The novel proposed model in this study uses machine learning algorithms. These machine learning algorithms are utilized to detect meddling and normal communication transactions. The proposed model uses blockchain technology to overcome the security threats of trained models and data preprocessing. Thus, the proposed model achieved the highest detection results with the help of machine learning and blockchain technology.

2. Literature Review

A great number of research studies on IDS employing machine learning approaches have been published in the literature. For example, the authors of [9,10] employed support vector machines (SVMs) to find abnormalities in the KDD dataset [5]. The authors of [11] constructed IDS models for anomaly detection using artificial neural networks utilizing the same dataset. The author of [12] employed cascade classifiers to detect and classify anomalies in the KDD dataset, even when they were spread unevenly. References [13,14] suggested utilizing decision trees and random forest (RF) to discover anomalies. Furthermore, the authors of [15] presented hybrid approaches that make use of two or more machine learning algorithms. In terms of performance, the results suggest that hybrid strategies outperform individual models. For further information on machine learning methodologies in IDS, readers can refer to the surveys provided in [16,17,18].
The SVM is used for early classification and regression problems [19]. The SVM belongs to the linear generalized classification family and has the special property of simultaneously increasing the geometric margin and decreasing the empirical classification error, so in this manner, the SVM is also known as the maximum margin classifier. The SVM inputs its features or vector in the maximum higher separated hyperplane with a higher dimensional space. For the separation of data, parallelly, two hyperplanes were constructed. These hyperplanes could increase the distance between these binary hyperplanes. The SVM considers the data points {(x1,y1), (x2,y2), (x3,y3), (x4,y4)… (xn,yn)} where each xn is considered as the input vector.
KNN is a scenario-learning technique [20] that makes classification choices using all of the training data. It is unsuitable for many applications due to its sluggish learning rate, such as dynamic web mining for a large collection. Finding some representatives to represent all of the training data for classification is a strategy to improve its efficiency; that is, create an inductive learning model from the training dataset and utilize this model (representatives) for classification. Many modern algorithms, such as DT and NN, were designed to produce such a model. One assessment factor involves the efficiency of various algorithms. Thus, we chose these two machine learning algorithms because the SVM is a parametric linear solver algorithm, and most of its success depends on tuning parameters that decrease the overall generalization error. KNN is cost-effective (for classification) and can single-handedly handle large non-parametric datasets.
The authors of [21] employed a four-layer classification algorithm on the KDD dataset to detect four types of assaults. The findings indicate a modest classification mistake and a minor overall inaccuracy. In addition, the scientists claimed that the number of features in the original dataset was reduced, resulting in lower complexity and higher accuracy. However, the authors found no misclassification as a result of misclassifying one type of violence as another. Using the same dataset and typical unsupervised and supervised learning techniques, such details were described in [22]. Several attacks were misclassified, resulting in poorer overall accuracy than the research presented in [21].
The KDD dataset has been extensively utilized to train machine learning models for anomaly detection and classification. The KDD dataset contains four different types of assaults with radically different traffic characteristics. Reference [21] presents a technique for the categorization of assaults using KDD that achieved remarkably low misclassification errors. However, such models may not be suitable for today’s numerous cloud situations with varying forms of evolution and closely related assaults. Furthermore, the KDD dataset is aging and may no longer reflect current real-time traffic patterns and network threats [23]. Furthermore, if a new assault is launched, it will most likely go unreported, resulting in a high mistake rate, as documented in [22].
Machine learning has been used to improve network security in a variety of settings. Buczak et al. [24] and Hodo et al. [25] focused on malware detection in the cybernetwork using supervised and unsupervised learning. DaCosta et al. [26] examined intrusion detection in the context of IoT utilizing machine learning applications. Ucci et al. [27] and Tahsien et al. [28] and Hussain et al. [29] addressed the possible dangers of the IoT and proposed machine learning methods to address these issues. Gibert et al. [30] used supervised and unsupervised learning to identify and classify malware in a Windows system. Nassif et al. [31] investigated cloud network dangers and how to defend the cloud network using supervised learning.
Machine learning may be used in network administration to avoid possible attacks in addition to detecting anomalous activity. Jin et al. [32] used reinforcement learning to determine the appropriate scheduling method for managing intranet traffic while keeping security in mind. Every user has a reputation value that indicates how reliable their traffic is. The available bandwidth of the connections and the flows that are waiting to be scheduled describe the reinforcement learning condition. In the suggested approach, actions are assigned to each stream, and each action is made up of the bandwidth allocated to that stream. Link utilization, queue length, latency, and the user’s trust level all contribute to the scheduler’s performance.
Table 1 shows the previous studies’ limitations and methodologies. Jin et al. [32] used reinforcement learning to detect insider threats using a public dataset; it achieved 98% accuracy but data preprocessing and imbalanced classes were its limitations. Hamamato et al. [33] used k-means to detect DDoS and DoS attacks using a public dataset; it achieved 96.53% accuracy but less performance in a supervised manner and with imbalanced classes. Gu et al. [34] used k-means to detect DDoS attacks using a public dataset; it achieved 98.9% accuracy but a high recall detection and lack in classification. Alauthman et al. [35] used a neural network to detect botnet attacks using a public dataset; it achieved 98.3% accuracy but data preprocessing and imbalanced classes were its limitations. Smadi et al. [36] used a neural network to detect phishing threats using a public dataset; it achieved 98.6% accuracy but machine learning and imbalanced classes were its limitations. Xu et al. [37] used Q-learning to detect general network threats using a public dataset and achieved 95% accuracy; however, data preprocessing and imbalanced classes were its limitations. Sethi et al. [38] used reinforcement learning to detect DoS threats using a public dataset and achieved 97.8% accuracy; however, preprocessing features and imbalanced classes were its limitations. Rashid et al. [39] used numerous machine learning approaches, including SVM, DT, KNN, RF, LR, etc., to detect cyber-attacks in IoT-based smart city applications. They used UNSW-NB15 and CICID2017 datasets to detect cyber-attacks. Their system achieved more than 95% cyber-attack detection accuracy but data fuzzing and feature engineering were its limitations. Ofori et al. [40] used machine learning to predict threats at early stages with the help of LR, DT, NB, and RF, achieving 70% performance in predicting cyber threats; however, data control and attributions were the limitations.
The major contributions of this study are as follows:
  • The proposed framework employed machine learning approaches to detect network attacks.
  • The proposed model used blockchain technology to secure the trained models and communicated data.
  • The proposed study used numerous statistical parameters to evaluate the performance and authenticity of models.

3. Materials and Methods

3.1. Blockchain Module

A blockchain block comprises a massive amount of transaction information, including the block ID, a hash of the previous block, transaction information, null byte, and headers. In a blockchain system where prospectors select the appropriate hash to add a block to, contenders check for a current block before looking for a new one. The proof-of-work process is used to determine the legitimacy of a certain block of transactions. The phases that follow illustrate the essential parts of blockchain technology. Any node in a computerized health system that is connected to the internet must communicate with a storage database as well as settlers on a private blockchain. Unprocessed transactions are stored in the blockchain until a new block is assigned for authentication. Many transactions are examined before being quickly processed by the Merkel tree, a binary hash tree. Blockchain technology will be utilized to develop a new smart medical system connection biosphere since it is diversified and compatible with the internet of medical things applications. The blockchain module provides the proposed model with the following protection.
Onset: To begin implementing data protection parameters, the cryptographic algorithms must first be concocted.
Encrypting: The user defines the block index and the proceeding detail, where the block index is defined as the box index and the proceeding detail as plaintext. Thus, it gives the proposed model Encrypt (index, text) value.
Encampment: The proposed model contains a box index unit, after which the machine learning model delivers security keys S e c u r i t y _ B l o c k Z i n d e x .
Defy: It only allows one to complete the full iteration, initiate (create), and send two messages (text1, text2) for each i n d e x     Z . After completing the iteration and calculation, if it has 0, then S e c u r i t y _ B l o c k p = E n c r y p t ( m e m o r y ) , or else it repeats the full iteration.

3.2. Anomaly Detection Module

Figure 1 depicts the overall picture of general network meddling detection, empowered with machine learning, and entangled with blockchain technology. The proposed model consists of four phases. At the initial stage, the proposed model collects data using the Internet of Things (IoT) from the vehicular network and general network communication transactions using PyShark and passes the raw data toward the data preprocessing phase. In this phase, the proposed model applies data cleaning techniques, including unwanted outliers, fixing data structural errors with swift observations to save the time–costs of the model and data redundant techniques, cleaning the data from a bug or null values, and fixing duplicate and missing values. Right after the data pre-processing, the proposed model applies the feature extraction technique with the help of embedded methods and then stores preprocessed data into blockchain-entangled private clouds for further processing. The third stage of the proposed model-training layer imports data from a private cloud of training data to train machine learning algorithms (SVM and KNN) and check the trained model performance. If the learning criteria meet, then the model is stored in a private cloud, Z, otherwise it retrains the process. In the final phase, the testing layer imports the trained model from the private cloud, Z, and imports the testing data from the private cloud; then the testing process starts. If the network meddling detects, then the data are processed into spam, otherwise, the data are processed for further communications and transactions. To evaluate the overall performance of testing, the proposed model applies various statistical parameters [40,41,42,43,44,45,46,47,48,49,50], i.e., detection accuracy (DA), sensitivity, F1-score, specificity, likelihood negative ratio (LNR), false positive rate (FPR), false negative rate (FNR), misclassification rate (MCR), likelihood positive ratio (LPR), positive predicted value (PPV), and negative predicted value (NPV) to check the performance of the proposed framework. All equations are explained below.
DA = á   +   ß á   +   ß + ð + Ø   ×   100
MCR = 100 á   +   ß á   +   ß + ð + Ø × 100
Sensitivity =   á   á   + Ø × 100
Specificity =   ß ß + ð × 100
F 1 - score = 2 á   2 á   +   ð + Ø × 100
PPV =   á   á   +   ð × 100
NPV =     ß ß + Ø × 100
FPR = 100   ß ß + ð × 100
FNR = 100   á   á   + Ø   ×   100
LPR = á   á   +   Ø × 100 100   ß ß   +   ð × 100
LNR = 100   á   á   +   Ø × 100 ß ß   +   ð   × 100
The computational complexities of the two classification algorithms utilized in this work are briefly discussed below:
The KNN algorithm does not memorize training data; rather, it performs the nearest neighbor calculation online. The algorithm calculates the distance between each test and training sample. Once all distances are computed, they are arranged in ascending order to identify the nearest neighbor. Each training sample is a spot in the attribute space if there are m attributes in the training data, making the attribute space m-dimensional. The computational complexity of the KNN algorithm depends on the number of features (m), the number of training samples (n), and an odd number chosen as the value of ‘k’. The following Euclidian distance formula is most frequently used to calculate distances.
D i j 2 v = 1 m ( X v i X v j ) 2  
Since m multiplications are required to calculate the distance between each training sample and the test sample, the KNN Euclidean distance-based complexity is O (mn). Complicating factors include distance sorting. The merge–sort algorithm, for instance, uses O (n log n). Therefore, the overall complexity is O (mn + n log n). In an m-dimensional feature space, if A and B are two points in the feature space and constitute feature vectors A = (y1, y2, …, ym) and B = (z1, z2, …, zm), respectively, the cosine distance between them is given by
s i m ( A ,   B ) = A   ·   B | A |   | B |
It will take m multiplications to compute the dot product in the numerator. Each vector will need to be multiplied m times in order to determine its Euclidian length in the denominator. Therefore, to calculate the similarity, 3 m multiplications are required. The total complexity is O (3mn + n log n) when the sorting algorithm’s complexity is taken into account [51].
The SVM is frequently used to effectively address both regression and classification problems. The SVM accuracy is generally greater than KNN accuracy. However, both the complexity and training time of the SVM are greater than those of KNN. Abdiansah et al. display the complexity of SVM as O (n3) in [52].

4. Dataset

The proposed model used the online UNR-IDD [53] available network meddling data for the training and testing phases due to its relevance to cyber-attacks and anomaly detection; moreover, it is more relevant to network communication. This dataset is most suitable for IoT. The dataset consists of two classes—attack and normal—and has 37,000 instances with 30 dependent and 1 independent variable. Table 2 shows the description of the selective variables of the dataset.

5. Simulation and Results

In this research, the proposed framework employed ML for the detection of network meddling empowered with blockchain technology. For the simulation, including training and testing the data, the proposed model used MacBook Pro 2017, 512 GB SSD, 16 GB, Core i5, and embedded GPU. To remove the major discrepancies in data, the proposed model applied numerous data preprocessing techniques and stored preprocessed data in private clouds. The proposed framework employed SVM and KNN machine learning algorithms to train and test network meddling data. All phases of the proposed model were discussed in this research. The proposed framework applied various statistical performance parameters to measure the performance and authenticity of the model.
Figure 2 shows the training performance of the SVM. It depicts the minimum classification error (MCE) of SVM at 30 iterations; optimized results of the SVM show a box constraint level of 0.0010088 with a kernel function cubic, achieving MCE 0.0091778 at the 13th iteration (which was best among all models).
Table 3 shows the training confusion matrix of the SVM. The proposed model detected 27,190 attack instances and 2290 normal instances; it wrongly detect 120 instances.
Table 4 shows the statistical parameter results of training the SVM; the proposed model achieved 99.59%, 0.41%, 99.96%, 95.42%, 99.78%, 99.60%, 99.57%, 4.58%, 0.04%, 21.81%, 0.00, and 99.78% of DA, MCR, Sen, Spec, F1-score, PPV, NPV, FPR, FNR, LPR, LNR, and FMI, respectively.
Table 5 shows the training confusion matrix of KNN. The proposed model detected 27,190 attack instances and 2200 normal instances; it wrongly detected 220 instances.
Table 6 shows the statistical parameter results of training KNN; the proposed model achieved 99.29%, 0.71%, 99.63%, 95.24%, 99.62%, 99.60%, 99.65%, 4.76%, 0.37%, 20.92%, 0.00, and 99.62% of DA, MCR, Sen, Spec, F1-score, PPV, NPV, FPR, FNR, LPR, LNR, and FMI, respectively.
Table 7 shows the testing confusion matrix of SVM. The proposed framework detected 6400 attack instances and 930 normal instances; the proposed model wrongly detected 70 instances.
Table 8 shows the statistical parameter results of testing the SVM; the proposed model achieved 99.05%, 0.95%, 99.84%, 93.94%, 99.46%, 99.07%, 98.94%, 6.06%, 0.16%, 16.47%, 0.00, and 99.46% of DA, MCR, Sen, Spec, F1-score, PPV, NPV, FPR, FNR, LPR, LNR, and FMI, respectively.
Table 9 shows the testing confusion matrix of KNN. The proposed model detected 6400 attack instances and 850 normal instances; it wrongly detected 150 instances.
Table 10 shows the statistical parameter results of testing KNN; the proposed model achieved 97.97%, 2.03%, 99.84%, 85.86%, 98.84%, 97.86%, 98.84%, 14.14%, 0.16%, 7.06%, 0.00, and 98.85% of DA, MCR, Sen, Spec, F1-score, PPV, NPV, FPR, FNR, LPR, LNR, and FMI, respectively.
Table 11 depicts the comparative studies of the current research with previous studies. Jin et al. [32] used reinforcement learning to detect insider threats using a public dataset, achieving 98% accuracy. Hamamato et al. [33] used k-means to detect DDoS and DoS attacks using a public dataset, achieving 96.53% accuracy. Gu et al. [34] used k-means to detect DDoS attacks using a public dataset, achieving 98.9% accuracy. Alauthman et al. [35] used a neural network to detect botnet attacks (using a public dataset), achieving 98.3% accuracy. Smadi et al. [36] used a neural network to detect phishing threats (using a public dataset), achieving 98.6% accuracy. Xu et al. [37] used Q-learning to detect general network threats (using a public dataset), achieving 95% accuracy. Sethi et al. [38] used reinforcement learning to detect DoS threats (using a public dataset), achieving 97.8% accuracy. Rashid et al. [39] used numerous machine learning approaches (including SVM, DT, KNN, RF, LR, etc.) to detect cyber-attacks in IoT-based smart city applications. They used UNSW-NB15 and CICID2017 datasets to detect cyber-attacks. Their system achieved more than 95% cyber-attack detection accuracy. Ofori et al. [40] used machine learning to predict threats at early stages with the help of LR, DT, NB, and RF. They achieved 70% accuracy in predicting cyber threats; the proposed model used machine learning algorithms to detect general network meddling, achieving 99.05% DA, which was the highest when compared to others. The proposed model also provided a blockchain-secured cloud for models and communication data.

6. Conclusions and Future Work

Machine learning has a primary role in the detection of meddling in vehicular and general network communications and transactions. Machine learning can help to prevent meddling problems at the run time and before they occur. In this research, the proposed framework used various machine learning techniques; the SVM outperformed all, achieving 99.05% DA and 0.95% MCR (empowered with blockchain technology) to overcome the security threats to trained models and network communication and transaction data. In the future, we intend to apply federated machine learning empowered with fuzzy data to overcome more problems regarding network meddling.

Author Contributions

M.U.N. and S.K. collected data from different resources; M.U.N., S.K. and S.M. performed the formal analysis and simulation; M.U.N., S.K., S.M. and M.Z. contributed to the writing—original draft preparation; M.A.K. and S.O.H. conducted the writing—review and editing; M.A.K. and S.O.H. performed the supervision; M.U.N., M.Z. and S.M. drafted the pictures and tables; M.A.K. and M.Z. performed the revision and improved the quality of the draft. All authors have read and agreed to the published version of the manuscript.

Funding

This was supported in part by the Institute of Information and Communications Technology Planning and Evaluation (IITP) under the High-Potential Individuals Global Training Program under grant 2021-0-01532 (30%), and in part by the National Research Foundation of Korea (NRF) under grant 2020R1A2B5B01002145 (40%), funded by the Korean Government through the Ministry of Science and ICT (MSIT). This work was also supported in part by the Gachon University research fund under Grant GCU-202206210001 (30%).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The simulation files/data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Vinayakumar, R.; Alazab, M.; Soman, K.P.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access 2019, 7, 41525–41550. [Google Scholar] [CrossRef]
  2. Hu, H.; Ahn, G.J.; Kulkarni, K. Detecting and Resolving Firewall Policy Anomalies. IEEE Trans. Dependable Secur. Comput. 2012, 9, 318–331. [Google Scholar] [CrossRef]
  3. Hayajneh, T.; Mohd, B.J.; Itradat, A.; Quttoum, A.N. Performance and information security evaluation with firewalls. Int. J. Secur. Its Appl. 2013, 7, 355–372. [Google Scholar] [CrossRef]
  4. Maya, S.; Ueno, K.; Nishikawa, T. dLSTM: A new approach for anomaly detection using deep learning with delayed prediction. Int. J. Data Sci. Anal. 2019, 8, 137–164. [Google Scholar] [CrossRef]
  5. KDD Cup 1999 Data. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 1 June 2022).
  6. The UNSW-NB15 Dataset. Available online: https://research.unsw.edu.au/projects/unsw-nb15-dataset (accessed on 1 June 2022).
  7. Available online: https://nad2021.nctu.edu.tw/Dataset.html (accessed on 1 June 2022).
  8. Chen, L.; Weng, S.-E.; Peng, C.-J.; Shuai, H.-H.; Cheng, W.-H. Zyell-Nctu Nettraffic1.0: A Large-Scale Dataset for Real-World Network Anomaly Detection. Available online: https://arxiv.org/abs/2103.05767 (accessed on 1 June 2022).
  9. Kim, D.S.; Nguyen, H.N.; Park, J.S. Genetic algorithm to improve SVM based network intrusion detection system. In Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA’05) Volume 1 (AINA Papers), Piscataway, NY, USA, 28–30 March 2005. [Google Scholar]
  10. Guang, Y.; Min, N. Anomaly intrusion detection based on wavelet kernel LS-SVM. In Proceedings of the 2013 3rd International Conference on Computer Science and Network Technology, Dalian, China, 12–13 October 2013. [Google Scholar]
  11. Kumar, S.; Yadav, A. Increasing performance of intrusion detection system using neural network. In Proceedings of the 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, Ramanathapuram, India, 8–10 May 2014. [Google Scholar]
  12. Khor, K.C.; Ting, C.Y.; Phon-Amnuaisuk, S. A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl. Intell. 2012, 36, 320–329. [Google Scholar] [CrossRef]
  13. Stein, G.; Chen, B.; Wu, A.S.; Hua, K.A. Decision tree classifier for network intrusion detection with GA-based feature selection. In Proceedings of the 43rd Annual Southeast Regional Conference-Volume 2, Kennesaw, GA, USA, 18–20 March 2005; ACM: New York, NY, USA, 2005; pp. 136–141. [Google Scholar] [CrossRef]
  14. Tesfahun, A.; Bhaskari, D.L. Intrusion Detection Using Random Forests Classifier with SMOTE and Feature Reduction. In Proceedings of the 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, Pune, India, 15–16 November 2013; pp. 127–132. [Google Scholar]
  15. Shon, T.; Moon, J. A hybrid machine learning approach to network anomaly detection. Inf. Sci. 2007, 177, 3799–3821. [Google Scholar] [CrossRef]
  16. Modi, C.; Patel, D.; Borisaniya, B.; Patel, H.; Patel, A.; Rajarajan, M. A survey of intrusion detection techniques in the cloud. J. Netw. Comput. Appl. 2013, 36, 42–57. [Google Scholar] [CrossRef]
  17. Narudin, F.A.; Feizollah, A.; Anuar, N.B.; Gani, A. Evaluation of machine learning classifiers for mobile malware detection. Soft Comput. 2016, 20, 343–357. [Google Scholar] [CrossRef]
  18. Hamid, Y.; Sugumaran, M.; Balasaraswathi, V.R. IDS Using Machine Learning-Current State of Art and Future Directions. Br. J. Appl. Sci. Technol. 2016, 15, 1–22. [Google Scholar] [CrossRef]
  19. Srivastava, D.K.; Bhambhu, L. Data classification using support vector machine. J. Theor. Appl. Inf. Technol. 2010, 12, 1–7. [Google Scholar]
  20. Nasir, M.U.; Khan, M.A.; Zubair, M.; Ghazal, T.M.; Said, R.A.; Al Hamadi, H. Single and Mitochondrial Gene Inheritance Disorder Prediction Using Machine Learning. Comput. Mater. Contin. 2022, 73, 953–963. [Google Scholar] [CrossRef]
  21. Subbulakshmi, T.; Afroze, A.F. Multiple learning-based classifiers using layered approach and Feature Selection for attack detection. In Proceedings of the 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), Tirunelveli, India, 25–26 March 2013; pp. 308–314. [Google Scholar]
  22. Gogoi, P.; Bhattacharyya, D.K.; Borah, B.; Kalita, J.K. Mlh-ids: A multi-level hybrid intrusion detection method. Comput. J. 2014, 57, 602–623. [Google Scholar] [CrossRef]
  23. Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 2012, 31, 357–374. [Google Scholar] [CrossRef]
  24. Buczak, A.L.; Guven, E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 2015, 18, 1153–1176. [Google Scholar] [CrossRef]
  25. Hodo, E.; Bellekens, X.; Hamilton, A.; Tachtatzis, C.; Atkinson, R. Shallow and deep networks intrusion detection system: A taxonomy andsurvey. arXiv 2017, arXiv:1701.02145. [Google Scholar]
  26. da Costa, K.A.; Papa, J.P.; Lisboa, C.O.; Munoz, R.; de Albuquerque, V.H.C. Internet of things: A survey on machine learning-basedintrusion detection approaches. Comput. Netw. 2019, 151, 147–157. [Google Scholar] [CrossRef]
  27. Ucci, D.; Aniello, L.; Baldoni, R. Survey of machine learningtechniques for malware analysis. Comput. Secur. 2019, 81, 123–147. [Google Scholar] [CrossRef]
  28. Tahsien, S.M.; Karimipour, H.; Spachos, P. Machine learning basedsolutions for security of internet of things (iot): A survey. J. Ofnetwork Comput. Appl. 2020, 161, 102630. [Google Scholar] [CrossRef]
  29. Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine learningin iot security: Current solutions and future challenges. IEEE Commun. Surv. Tutor. 2020, 22, 1686–1721. [Google Scholar] [CrossRef]
  30. Gibert, D.; Mateu, C.; Planes, J. The rise of machine learning fordetection and classification of malware: Research developments, trendsand challenges. J. Netw. Comput. Appl. 2020, 153, 102526. [Google Scholar] [CrossRef]
  31. Nassif, A.B.; Talib, M.A.; Nassir, Q.; Nassif, A.B.; Talib, M.A.; Nasir, Q.; Albadani, H.; Dakalbab, F.M. Machine learning for cloud security: A systematic review. IEEE Access 2021, 9, 20717–20735. [Google Scholar] [CrossRef]
  32. Jin, Q.; Wang, L. Intranet user-level security traffic management withdeep reinforcement learning. In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, 14–19 July 2019; pp. 1–8. [Google Scholar]
  33. Hamamoto, A.H.; Carvalho, L.F.; Sampaio, L.D.H.; Abrão, T.; Proença, M.L., Jr. Network anomaly detection system using genetic algorithmand fuzzy logic. Expert Syst. Appl. 2018, 92, 390–402. [Google Scholar] [CrossRef]
  34. Gu, Y.; Li, K.; Guo, Z.; Wang, Y. Semi-supervised k-means ddosdetection method using hybrid feature selection algorithm. IEEE Access 2019, 7, 351–364. [Google Scholar]
  35. Alauthman, M.; Aslam, N.; Al-Kasassbeh, M. An efficient reinforcement learning-based botnet detection approach. J. Netw. Comput. Appl. 2020, 150, 102479. [Google Scholar] [CrossRef]
  36. Smadi, S.; Aslam, N.; Zhang, L. Detection of online phishing email using dynamic evolving neural network based on reinforcement learning. Decis. Support. Syst. 2018, 107, 88–102. [Google Scholar] [CrossRef]
  37. Xu, Y.; Chen, N.; Zhang, H.; Liang, B. Adaptive anomaly detection strategy based on reinforcement learning. In Proceedings of the International Conference of Pioneering Computer Scientists, Engineers and Educators, Zhengzhou, China, 21–23 September 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 493–504. [Google Scholar]
  38. Sethi, K.; Rupesh, E.S.; Kumar, R.; Bera, P.; Madhav, Y.V. A context-aware robust intrusion detection system: A reinforcement learning-based approach. Int. J. Inf. Secur. 2020, 19, 657–678. [Google Scholar] [CrossRef]
  39. Rashid, M.M.; Kamruzzaman, J.; Hassan, M.M.; Imam, T.; Gordon, S. Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques. Int. J. Environ. Res. Public Health 2020, 17, 9347. [Google Scholar] [CrossRef]
  40. Ofori, A.Y.; Swart, C.; Boateng, F.A.O.; Islam, S. Cyber resilience in supply chain system security using machine learning for threat prediction. Contin. Resil. Rev. 2022, 4, 1–36. [Google Scholar]
  41. Rahman, A.-U.; Abbas, S.; Gollapalli, M.; Ahmed, R.; Aftab, S.; Ahmad, M.; Khan, M.A.; Mosavi, A. Rainfall Prediction System Using Machine Learning Fusion for Smart Cities. Sensors 2022, 22, 3504. [Google Scholar] [CrossRef]
  42. Saleem, M.; Abbas, S.; Ghazal, T.M.; Khan, M.A.; Sahawneh, N.; Ahmad, M. Smart cities: Fusion-based intelligent traffic congestion control system for vehicular networks using machine learning techniques. Egypt. Inform. J. 2022, 23, 417–426. [Google Scholar] [CrossRef]
  43. Nadeem, M.W.; Goh, H.G.; Khan, M.A.; Hussain, M.; Mushtaq, M.F.; Ponnusamy, V.A. Fusion-Based Machine Learning Architecture for Heart Disease Prediction. Comput. Mater. Contin. 2021, 67, 2481–2496. [Google Scholar] [CrossRef]
  44. Siddiqui, S.Y.; Athar, A.; Khan, M.A.; Abbas, S.; Saeed, Y.; Hussain, M. Modelling, Simulation and Optimization of Diagnosis Cardiovascular Disease Using Computational Intelligence Approaches. J. Med. Imaging Health Inform. 2020, 10, 1005–1022. [Google Scholar] [CrossRef]
  45. Ahmed, U. Prediction of Diabetes Empowered with Fused Machine Learning. IEEE Access 2022, 10, 8529–8538. [Google Scholar] [CrossRef]
  46. Rahman, A.-U.; Alqahtani, A.; Aldhafferi, N.; Nasir, M.U.; Khan, M.F.; Khan, M.A.; Mosavi, A. Histopathologic Oral Cancer Prediction Using Oral Squamous Cell Carcinoma Biopsy Empowered with Transfer Learning. Sensors 2022, 22, 3833. [Google Scholar] [CrossRef]
  47. Taleb, N.; Mehmood, S.; Zubair, M.; Naseer, I.; Mago, B.; Nasir, M.U. Ovary Cancer Diagnosing Empowered with Machine Learning. In Proceedings of the 2022 International Conference on Business Analytics for Technology and Security (ICBATS), Dubai, United Arab Emirates, 16–17 February 2022; pp. 1–6. [Google Scholar]
  48. Nasir, M.U.; Ghazal, T.M.; Khan, M.A.; Zubair, M.; Rahman, A.-U.; Ahmed, R.; Al Hamadi, H.; Yeun, C.Y. Breast Cancer Prediction Empowered with Fine-Tuning. Comput. Intell. Neurosci. 2022, 2022, 5918686. [Google Scholar] [CrossRef]
  49. Ghazal, T.M.; Al Hamadi, H.; Nasir, M.U.; Rahman, A.U.; Gollapalli, M.; Zubair, M.; Khan, M.A.; Yeun, C.Y. Supervised Machine Learning Empowered Multifactorial Genetic Inheritance Disorder Prediction. Comput. Intell. Neurosci. 2022, 2022, 1051388. [Google Scholar] [CrossRef]
  50. Nasir, M.U.; Khan, S.; Mehmood, S.; Khan, M.A.; Rahman, A.-u.; Hwang, S.O. IoMT-Based Osteosarcoma Cancer Detection in Histopathology Images Using Transfer Learning Empowered with Blockchain, Fog Computing, and Edge Computing. Sensors 2022, 22, 5444. [Google Scholar] [CrossRef]
  51. Ray, S. An Analysis of Computational Complexity and Accuracy of Two Supervised Machine Learning Algorithms—K-Nearest Neighbor and Support Vector Machine. In Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing; Sharma, N., Chakrabarti, A., Balas, V., Martinovic, J., Eds.; Springer: Singapore, 2021; Volume 1174. [Google Scholar]
  52. Abdiansah, A.; Wardoyo, R. Time Complexity Analysis of Support Vector Machines (SVM) in LibSVM. Int. J. Comput. Appl. 2015, 128, 28–34. [Google Scholar] [CrossRef]
  53. UNR-IDD Intrusion Detection Dataset. Available online: https://www.kaggle.com/datasets/tapadhirdas/unridd-intrusion-detection-dataset?resource=download (accessed on 31 May 2022).
Figure 1. Proposed model for network meddling detection using machine learning entangled with blockchain technology.
Figure 1. Proposed model for network meddling detection using machine learning entangled with blockchain technology.
Sensors 22 06755 g001
Figure 2. Training MCE of SVM for the detection of network meddling.
Figure 2. Training MCE of SVM for the detection of network meddling.
Sensors 22 06755 g002
Table 1. Limitation of previous studies for meddling detection in the network.
Table 1. Limitation of previous studies for meddling detection in the network.
PaperModelDatasetAnomalyBlockchainDetection Accuracy (%)Limitation
Jin et al. [32]Reinforcement learningPublicInsider threatsNo98%Preprocessing, imbalanced classes
Hamamoto et al. [33]K-meansPublicDDoS, DoSNo96.53%Less performance in a supervised manner, imbalanced classes
Gu et al. [34]K-meansPublicDDoSNo98.9%High in recall detection but lacks classification
Alauthman et al. [35]Neural NetworkPublicBotnetNo98.3%Preprocessing, imbalanced classes
Smadi et al. [36]Neural NetworkPublicPhishingNo98.6%Machine learning processing, imbalanced classes
Xu et al. [37]Q-LearningPublicGeneral networkNo95%Preprocessing, imbalanced classes
Sethi et al. [38]Reinforcement LearningPublicDoSNo97.8%Preprocessed features, imbalanced classes
Rashid et al. [39]Machine learningPublicCyber attackNo95%Data fuzzing and feature engineering
Ofori et al. [40]Machine learningPublicCyber threatNo70%Data control and attributions
Table 2. Description of the dataset.
Table 2. Description of the dataset.
VariableTypeVariableType
Received packetCategoricalReceived bytesCategorical
Sent packetsCategoricalSent bytesCategorical
Port alive durationCategoricalPackets RX droppedCategorical
Packets TX droppedCategoricalPackets RX errorsCategorical
Packets Tx errorsCategoricalDelta received packetsCategorical
Delta received bytesCategoricalDelta sent bytesCategorical
Table 3. Training confusion matrix of SVM.
Table 3. Training confusion matrix of SVM.
Total Instances (29,600)AttackNormal
Attack27,190110
Normal102290
Table 4. Performance Analysis of SVM (%) During Training Phase.
Table 4. Performance Analysis of SVM (%) During Training Phase.
DAMCRSenSpec
99.590.4199.9695.42
F1PPVNPVFPR
99.7899.6099.574.58
FNRLPRLNRFMI
0.0421.810.0099.78
Table 5. Training confusion matrix of KNN.
Table 5. Training confusion matrix of KNN.
Total Instances (29,600)AttackNormal
Attack27,190110
Normal1002200
Table 6. Performance Analysis of KNN (%) During Training Phase.
Table 6. Performance Analysis of KNN (%) During Training Phase.
DAMCRSenSpec
99.290.7199.6395.24
F1PPVNPVFPR
99.6299.6095.654.76
FNRLPRLNRFMI
0.3720.920.0099.62
Table 7. Testing confusion matrix of the SVM.
Table 7. Testing confusion matrix of the SVM.
Total Instances (7400)AttackNormal
Attack640060
Normal10930
Table 8. Performance Analysis of SVM (%) During Testing Phase.
Table 8. Performance Analysis of SVM (%) During Testing Phase.
DAMCRSenSpec
99.050.9599.8493.94
F1PPVNPVFPR
99.6499.0798.946.06
FNRLPRLNRFMI
0.1616.470.0099.46
Table 9. Testing confusion matrix of KNN.
Table 9. Testing confusion matrix of KNN.
Total Instances (7400)AttackNormal
Attack6400140
Normal10850
Table 10. Performance Analysis of KNN (%) During Testing Phase.
Table 10. Performance Analysis of KNN (%) During Testing Phase.
DAMCRSenSpec
97.972.0399.8485.86
F1PPVNPVFPR
98.8497.8698.8414.14
FNRLPRLNRFMI
0.167.060.0098.85
Table 11. Comparative analysis with previous studies.
Table 11. Comparative analysis with previous studies.
PaperModelDatasetAnomalyBlockchainDetection Accuracy (%)
Jin et al. [32]Reinforcement learningPublicInsider threatsNo98%
Hamamoto et al. [33]K-meansPublicDDoS, DoSNo96.53%
Gu et al. [34]K-meansPublicDDoSNo98.9%
Alauthman et al. [35]Neural NetworkPublicBotnetNo98.3%
Smadi et al. [36]Neural NetworkPublicPhishingNo98.6%
Xu et al. [37]Q-LearningPublicGeneral NetworkNo95%
Sethi et al. [38]Reinforcement LearningPublicDoSNo97.8%
Rashid et al. [39]Machine learningPublicCyber-attackNo95%
Ofori et al. [40]Machine learningPublicCyber threatNo70%
The Proposed ModelMachine LearningPublicGeneral NetworkYes99.05%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nasir, M.U.; Khan, S.; Mehmood, S.; Khan, M.A.; Zubair, M.; Hwang, S.O. Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology. Sensors 2022, 22, 6755. https://doi.org/10.3390/s22186755

AMA Style

Nasir MU, Khan S, Mehmood S, Khan MA, Zubair M, Hwang SO. Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology. Sensors. 2022; 22(18):6755. https://doi.org/10.3390/s22186755

Chicago/Turabian Style

Nasir, Muhammad Umar, Safiullah Khan, Shahid Mehmood, Muhammad Adnan Khan, Muhammad Zubair, and Seong Oun Hwang. 2022. "Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology" Sensors 22, no. 18: 6755. https://doi.org/10.3390/s22186755

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop