Risk and Protection for Machine Learning-Based Network Intrusion

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 June 2024 | Viewed by 1288

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, National Taipei University, New Taipei City 237303, Taiwan
Interests: network intrusion prevention; deep learning quality; blockchain smart contracts; IoT routing

E-Mail Website
Guest Editor

Special Issue Information

Dear Colleagues,

As the scale of network intrusion grows, machine learning models become a popular approach for intrusion detection based on their significant computation capability, especially deep learning models. Although machine learning-based intrusion detection models can detect a large range of network intrusions, it is difficult to explain the detection results because of the model’s computation complexity. Adversarial attacks can pollute the detection training model to mislead the detection results, and they are difficult to be observed. Thus, non-explainable results and adversarial attacks lead to new risks of machine learning-based intrusion detection models.

This Special Issue invites research or review papers on new advanced protections for machine learning-based intrusion detection models that explore with their new risks, such as adversarial attacks. For federal learning, if malicious clients provide the training results polluted by the adversarial attacks, the server training model is also polluted. Generative adversarial networks can generate both beneficial training samples and adversarial samples. Contrastive learning models have illustrated their self-learning capability for images, and they can be good candidates to protect the intrusion detections via self-learning. Blockchain is also a popular approach to protect against intrusion detections. These new emerging techniques can establish hybrid protection solutions for intrusion detection to prevent their new risks.

Dr. Chinyang Henry Tseng
Prof. Dr. Hsing-Chung Chen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • intrusion detection
  • machine learning
  • deep learning
  • adversarial attack
  • federal learning
  • generative adversarial network
  • contrastive learning
  • blockchain

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

25 pages, 2019 KiB  
Article
Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset
by Hadi Najafi Mohsenabad and Mehmet Ali Tut
Appl. Sci. 2024, 14(3), 1044; https://doi.org/10.3390/app14031044 - 25 Jan 2024
Viewed by 875
Abstract
In computer network security, the escalating use of computer networks and the corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) to the forefront of research in computer science. IDSs are a crucial security technology that diligently monitor network traffic and host [...] Read more.
In computer network security, the escalating use of computer networks and the corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) to the forefront of research in computer science. IDSs are a crucial security technology that diligently monitor network traffic and host activities to identify unauthorized or malicious behavior. This study develops highly accurate models for detecting a diverse range of cyberattacks using the fewest possible features, achieved via a meticulous selection of features. We chose 5, 9, and 10 features, respectively, using the Artificial Bee Colony (ABC), Flower Pollination Algorithm (FPA), and Ant Colony Optimization (ACO) feature-selection techniques. We successfully constructed different models with a remarkable detection accuracy of over 98.8% (approximately 99.0%) with Ant Colony Optimization (ACO), an accuracy of 98.7% with the Flower Pollination Algorithm (FPA), and an accuracy of 98.6% with the Artificial Bee Colony (ABC). Another achievement of this study is the minimum model building time achieved in intrusion detection, which was equal to 1 s using the Flower Pollination Algorithm (FPA), 2 s using the Artificial Bee Colony (ABC), and 3 s using Ant Colony Optimization (ACO). Our research leverages the comprehensive and up-to-date CSE-CIC-IDS2018 dataset and uses the preprocessing Discretize technique to discretize data. Furthermore, our research provides valuable recommendations to network administrators, aiding them in selecting appropriate machine learning algorithms tailored to specific requirements. Full article
(This article belongs to the Special Issue Risk and Protection for Machine Learning-Based Network Intrusion)
Show Figures

Figure 1

Back to TopTop