Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3650215.3650341acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlcaConference Proceedingsconference-collections
research-article

Investigation the Impact of Features on Malicious Traffic Identification Based on Different Machine Learning Algorithms Combined with Dimensionality Reduction

Published: 16 April 2024 Publication History
  • Get Citation Alerts
  • Abstract

    With the Internet's rapid evolution, the incidence of cyberattacks has surged significantly. Employing machine learning to precisely detect and thwart malicious network traffic has emerged as a novel and effective solution for safeguarding computer networks. This research program centers on the identification of suitable machine learning models and the meticulous curation of data features. Within this study, a total of 13 features, encompassing conventional timestamps, the volume of traffic packets in data streams, and their associated sizes, are extracted as key features following the dataset's traffic packet consolidation process. Three algorithms such as Random Forest, Decision Tree and Support Vector Machine were chosen for training and testing the dataset. In addition, Principle Component Analysis dimensionality reduction is performed for these 13 features to determine the effect on the accuracy of the results before and after the dimensionality reduction process. The final result is that the Random Forest algorithm achieves best processing power, but produces large fluctuations in the accuracy in one dimension. In the face of large-scale network traffic analysis, the random forest model should be preferred as the machine learning model, while ensuring that the dimension is greater than one dimension after dimensionality reduction.

    References

    [1]
    Al-Alawi, Adel Ismail, Sara Abdulrahman Al-Bassam, and Arpita A. Mehrotra. 2020. Critical cybersecurity threats: frontline issues faced by Bahraini organizations. Implementing Computational Intelligence Techniques for Security Systems Design. IGI Global. 210-229.
    [2]
    Cisco, U. 2020. Cisco annual internet report (2018–2023) white paper. Cisco: San Jose, CA, USA 10.1, 1-35.
    [3]
    Hao Li, 2019. Unknown Malware detection based on network traffic analysis. Journal of Jinan University (Natural Science Edition) 33.06, 500-505.
    [4]
    Rathore, Hemant, 2018. Malware detection using machine learning and deep learning. Big Data Analytics: 6th International Conference, BDA 2018, Warangal, India, December 18–21, Proceedings 6. Springer International Publishing, 2018.
    [5]
    El Merabet, Hoda, and Abderrahmane Hajraoui. 2019. A survey of malware detection techniques based on machine learning. International Journal of Advanced Computer Science and Applications 10.1.
    [6]
    Jordan Holland, Paul Schmitt, Nick Feamster, and Prateek Mittal. 2021. New Directions in Automated Traffic Analysis. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21). Association for Computing Machinery, New York, NY, USA, 3366–3383. https://doi.org/10.1145/3460120.3484758.
    [7]
    Kurita, Takio. 2019. Principal component analysis (PCA). Computer Vision: A Reference Guide.1-4.
    [8]
    Hongyan Lv, and Qian Feng. 2019. A Review of Research on Random Forest Algorithms. Journal of Hebei Academy of Sciences 36.3. 37-41.
    [9]
    Yanli Liu, Yourong Wang, and Jian Zhang. 2012. New machine learning algorithm: Random forest. Information Computing and Applications: Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings 3. Springer Berlin Heidelberg.
    [10]
    Charbuty, Bahzad, and Adnan Abdulazeez. 2021. Classification based on decision tree algorithm for machine learning." Journal of Applied Science and Technology Trends 2.01, 20-28.
    [11]
    Hasan, Basna Mohammed Salih, and Adnan Mohsin Abdulazeez. 2021. A review of principal component analysis algorithm for dimensionality reduction." Journal of Soft Computing and Data Mining 2.1, 20-30.

    Index Terms

    1. Investigation the Impact of Features on Malicious Traffic Identification Based on Different Machine Learning Algorithms Combined with Dimensionality Reduction

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICMLCA '23: Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application
      October 2023
      1065 pages
      ISBN:9798400709449
      DOI:10.1145/3650215
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 April 2024

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICMLCA 2023

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 6
        Total Downloads
      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 12 Aug 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media