Acta Scientific Computer Sciences

Research Article Volume 6 Issue 7

A Random Forest Approach and Principal Component Analysis in Intrusion Detection System Using Machine Learning

Rajavenkatesswaran KC1*, Ari Bharathi A2, Gayathri R2, Mathan C2 and Vikram B2

1Assistant Professor, Department of Information Technology, Nandha College of Technology, India
2UG-Final Year, Department of Information Technology, Nandha College of Technology, India

*Corresponding Author: Rajavenkatesswaran KC, Assistant Professor, Department of Information Technology, Nandha College of Technology, India.

Received: May 09, 2024; Published: June 11, 2024

Abstract

Malicious behavior on computer networks is monitored and detected by intrusion detection systems, or IDSs. Rule-based systems, which might be hard to maintain and might not be able to identify new attack vectors, are often used by traditional IDSs. IDSs are using machine learning (ML) methods more often since they can learn from data to identify new threats and increase their accuracy over time. To improve network security, the suggested intrusion detection system combines several machine learning approaches with the Random Forest algorithm. When categorizing complicated data, the Random Forests (RF) method yields excellent accuracy results. An established intrusion detection benchmark, the KDD Cup dataset, is used to assess the system's performance. In an ever-changing threat environment, this technique shows tremendous promise in detecting and mitigating harmful actions inside computer networks, improving cybersecurity.

Keywords: Intrusion Detection; Feature Selection; Machine Learning; Random Forest; Detection Rate

References

  1. R Kumar., et al. “An intellectual intrusion detection system using hybrid hunger games search and remora optimization algorithm for IoT wireless networks" which was published in the journal Knowledge-Based Systems in November (2022).
  2. W Wang., et al. “Developed a network intrusion detection system based on representation learning and capturing explicit and implicit feature interactions”. Their research was published in the journal Computer Security in January (2022).
  3. Satheesh Kumar and M Karthick. “An Secured Data Transmission in MANET Networks with Optimizing Link State Routing Protocol Using ACO-CBRP Protocols”. IEEE Access (2018).
  4. BA Tama and S Lim. “Conducted a systematic mapping study and cross-benchmark evaluation on ensemble learning for intrusion detection systems”. Their research was published in the journal Computer Science Review in February (2021).
  5. S Lei., et al. “Proposed a novel model called HNN for studying intrusion detection based on multifeature correlation and temporal-spatial analysis”. Their work was published in the IEEE Transactions on Network Science and Engineering in October (2021).
  6. Azath Mubarakali., et al. “Optimized flexible network architecture creation against 5G communication-based IoT using information-centric wireless computing”. Wireless Networks (2023).
  7. "Sustainable ensemble learning driving intrusion detection model". IEEE Trans. Dependable Secure Comput 18.4 (2021): 1591-1604.
  8. Y Zhou., et al. “Building an effective intrusion detection system based on feature selection and ensemble classifier”. Journal of Computer Networks 174 (2020): 107247.
  9. Karthick M., et al. “An Efficient Multi-mobile Agent Based Data Aggregation in Wireless Sensor Networks Based on HSSO Route Planning”. Ad Hoc and Sensor Wireless Networks 57 (2021): 187-207.
  10. B A Tama., et al. “An enhanced anomaly detection in web traffic using a stack of classifier ensemble”. IEEE Access 8 (2020): 24120-24134.
  11. J Oughton., et al. “Explored the comparison between wireless internet connectivity options 5G and Wi-Fi 6”. Their findings were published in the journal Telecommunication Policy in June (2021).
  12. Y Cheng., et al. “Leveraging semisupervised hierarchical stacking temporal convolutional network for anomaly detection in IoT communication". IEEE Internet Things Journal1 (2021): 144-155.
  13. G Kumar., et al. “MLEsIDSs: Machine learning-based ensembles for intrusion detection systems—A review". Journal of Supercomputer11 (2021): 8938-8971.

Citation

Citation: Rajavenkatesswaran KC., et al. “A Random Forest Approach and Principal Component Analysis in Intrusion Detection System Using Machine Learning".Acta Scientific Computer Sciences 6.6 (2024): 28-31.

Copyright

Copyright: © 2024 Rajavenkatesswaran KC., et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.




Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is July 30, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US