An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models

The internet is growing at a rapid pace offering multiple web-based applications catering to the changing needs and demands of customers. Nevertheless, extensive use of internet services has potentially exposed the threats of data security and reliability. With technological advancements, cyber thre...

Full description

Bibliographic Details
Main Authors: Marwan A. Albahar, Ruaa A. Al-Falluji, Muhammad Binsawad
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9050472/
id doaj-582dda9a1a104b18a2285eed90270646
record_format Article
spelling doaj-582dda9a1a104b18a2285eed902706462021-03-30T01:30:10ZengIEEEIEEE Access2169-35362020-01-018615496156410.1109/ACCESS.2020.29841579050472An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based ModelsMarwan A. Albahar0Ruaa A. Al-Falluji1https://orcid.org/0000-0002-1425-6213Muhammad Binsawad2https://orcid.org/0000-0003-0915-7058Department of Computer Science, Umm Al-Qura University, Mecca, Saudi ArabiaCollege of Fine Arts, University of Babylon, Babylon, IraqFaculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi ArabiaThe internet is growing at a rapid pace offering multiple web-based applications catering to the changing needs and demands of customers. Nevertheless, extensive use of internet services has potentially exposed the threats of data security and reliability. With technological advancements, cyber threats have also become more sophisticated with the blend of distinctive forms of attacks to cause potential damage. The increase in the number and variety of cyber attacks is inevitable; hence it is imperative to improve the efficiency of the cyber security systems. This research aims to compare different neural network models to distinguish malicious acts from non-malicious ones. The examined models are trained, validated, and tested using two datasets(cyber-physical subsystem dataset and KDD dataset). The performance of the studied models is measured using the confusion matrix. For the cyber-physical subsystem dataset, binary classification and multi-class classification are used for evaluating the models. In the KDD dataset, binary classification is the only classification approach because the dataset contains two classes, regular (normal actions) and harmful (malicious actions). In general, the results in binary classification are more encouraging than in multi-class classification. Among all the models, the PNN model achieves the best performance, while the GRNN model is the fastest one. Although PNN's runtime is slightly higher than the GRNN model, we can claim that the PNN is the best model for our data because a trade-off between the performance and run time can be obtained.https://ieeexplore.ieee.org/document/9050472/Cyber-physical subsystemmalicious attacksfeedforward systemsneural networkclassification algorithms
collection DOAJ
language English
format Article
sources DOAJ
author Marwan A. Albahar
Ruaa A. Al-Falluji
Muhammad Binsawad
spellingShingle Marwan A. Albahar
Ruaa A. Al-Falluji
Muhammad Binsawad
An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models
IEEE Access
Cyber-physical subsystem
malicious attacks
feedforward systems
neural network
classification algorithms
author_facet Marwan A. Albahar
Ruaa A. Al-Falluji
Muhammad Binsawad
author_sort Marwan A. Albahar
title An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models
title_short An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models
title_full An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models
title_fullStr An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models
title_full_unstemmed An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models
title_sort empirical comparison on malicious activity detection using different neural network-based models
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description The internet is growing at a rapid pace offering multiple web-based applications catering to the changing needs and demands of customers. Nevertheless, extensive use of internet services has potentially exposed the threats of data security and reliability. With technological advancements, cyber threats have also become more sophisticated with the blend of distinctive forms of attacks to cause potential damage. The increase in the number and variety of cyber attacks is inevitable; hence it is imperative to improve the efficiency of the cyber security systems. This research aims to compare different neural network models to distinguish malicious acts from non-malicious ones. The examined models are trained, validated, and tested using two datasets(cyber-physical subsystem dataset and KDD dataset). The performance of the studied models is measured using the confusion matrix. For the cyber-physical subsystem dataset, binary classification and multi-class classification are used for evaluating the models. In the KDD dataset, binary classification is the only classification approach because the dataset contains two classes, regular (normal actions) and harmful (malicious actions). In general, the results in binary classification are more encouraging than in multi-class classification. Among all the models, the PNN model achieves the best performance, while the GRNN model is the fastest one. Although PNN's runtime is slightly higher than the GRNN model, we can claim that the PNN is the best model for our data because a trade-off between the performance and run time can be obtained.
topic Cyber-physical subsystem
malicious attacks
feedforward systems
neural network
classification algorithms
url https://ieeexplore.ieee.org/document/9050472/
work_keys_str_mv AT marwanaalbahar anempiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels
AT ruaaaalfalluji anempiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels
AT muhammadbinsawad anempiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels
AT marwanaalbahar empiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels
AT ruaaaalfalluji empiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels
AT muhammadbinsawad empiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels
_version_ 1724186899440992256