An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models
The internet is growing at a rapid pace offering multiple web-based applications catering to the changing needs and demands of customers. Nevertheless, extensive use of internet services has potentially exposed the threats of data security and reliability. With technological advancements, cyber thre...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9050472/ |
id |
doaj-582dda9a1a104b18a2285eed90270646 |
---|---|
record_format |
Article |
spelling |
doaj-582dda9a1a104b18a2285eed902706462021-03-30T01:30:10ZengIEEEIEEE Access2169-35362020-01-018615496156410.1109/ACCESS.2020.29841579050472An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based ModelsMarwan A. Albahar0Ruaa A. Al-Falluji1https://orcid.org/0000-0002-1425-6213Muhammad Binsawad2https://orcid.org/0000-0003-0915-7058Department of Computer Science, Umm Al-Qura University, Mecca, Saudi ArabiaCollege of Fine Arts, University of Babylon, Babylon, IraqFaculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi ArabiaThe internet is growing at a rapid pace offering multiple web-based applications catering to the changing needs and demands of customers. Nevertheless, extensive use of internet services has potentially exposed the threats of data security and reliability. With technological advancements, cyber threats have also become more sophisticated with the blend of distinctive forms of attacks to cause potential damage. The increase in the number and variety of cyber attacks is inevitable; hence it is imperative to improve the efficiency of the cyber security systems. This research aims to compare different neural network models to distinguish malicious acts from non-malicious ones. The examined models are trained, validated, and tested using two datasets(cyber-physical subsystem dataset and KDD dataset). The performance of the studied models is measured using the confusion matrix. For the cyber-physical subsystem dataset, binary classification and multi-class classification are used for evaluating the models. In the KDD dataset, binary classification is the only classification approach because the dataset contains two classes, regular (normal actions) and harmful (malicious actions). In general, the results in binary classification are more encouraging than in multi-class classification. Among all the models, the PNN model achieves the best performance, while the GRNN model is the fastest one. Although PNN's runtime is slightly higher than the GRNN model, we can claim that the PNN is the best model for our data because a trade-off between the performance and run time can be obtained.https://ieeexplore.ieee.org/document/9050472/Cyber-physical subsystemmalicious attacksfeedforward systemsneural networkclassification algorithms |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Marwan A. Albahar Ruaa A. Al-Falluji Muhammad Binsawad |
spellingShingle |
Marwan A. Albahar Ruaa A. Al-Falluji Muhammad Binsawad An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models IEEE Access Cyber-physical subsystem malicious attacks feedforward systems neural network classification algorithms |
author_facet |
Marwan A. Albahar Ruaa A. Al-Falluji Muhammad Binsawad |
author_sort |
Marwan A. Albahar |
title |
An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models |
title_short |
An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models |
title_full |
An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models |
title_fullStr |
An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models |
title_full_unstemmed |
An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models |
title_sort |
empirical comparison on malicious activity detection using different neural network-based models |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
The internet is growing at a rapid pace offering multiple web-based applications catering to the changing needs and demands of customers. Nevertheless, extensive use of internet services has potentially exposed the threats of data security and reliability. With technological advancements, cyber threats have also become more sophisticated with the blend of distinctive forms of attacks to cause potential damage. The increase in the number and variety of cyber attacks is inevitable; hence it is imperative to improve the efficiency of the cyber security systems. This research aims to compare different neural network models to distinguish malicious acts from non-malicious ones. The examined models are trained, validated, and tested using two datasets(cyber-physical subsystem dataset and KDD dataset). The performance of the studied models is measured using the confusion matrix. For the cyber-physical subsystem dataset, binary classification and multi-class classification are used for evaluating the models. In the KDD dataset, binary classification is the only classification approach because the dataset contains two classes, regular (normal actions) and harmful (malicious actions). In general, the results in binary classification are more encouraging than in multi-class classification. Among all the models, the PNN model achieves the best performance, while the GRNN model is the fastest one. Although PNN's runtime is slightly higher than the GRNN model, we can claim that the PNN is the best model for our data because a trade-off between the performance and run time can be obtained. |
topic |
Cyber-physical subsystem malicious attacks feedforward systems neural network classification algorithms |
url |
https://ieeexplore.ieee.org/document/9050472/ |
work_keys_str_mv |
AT marwanaalbahar anempiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels AT ruaaaalfalluji anempiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels AT muhammadbinsawad anempiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels AT marwanaalbahar empiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels AT ruaaaalfalluji empiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels AT muhammadbinsawad empiricalcomparisononmaliciousactivitydetectionusingdifferentneuralnetworkbasedmodels |
_version_ |
1724186899440992256 |