Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Computers  /  Vol: 12 Par: 10 (2023)  /  Artículo
ARTÍCULO
TITULO

Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data

Sikha S. Bagui    
Dustin Mink    
Subhash C. Bagui and Sakthivel Subramaniam    

Resumen

Machine Learning is widely used in cybersecurity for detecting network intrusions. Though network attacks are increasing steadily, the percentage of such attacks to actual network traffic is significantly less. And here lies the problem in training Machine Learning models to enable them to detect and classify malicious attacks from routine traffic. The ratio of actual attacks to benign data is significantly high and as such forms highly imbalanced datasets. In this work, we address this issue using data resampling techniques. Though there are several oversampling and undersampling techniques available, how these oversampling and undersampling techniques are most effectively used is addressed in this paper. Two oversampling techniques, Borderline SMOTE and SVM-SMOTE, are used for oversampling minority data and random undersampling is used for undersampling majority data. Both the oversampling techniques use KNN after selecting a random minority sample point, hence the impact of varying KNN values on the performance of the oversampling technique is also analyzed. Random Forest is used for classification of the rare attacks. This work is done on a widely used cybersecurity dataset, UNSW-NB15, and the results show that 10% oversampling gives better results for both BMSOTE and SVM-SMOTE.

 Artículos similares

       
 
Duo Sun, Lei Zhang, Kai Jin, Jiasheng Ling and Xiaoyuan Zheng    
Aiming at the imbalance of industrial control system data and the poor detection effect of industrial control intrusion detection systems on network attack traffic problems, we propose an ETM-TBD model based on hybrid machine learning and neural network ... ver más
Revista: Applied Sciences

 
Gregorius Ryan, Pricillia Katarina and Derwin Suhartono    
The rise of social media as a platform for self-expression and self-understanding has led to increased interest in using the Myers?Briggs Type Indicator (MBTI) to explore human personalities. Despite this, there needs to be more research on how other wor... ver más
Revista: Information

 
Nikola Andelic, Sandi Baressi ?egota and Zlatan Car    
Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling automat... ver más
Revista: Computers

 
Lanyong Zhang, Ziqi Zhang and Huimin Peng    
Synchronous generators with three phases are crucial components of modern integrated power systems in ships. These generators provide power for the entire operation of the vessel. Therefore, it is of paramount importance to diagnose short-circuit faults ... ver más

 
Javad Hassannataj Joloudari, Abdolreza Marefat, Mohammad Ali Nematollahi, Solomon Sunday Oyelere and Sadiq Hussain    
Imbalanced Data (ID) is a problem that deters Machine Learning (ML) models from achieving satisfactory results. ID is the occurrence of a situation where the quantity of the samples belonging to one class outnumbers that of the other by a wide margin, ma... ver más
Revista: Applied Sciences