DOI QR코드

DOI QR Code

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Received : 2024.05.05
  • Published : 2024.05.30

Abstract

In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

Keywords

References

  1. Nalavade K. and Meshram B. "Intrusion prevention systems: data mining approach." In proceedings of the International Conference and Workshop on Emerging Trends in Technology, 2010, pp. 211-214, doi:https://doi-org.ezproxy.emich.edu/10.1145/1741906.1741952 
  2. Pham T., et al. "Generating Artificial Attack Data for Intrusion Detection Using Machine Learning." In proceedings of the Fifth Symposium on Information and Communication Technology, 2014, pp. 286-291, doi:https://doi-org.ezproxy.emich.edu/10.1145/2676585.2676618 
  3. Foroushani A. and Li Y. "Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique." In proceedings of the 2018 7th International Conference on Software and Computer Applications, 2018, pp. 119- 123, doi:https://doi-org.ezproxy.emich.edu/10.1145/3185089.3185114 
  4. Chapke P. and Deshmukh R. "Intrusion detection system using fuzzy logic and data mining technique." In proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology, 2015, pp. 1-5, doi:https://doi-org.ezproxy.emich.edu/10.1145/2743065.2743128 
  5. Li Y., et al. "Intrusion detection algorithm based on deep learning for industrial control networks." In proceedings of the 2019 The 2nd International Conference on Robotics, Control and Automation Engineering, 2019, pp. 40-44, doi:https://doi-org.ezproxy.emich.edu/10.1145/3372047.3372092 
  6. Belouch M. and Hadaj S. "Comparison of ensemble learning methods applied to network intrusion detection." proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, 2017, pp. 1-4, doi:https:// doi-org.ezproxy.emich.edu/10.1145/3018896.3065830 
  7. Yu Y., et al. "Attacks and Defenses towards Machine Learning Based Systems." proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018, pp. 1-7, doi:https://doi-org.ezproxy.emich.edu/10.1145/3207677.3277988 
  8. Tungjaturasopon P. and Piromsopa K. "Performance Analysis of Machine Learning Techniques in Intrusion Detection." In proceedings of the 2018 VII International Conference on Network, Communication and Computing, 2018, pp. 6-10., doi:https://doi-org.ezproxy.emich.edu/10.1145/3301326.3301335 
  9. Hamid Y., et al. "Machine Learning Techniques for Intrusion Detection." In Proceedings of the International Conference on Informatics and Analytics, 2016, Article 53, pp. 1-6, doi:https://doi-org.ezproxy.emich.edu/10.1145/2980258.2980378 
  10. Gunupudi R., Mangathayaru N., and Narasimha G. "Intrusion Detection Using Text Processing Techniques." In proceedings of the The International Conference on Engineering & MIS, 2015, Article 55, pp. 1-6 doi:https://doi-org.ezproxy.emich.edu/10.1145/2832987.2833067 
  11. Khanji S. and Khattak A. "Towards a Novel Intrusion Detection Architecture Using Artificial Intelligence." In Proceedings of the 2020 9th International Conference on Software and Information Engineering , 2020, pp. 185-189., doi:https://doi-org.ezproxy.emich.edu/10.1145/3436829.3436842 
  12. Anand V. "Intrusion Detection: Tools, Techniques and Strategies." In proceedings of the 42nd annual ACM SIGUCCS conference on User services, 2014, pp. 69-73, doi:https://doi-org.ezproxy.emich.edu/10.1145/2661172.2661186 
  13. Jafier S. "Utilizing feature selection techniques in intrusion detection system for internet of things." In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018, pp. 1-3, doi:https://doi-org.ezproxy.emich.edu/10.1145/3231053.3234323 
  14. Mbarek B., et al. "Enhanced Network Intrusion Detection System Protocol for Internet of Things." In Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, pp. 1156-1163, doi:https://doi-org.ezproxy.emich.edu/10.1145/3341105.3373867 
  15. Aneetha A., et al. "Hybrid Network Intrusion Detection System Using Expert Rule Based Approach." In proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, 2012, pp. 47-51, doi:https://doi-org.ezproxy.emich.edu/10.1145/2393216.2393225