A Hybrid Machine Learning approach for Analysis & Identification of Cyber Security Attacks

A Hybrid Machine Learning approach for Analysis & Identification of Cyber Security Attacks

  IJETT-book-cover           
  
© 2025 by IJETT Journal
Volume-73 Issue-6
Year of Publication : 2025
Author : Satya Srinivas Maddipati, A Siva Naga Ram Gopal, Rakesh Kancharla, PVVS Eswar Rao, DSV Prasad Uppalapati
DOI : 10.14445/22315381/IJETT-V73I6P113

How to Cite?
Satya Srinivas Maddipati, A Siva Naga Ram Gopal, Rakesh Kancharla, PVVS Eswar Rao, DSV Prasad Uppalapati, "A Hybrid Machine Learning approach for Analysis & Identification of Cyber Security Attacks," International Journal of Engineering Trends and Technology, vol. 73, no. 6, pp.149-156, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I6P113

Abstract
Providing security for resources in the internet is an essential task. Now a days, the major threats in the cyber world are Denial of Service (DoS), Malware and Intruders. These types of attacks must be predicted in advance with high accuracy using machine learning techniques. This research work analyses the network traffic patterns for cyber-attacks and identifies the type of attack. This work proposes apriori algorithm to extract frequent patterns from network traffic for cyber-attacks and also applies logistic regression to identify the type of attack. The results of proposed work compared with other machine learning algorithms like Decision trees, Random forest and support vector machines. The results of this work identified the network traffic frequent patterns with above 65% confidence and proved that the average accuracy was increased by 5% using proposed work.

Keywords
Denial of Service, Cyber-attacks, Machine Learning algorithms, Network traffic frequent patterns, Logistic regression

References
[1] C. Malathi, and I. Naga Padmaja, “Identification of Cyber Attacks Using Machine Learning in Smart IoT Networks,” Materials Today: Proceedings, vol. 80, pp. 2518-2523, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] R.A. Karthika, and M. Maheswari, “Detection Analysis of Malicious Cyber Attacks Using Machine Learning Algorithms,” Materials Today: Proceedings, vol. 68, pp. 26-34, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Veeramanickam M.R.M. et al., “Streamed Incremental Learning for Cyber Attack Classification using Machine Learning,” 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), Dehradun, India, pp. 1-5, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Nrusimhadri Sai Deepak et al., “Analyze and Forecast the Cyber Attack Detection Process using Machine Learning Techniques,” 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, pp. 1732-1738, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Zohre Nasiri Zarandi, and Iman Sharifi, “Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods,” 2020 11th International Conference on Information and Knowledge Technology (IKT), Tehran, Iran, pp. 107-112, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Soe Kalayar Naing, and Tin Thein Thwel, “A Study of DDOS Attack Classification Using Machine Learning Classifiers,” 2023 IEEE Conference on Computer Applications (ICCA), Yangon, Myanmar, pp. 108-112, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] S. Santhosh, M. Sambath, and J. Thangakumar, “Detection of DDOS Attack Using Machine Learning Models,” 2023 International Conference on Networking and Communications (ICNWC), Chennai, India, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Sakshi Vattikuti et al., “DDoS Attack Detection and Mitigation using Anomaly Detection and Machine Learning Models,” 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, India, pp. 1-6, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Ismail et al., “A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks,” IEEE Access, vol. 10, pp. 21443-21454, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Asmaa A. Elsaeidy, Abbas Jamalipour, and Kumudu S. Munasinghe, “A Hybrid Deep Learning Approach for Replay and DDoS Attack Detection in a Smart City,” IEEE Access, vol. 9, pp. 154864-154875, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Jieren Cheng et al., “Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning,” Security and Communication Networks, vol. 2018, no. 1, pp. 1-19, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[12] S. Balasubramaniam et al., “Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing,” International Journal of Intelligent Systems, vol. 2023, no. 1, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] S. Sumathi, R. Rajesh, and Sangsoon Lim, “Recurrent and Deep Learning Neural Network Models for DDoS Attack Detection,” Journal of Sensors, vol. 2022, no. 1, pp. 1-21, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Lu Zhou et al., “Low-Rate DDoS Attack Detection Using Expectation of Packet Size,” Security and Communication Networks, vol. 2017, no. 1, pp. 1-14, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Xiang Yu et al., “Web DDoS Attack Detection Method Based on Semisupervised Learning,” Security and Communication Networks, vol. 2021, no. 1, pp. 1-10, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Bin Jiae et al., “A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning,” Journal of Electrical and Computer Engineering, vol. 2017, no. 1, pp. 1-9, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Li Xinlong, and Chen Zhibin, “DDoS Attack Detection by Hybrid Deep Learning Methodologies,” Security and Communication Networks, vol. 2022, no. 1, pp. 1-7, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Hoda El Merabet, and Abderrahmane Hajraoui, “A Survey of Malware Detection Techniques based on Machine Learning,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 10, no. 1, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Halit Bakır, and Rezan Bakır, “DroidEncoder: Malware Detection Using Auto-Encoder Based Feature Extractor and Machine Learning Algorithms,” Computers and Electrical Engineering, vol. 110, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Parnika Bhat, Sunny Behal, and Kamlesh Dutta, “A System Call-Based Android Malware Detection Approach with Homogeneous & Heterogeneous Ensemble Machine Learning,” Computers & Security, vol. 130, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Hani AlOmari, Qussai M. Yaseen, and Mohammed Azmi Al-Betar, “A Comparative Analysis of Machine Learning Algorithms for Android Malware Detection,” Procedia Computer Science, vol. 220, pp. 763-768, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Jagsir Singh, and Jaswinder Singh, “A Survey on Machine Learning-Based Malware Detection in Executable Files,” Journal of Systems Architecture, vol. 112, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Ahmed S. Shatnawi, Qussai Yassen, and Abdulrahman Yateem, “An Android Malware Detection Approach Based on Static Feature Analysis Using Machine Learning Algorithms,” Procedia Computer Science, vol. 201, pp. 653-658, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Ahmed Abusnaina et al., “DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 3432-3447, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Durmus Ozkan Sahın, Sedat Akleylek, and Erdal Kilic, “LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers,” IEEE Access, vol. 10, pp. 14246-14259, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Hayam Alamro et al., “Automated Android Malware Detection Using Optimal Ensemble Learning Approach for Cybersecurity,” IEEE Access, vol. 11, pp. 72509-72517, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Zhiyang Fang et al., “Feature Selection for Malware Detection Based on Reinforcement Learning,” IEEE Access, vol. 7, pp. 176177-176187, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Huijuan Zhu et al., “A Hybrid Deep Network Framework for Android Malware Detection,” IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 12, pp. 5558-5570, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Amin Azmoode, Ali Dehghantanha, and Kim-Kwang Raymond Choo, “Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning,” IEEE Transactions on Sustainable Computing, vol. 4, no. 1, pp. 88-95, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[30] TaeGuen Kim et al., “A Multimodal Deep Learning Method for Android Malware Detection Using Various Features,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, pp. 773-788, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Chin-Wei Tie et al., “Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features,” Digital Threats: Research and Practice, vol. 1, no. 5, pp. 19, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Jan Lansk et al., “Deep Learning-Based Intrusion Detection Systems: A Systematic Review,” IEEE Access, vol. 9, pp. 101574-101599, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Iftikhar Ahmad et al., “Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection,” IEEE Access, vol. 6, pp. 33789-33795, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Gustavo De Carvalho Bertoli et al., “An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System,” IEEE Access, vol. 9, pp. 106790-106805, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Azidine Guezzaz et al., “Mathematical Validation of Proposed Machine Learning Classifier for Heterogeneous Traffic and Anomaly Detection,” Big Data Mining and Analytics, vol. 4, no. 1, pp. 18-24, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Li Zou et al., “HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering,” IEEE Access, vol. 11, pp. 21404-21416, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Abdullah Alsaeedi, and Mohammad Zubair Khan, “Performance Analysis of Network Intrusion Detection System using Machine Learning,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 10, no. 12, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Abdallah R. Gad et al., “A Distributed Intrusion Detection System using Machine Learning for IoT based on ToN-IoT Dataset” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 13, no. 6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Anil Vitthalrao Turukmane, and Ramkumar Devendiran, “M-MultiSVM: An Efficient Feature Selection Assisted Network Intrusion Detection System using Machine Learning,” Computers & Security, vol. 137, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Md. Alamgir Hossain, and Md. Saiful Islam, “Ensuring Network Security with a Robust Intrusion Detection System Using Ensemble-Based Machine Learning,” Array, vol. 19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Ricardo Misael Ayala Molina, “On Ransomware Family Attribution Using Pre-Attack Paranoia Activities,” IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 19-36, 2022.
[CrossRef] [Google Scholar] [Publisher Link]