Cascaded intrusion detection system using machine learning

Cybercrime is becoming an increasing concern these days. In response to the growing cyberthreat, various intrusion detection systems have been developed and proposed to detect anomalies. However, most detection systems suffer from some common issues, such as a high number of false positives that cau...

Full description

Saved in:
Bibliographic Details
Main Authors: Md. Khabir Uddin Ahamed, Abdul Karim
Format: Article
Language:English
Published: Elsevier 2025-12-01
Series:Systems and Soft Computing
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S277294192400111X
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841553716455407616
author Md. Khabir Uddin Ahamed
Abdul Karim
author_facet Md. Khabir Uddin Ahamed
Abdul Karim
author_sort Md. Khabir Uddin Ahamed
collection DOAJ
description Cybercrime is becoming an increasing concern these days. In response to the growing cyberthreat, various intrusion detection systems have been developed and proposed to detect anomalies. However, most detection systems suffer from some common issues, such as a high number of false positives that cause regular behaviors to be detected as intrusions, as well as the system’s excessive complexity. Many single classifier models have accuracy issues since they are unable to detect certain anomalies caused by the attack’s polymorphic and zero-day behavior. The signature-based intrusion detection system (SIDS) is unable to identify zero-day intrusions. On the other side, the anomaly-based intrusion detection system (AIDS) generates a significant number of false-positive alarms. In this research, a cascaded intrusion detection system (CIDS) is proposed by combining the one-class support vector machine (OC-SVM)-based AIDS and the decision tree-based SIDS. OC-SVM is used in conjunction with the newly built Distance-Based Intrusion Classification System (DICS). SIDS that use decision trees can discover and classify anomalies. Because OC-SVM is a binary classifier, the intrusion type is determined by DICS. The suggested method aims to detect both popular and well-known zero-day attacks, as well as their type. The CIDS is evaluated using publicly available benchmark datasets, such as the Knowledge Discovery in Databases (KDD) Cup 1999 and the NSL-KDD dataset. The results of the proposed study show that CIDS outperformed both traditional SIDS and AIDS in terms of performance. Both anomalies and their types are detected with high accuracy.
format Article
id doaj-art-fa250ce39da44333bc9ea61acfe00b7b
institution Kabale University
issn 2772-9419
language English
publishDate 2025-12-01
publisher Elsevier
record_format Article
series Systems and Soft Computing
spelling doaj-art-fa250ce39da44333bc9ea61acfe00b7b2025-01-09T06:17:04ZengElsevierSystems and Soft Computing2772-94192025-12-017200182Cascaded intrusion detection system using machine learningMd. Khabir Uddin Ahamed0Abdul Karim1Department of Computer Science and Engineering, Bangamata Sheikh Foilatunnesa Mujib Science and Technology University, Jamalpur, Bangladesh; Corresponding author.Senior Officer-IT (APg), Janata Bank PLC, Dhaka, BangladeshCybercrime is becoming an increasing concern these days. In response to the growing cyberthreat, various intrusion detection systems have been developed and proposed to detect anomalies. However, most detection systems suffer from some common issues, such as a high number of false positives that cause regular behaviors to be detected as intrusions, as well as the system’s excessive complexity. Many single classifier models have accuracy issues since they are unable to detect certain anomalies caused by the attack’s polymorphic and zero-day behavior. The signature-based intrusion detection system (SIDS) is unable to identify zero-day intrusions. On the other side, the anomaly-based intrusion detection system (AIDS) generates a significant number of false-positive alarms. In this research, a cascaded intrusion detection system (CIDS) is proposed by combining the one-class support vector machine (OC-SVM)-based AIDS and the decision tree-based SIDS. OC-SVM is used in conjunction with the newly built Distance-Based Intrusion Classification System (DICS). SIDS that use decision trees can discover and classify anomalies. Because OC-SVM is a binary classifier, the intrusion type is determined by DICS. The suggested method aims to detect both popular and well-known zero-day attacks, as well as their type. The CIDS is evaluated using publicly available benchmark datasets, such as the Knowledge Discovery in Databases (KDD) Cup 1999 and the NSL-KDD dataset. The results of the proposed study show that CIDS outperformed both traditional SIDS and AIDS in terms of performance. Both anomalies and their types are detected with high accuracy.http://www.sciencedirect.com/science/article/pii/S277294192400111XCyber-crimeIntrusion detection systemMachine learningSupport vector machineZero-day attacks
spellingShingle Md. Khabir Uddin Ahamed
Abdul Karim
Cascaded intrusion detection system using machine learning
Systems and Soft Computing
Cyber-crime
Intrusion detection system
Machine learning
Support vector machine
Zero-day attacks
title Cascaded intrusion detection system using machine learning
title_full Cascaded intrusion detection system using machine learning
title_fullStr Cascaded intrusion detection system using machine learning
title_full_unstemmed Cascaded intrusion detection system using machine learning
title_short Cascaded intrusion detection system using machine learning
title_sort cascaded intrusion detection system using machine learning
topic Cyber-crime
Intrusion detection system
Machine learning
Support vector machine
Zero-day attacks
url http://www.sciencedirect.com/science/article/pii/S277294192400111X
work_keys_str_mv AT mdkhabiruddinahamed cascadedintrusiondetectionsystemusingmachinelearning
AT abdulkarim cascadedintrusiondetectionsystemusingmachinelearning