IDEAS home Printed from https://ideas.repec.org/a/igg/jdsst0/v15y2023i1p1-16.html
   My bibliography  Save this article

An Efficient Method to Decide the Malicious Traffic: A Voting-Based Efficient Method

Author

Listed:
  • Ajay Kumar

    (Bharati Vidyapeeth (Deemed), Institute of Management and Research, New Delhi, India)

  • Jitendra Singh

    (PGDAV College, University of Delhi, India)

  • Vikas Kumar

    (Central University of Haryana, India)

  • Saurabh Shrivastava

    (Bundelkhand University, Jhansi, India)

Abstract

To address the high rate of false alarms, this article proposed a voting-based method to efficiently predict intrusions in real time. To carry out this study, an intrusion detection dataset from UNSW was downloaded and preprocessed before being used. Given the number of features at hand and the large size of the dataset, performance was poor while accuracy was low. This low prediction accuracy led to the generation of false alerts, consequently, legitimate alerts used to pass without an action assuming them as false. To deal with large size and false alarms, the proposed voting-based feature reduction approach proved to be highly beneficial in reducing the dataset size by selecting only the features secured majority votes. Outcome collected prior to and following the application of the proposed model were compared. The findings reveal that the proposed approach required less time to predict, at the same time predicted accuracy was higher. The proposed approach will be extremely effective at detecting intrusions in real-time environments and mitigating the cyber-attacks.

Suggested Citation

  • Ajay Kumar & Jitendra Singh & Vikas Kumar & Saurabh Shrivastava, 2023. "An Efficient Method to Decide the Malicious Traffic: A Voting-Based Efficient Method," International Journal of Decision Support System Technology (IJDSST), IGI Global, vol. 15(1), pages 1-16, January.
  • Handle: RePEc:igg:jdsst0:v:15:y:2023:i:1:p:1-16
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJDSST.323191
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    2. Cao, Minhao & Guo, Jianjun & Xiao, Hui & Wu, Liang, 2022. "Reliability analysis and optimal generator allocation and protection strategy of a non-repairable power grid system," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    3. Babaei, Mohsen & Rashidi-baqhi, Amin, 2022. "Universal generating function -based narrow reliability bounds to evaluate reliability of project completion time," Reliability Engineering and System Safety, Elsevier, vol. 218(PA).
    4. Qiu, Qingan & Cui, Lirong & Wu, Bei, 2020. "Dynamic mission abort policy for systems operating in a controllable environment with self-healing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 203(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jdsst0:v:15:y:2023:i:1:p:1-16. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.