Navigating Digital Harmony through Human Centric Networks and Machine Learning in Network Traffic Classification

Authors

  • Ajit Kumar Shrivastava Department of Computer Science & Engineering, Sagar Institute of Science, Technology & Research, Bhopal, (M.P.) India
  • Arvind Kumar Jain Department of Computer Science & Engineering - Internet of Things, Sagar Institute of Science, Technology & Engineering, Bhopal, (M.P.) India
  • Abhishek Kumar Dubey Department of Computer Science & Engineering - Internet of Things, Sagar Institute of Science, Technology & Engineering, Bhopal, (M.P.) India
  • Himanshu Yadav Department of Computer Science & Engineering, Sagar Institute of Science, Technology & Research, Bhopal, (M.P.) India
  • Namrata Shrivastava Department of Computer Science & Engineering, Sagar Institute of Science, Technology & Research, Bhopal, (M.P.) India
  • Priyanka Bhatele Department of Computer Science & Engineering - Artificial Intelligence and Machine Learning, Sagar Institute of Science, Technology & Engineering, Bhopal, (M.P.) India

Keywords:

Digital Symphony, Human-Centric Networks, Machine Learning Integration, User-Driven Traffic Classification, Adaptive Network Systems, Real-world Interaction Modeling

Abstract

In the intricate realm of modern communication networks, our journey unfolds as a narrative interwoven with human experiences. This paper delves into the essence of network traffic classification, not as a technical pursuit alone but as a voyage into the heart of digital interactions. From the meticulous preprocessing of data to the resonant extraction of user-centric attributes, our exploration transcends algorithms, embracing the human quotient. We embark on an odyssey through diverse machine learning techniques, not merely seeking accuracy but envisioning adaptive systems that intuitively align with the dynamic expectations of users. Our dataset mirrors the vibrant tapestry of real-world scenarios, each thread reflecting the nuances of video streaming, e-commerce transactions, and critical financial interactions. As we present the results, it is not just about precision and recall; it's a symphony of user satisfaction, system responsiveness, and the qualitative aspects that define seamless digital experiences. This discussion is not confined to algorithms but extends into the ethical dimensions, advocating for a digital ethos where trust, security, and equitable access intertwine. Our conclusion is not a terminus but an invitation to a continuing dialogue—a dialogue where technology and humanity dance in synchrony, paving the way for a future where network traffic classification is not just an algorithmic feat but a harmonious integration into the fabric of our interconnected digital lives.

References

[1]. M. S. Korium, M. Saber and P. H. J. Nardelli, "Intrusion detection system for cyberattacks in the Internet of Vehicles environment", Ad Hoc Networks, vol. 153, pp. 147-158, 3 November 2023 https://doi.org/10.1016/j.adhoc.2023.103330

[2]. F. J. Mora-Gimeno, H. Mora-Mora, B. Volckaert and A. Atrey, "Intrusion Detection System Based on Integrated System Calls Graph and Neural Networks," in IEEE Access, vol. 9, pp. 9822-9833, 2021 https://doi.org/10.1109/ACCESS.2021.3049249

[3]. N. O. Aljehane, H. A. Mengash and M. Assiri, "Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security", Alexandria Engineering Journal, vol. 86, pp. 415-424, 7 December 2023 https://doi.org/10.1016/j.aej.2023.11.078

[4]. Z. Jin, J. Zhou and C. Duan, "FL-IIDS: A novel federated learning-based incremental intrusion detection system", Future Generation Computer Systems, vol. 151, pp. 57-70, 18 September 2023 https://doi.org/10.1016/j.future.2023.09.019

[5]. Z. Sun, G. An and Y. Liu, "Optimized machine learning enabled intrusion detection 2 system for internet of medical things", Franklin Open, 22 November 2023 https://doi.org/10.1016/j.fraope.2023.100056

[6]. P. Sanju, "Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks", Journal of Engineering Research, vol. 1, pp. 778-789, 19 June 2023

[7]. S. Li, Y. Cao and N. Ahmad, "HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN", Expert Systems with Applications, vol. 128, pp. 47-57, 28 October 2023

[8]. T. R. Gadekallu, N. Kumar and P. K. R. Maddikunta, "Moth-Flame Optimization based ensemble classification for intrusion detection in intelligent transport system for smart cities", Microprocessors and Microsystems, vol. 156, pp. 781-789, 30 September 2023 https://doi.org/10.1016/j.micpro.2023.104935

[9]. S. Fraihat, S. Makhadmeh and A. Al-Redhaei, "Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm", Internet of Things, vol. 22, pp. 12-25, 16 May 2023 https://doi.org/10.1016/j.iot.2023.100819

[10]. L. Yang, J. Li, L. Yin, Z. Sun, Y. Zhao and Z. Li, "Real Time Intrusion Detection in Wireless Network: A Deep Learning-Based Intelligent Mechanism," in IEEE Access, vol. 8, pp. 170128-170139, 2020 https://doi.org/10.1109/ACCESS.2020.3019973

[11]. T. Gaber, J. B. Awotunde and W. Li, "Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks", Internet of Things, vol. 24, pp. 47-57, 29 October 2023 https://doi.org/10.1016/j.iot.2023.100977

[12]. J. Ribeiro, F. B. Saghezchi, G. Mantas, J. Rodriguez and R. A. Abd-Alhameed, "HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android," in IEEE Access, vol. 8, pp. 23154-23168, 2020 https://doi.org/10.1109/ACCESS.2020.2969626

[13]. X. Yuan, S. Han and F. Zhang, "A simple framework to enhance the adversarial robustness of deep learning based intrusion detection system", Computers & Security, vol. 137, pp. 45-55, 10 December 2023 https://doi.org/10.1016/j.cose.2023.103644

[14]. S. Layeghy, M. Baktashmotlagh and M. Portmann, "DI-NIDS: Domain invariant network intrusion detection system", Knowledge-Based Systems, vol. 273, pp. 1-6, 12 May 2023 https://doi.org/10.1016/j.knosys.2023.110626

[15]. X. Gao, Q. Wu, J. Cai and Q. Li, "A Fusional Intrusion Detection Method Based on the Hierarchical Filtering and Progressive Detection Model," in IEEE Access, vol. 11, pp. 131409-131417, 2023 https://doi.org/10.1109/ACCESS.2023.3335669

[17] M. Baich, T. Hamim and Y. Chemlal, "Machine Learning for IoT based networks intrusion detection: a comparative study", Procedia Computer Science, vol. 215, pp. 742- 751, 2022, doi: 10.1016/j.procs.2022.12.076. https://doi.org/10.1016/j.procs.2022.12.076

[16]. T. Wisanwanichthan and M. Thammawichai, "A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM," in IEEE Access, vol. 9, pp. 138432- 138450, 2021 https://doi.org/10.1109/ACCESS.2021.3118573

[17]. M. Baich, T. Hamim and Y. Chemlal, "Machine Learning for IoT based networks intrusion detection: a comparative study", Procedia Computer Science, vol. 215, pp. 742-751, 2022, doi: 10.1016/j.procs.2022.12.076. https://doi.org/10.1016/j.procs.2022.12.076

[18]. X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu and K. I. -K. Wang, "Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System," in IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9310-9319, 15 June15, 2022,

https://doi.org/10.1109/JIOT.2021.3130434

[19]. P. Sanju, "Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks", Journal of Engineering Research, vol. 11, no. 4, pp. 356-361, 19 June 2023,

https://doi.org/10.1016/j.jer.2023.100122

[20]. P. Mahadevappa, R. K. Murugesan and G. Alkawsi, "A secure edge computing model using machine learning and IDS to detect and isolate intruders", MethodsX, vol. 17, pp. 96-105, 13 February 2024, https://doi.org/10.1016/j.mex.2024.102597

[21]. S. Latif et al., "Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network," in IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6435-6444, Sept. 2022, https://doi.org/10.1109/TII.2021.3130248

[22]. R. Y. Aburasain, "Enhanced Black Widow Optimization with Hybrid Deep Learning Enabled Intrusion Detection in Internet of Things-Based Smart Farming," in IEEE Access, vol. 12, pp. 16621-16631, 2024, https://doi.org/10.1109/ACCESS.2024.3359043

[23]. S. A. Bakhsh, M. A. Khan and J. Ahmad, "Enhancing IoT network security through deep learning-powered Intrusion Detection System", Internet of Things, vol. 24, 13 September 2023, https://doi.org/10.1016/j.iot.2023.100936

[24]. Y. K. Saheed, A. I. Abiodun and R. Colomo-Palacios, "A machine learning-based intrusion detection for detecting internet of things network attacks", Alexandria Engineering Journal, vol. 61, no. 12, pp. 9395-9409, 28 March 2022, https://doi.org/10.1016/j.aej.2022.02.063

Downloads

Published

27-06-2024

Issue

Section

Articles

How to Cite

[1]
Ajit Kumar Shrivastava et al. 2024. Navigating Digital Harmony through Human Centric Networks and Machine Learning in Network Traffic Classification. International Journal of Innovations in Science, Engineering And Management. 3, 2 (Jun. 2024), 94–99.