Navigating Digital Harmony through Human Centric Networks and Machine Learning in Network Traffic Classification
Keywords:
Digital Symphony, Human-Centric Networks, Machine Learning Integration, User-Driven Traffic Classification, Adaptive Network Systems, Real-world Interaction ModelingAbstract
In the intricate realm of modern communication networks, our journey unfolds as a narrative interwoven with human experiences. This paper delves into the essence of network traffic classification, not as a technical pursuit alone but as a voyage into the heart of digital interactions. From the meticulous preprocessing of data to the resonant extraction of user-centric attributes, our exploration transcends algorithms, embracing the human quotient. We embark on an odyssey through diverse machine learning techniques, not merely seeking accuracy but envisioning adaptive systems that intuitively align with the dynamic expectations of users. Our dataset mirrors the vibrant tapestry of real-world scenarios, each thread reflecting the nuances of video streaming, e-commerce transactions, and critical financial interactions. As we present the results, it is not just about precision and recall; it's a symphony of user satisfaction, system responsiveness, and the qualitative aspects that define seamless digital experiences. This discussion is not confined to algorithms but extends into the ethical dimensions, advocating for a digital ethos where trust, security, and equitable access intertwine. Our conclusion is not a terminus but an invitation to a continuing dialogue—a dialogue where technology and humanity dance in synchrony, paving the way for a future where network traffic classification is not just an algorithmic feat but a harmonious integration into the fabric of our interconnected digital lives.
References
[1]. M. S. Korium, M. Saber and P. H. J. Nardelli, "Intrusion detection system for cyberattacks in the Internet of Vehicles environment", Ad Hoc Networks, vol. 153, pp. 147-158, 3 November 2023 https://doi.org/10.1016/j.adhoc.2023.103330
[2]. F. J. Mora-Gimeno, H. Mora-Mora, B. Volckaert and A. Atrey, "Intrusion Detection System Based on Integrated System Calls Graph and Neural Networks," in IEEE Access, vol. 9, pp. 9822-9833, 2021 https://doi.org/10.1109/ACCESS.2021.3049249
[3]. N. O. Aljehane, H. A. Mengash and M. Assiri, "Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security", Alexandria Engineering Journal, vol. 86, pp. 415-424, 7 December 2023 https://doi.org/10.1016/j.aej.2023.11.078
[4]. Z. Jin, J. Zhou and C. Duan, "FL-IIDS: A novel federated learning-based incremental intrusion detection system", Future Generation Computer Systems, vol. 151, pp. 57-70, 18 September 2023 https://doi.org/10.1016/j.future.2023.09.019
[5]. Z. Sun, G. An and Y. Liu, "Optimized machine learning enabled intrusion detection 2 system for internet of medical things", Franklin Open, 22 November 2023 https://doi.org/10.1016/j.fraope.2023.100056
[6]. P. Sanju, "Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks", Journal of Engineering Research, vol. 1, pp. 778-789, 19 June 2023
[7]. S. Li, Y. Cao and N. Ahmad, "HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN", Expert Systems with Applications, vol. 128, pp. 47-57, 28 October 2023
[8]. T. R. Gadekallu, N. Kumar and P. K. R. Maddikunta, "Moth-Flame Optimization based ensemble classification for intrusion detection in intelligent transport system for smart cities", Microprocessors and Microsystems, vol. 156, pp. 781-789, 30 September 2023 https://doi.org/10.1016/j.micpro.2023.104935
[9]. S. Fraihat, S. Makhadmeh and A. Al-Redhaei, "Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm", Internet of Things, vol. 22, pp. 12-25, 16 May 2023 https://doi.org/10.1016/j.iot.2023.100819
[10]. L. Yang, J. Li, L. Yin, Z. Sun, Y. Zhao and Z. Li, "Real Time Intrusion Detection in Wireless Network: A Deep Learning-Based Intelligent Mechanism," in IEEE Access, vol. 8, pp. 170128-170139, 2020 https://doi.org/10.1109/ACCESS.2020.3019973
[11]. T. Gaber, J. B. Awotunde and W. Li, "Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks", Internet of Things, vol. 24, pp. 47-57, 29 October 2023 https://doi.org/10.1016/j.iot.2023.100977
[12]. J. Ribeiro, F. B. Saghezchi, G. Mantas, J. Rodriguez and R. A. Abd-Alhameed, "HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android," in IEEE Access, vol. 8, pp. 23154-23168, 2020 https://doi.org/10.1109/ACCESS.2020.2969626
[13]. X. Yuan, S. Han and F. Zhang, "A simple framework to enhance the adversarial robustness of deep learning based intrusion detection system", Computers & Security, vol. 137, pp. 45-55, 10 December 2023 https://doi.org/10.1016/j.cose.2023.103644
[14]. S. Layeghy, M. Baktashmotlagh and M. Portmann, "DI-NIDS: Domain invariant network intrusion detection system", Knowledge-Based Systems, vol. 273, pp. 1-6, 12 May 2023 https://doi.org/10.1016/j.knosys.2023.110626
[15]. X. Gao, Q. Wu, J. Cai and Q. Li, "A Fusional Intrusion Detection Method Based on the Hierarchical Filtering and Progressive Detection Model," in IEEE Access, vol. 11, pp. 131409-131417, 2023 https://doi.org/10.1109/ACCESS.2023.3335669
[17] M. Baich, T. Hamim and Y. Chemlal, "Machine Learning for IoT based networks intrusion detection: a comparative study", Procedia Computer Science, vol. 215, pp. 742- 751, 2022, doi: 10.1016/j.procs.2022.12.076. https://doi.org/10.1016/j.procs.2022.12.076
[16]. T. Wisanwanichthan and M. Thammawichai, "A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM," in IEEE Access, vol. 9, pp. 138432- 138450, 2021 https://doi.org/10.1109/ACCESS.2021.3118573
[17]. M. Baich, T. Hamim and Y. Chemlal, "Machine Learning for IoT based networks intrusion detection: a comparative study", Procedia Computer Science, vol. 215, pp. 742-751, 2022, doi: 10.1016/j.procs.2022.12.076. https://doi.org/10.1016/j.procs.2022.12.076
[18]. X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu and K. I. -K. Wang, "Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System," in IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9310-9319, 15 June15, 2022,
https://doi.org/10.1109/JIOT.2021.3130434
[19]. P. Sanju, "Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks", Journal of Engineering Research, vol. 11, no. 4, pp. 356-361, 19 June 2023,
https://doi.org/10.1016/j.jer.2023.100122
[20]. P. Mahadevappa, R. K. Murugesan and G. Alkawsi, "A secure edge computing model using machine learning and IDS to detect and isolate intruders", MethodsX, vol. 17, pp. 96-105, 13 February 2024, https://doi.org/10.1016/j.mex.2024.102597
[21]. S. Latif et al., "Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network," in IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6435-6444, Sept. 2022, https://doi.org/10.1109/TII.2021.3130248
[22]. R. Y. Aburasain, "Enhanced Black Widow Optimization with Hybrid Deep Learning Enabled Intrusion Detection in Internet of Things-Based Smart Farming," in IEEE Access, vol. 12, pp. 16621-16631, 2024, https://doi.org/10.1109/ACCESS.2024.3359043
[23]. S. A. Bakhsh, M. A. Khan and J. Ahmad, "Enhancing IoT network security through deep learning-powered Intrusion Detection System", Internet of Things, vol. 24, 13 September 2023, https://doi.org/10.1016/j.iot.2023.100936
[24]. Y. K. Saheed, A. I. Abiodun and R. Colomo-Palacios, "A machine learning-based intrusion detection for detecting internet of things network attacks", Alexandria Engineering Journal, vol. 61, no. 12, pp. 9395-9409, 28 March 2022, https://doi.org/10.1016/j.aej.2022.02.063
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Ajit Kumar Shrivastava, Arvind Kumar Jain, Abhishek Kumar Dubey, Himanshu Yadav, Namrata Shrivastava, Priyanka Bhatele

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.