<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Politeknik Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-9429</issn>
                                                                                            <publisher>
                    <publisher-name>Gazi Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.2339/politeknik.1386467</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Machine Learning (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Makine Öğrenme (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>Hibrit Sık Kullanılan Öğe Kümeleme ile Makine Öğrenmesi Tabanlı Ağ Sızma Tespiti</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Machine Learning based Network Intrusion Detection with Hybrid Frequent Item Set Mining</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0009-0113-9868</contrib-id>
                                                                <name>
                                    <surname>Firat</surname>
                                    <given-names>Murat</given-names>
                                </name>
                                                                    <aff>CANKIRI KARATEKIN UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-2897-3894</contrib-id>
                                                                <name>
                                    <surname>Bakal</surname>
                                    <given-names>Mehmet Gökhan</given-names>
                                </name>
                                                                    <aff>ABDULLAH GUL UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-6425-104X</contrib-id>
                                                                <name>
                                    <surname>Akbaş</surname>
                                    <given-names>Ayhan</given-names>
                                </name>
                                                                    <aff>University of Surrey</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20241002">
                    <day>10</day>
                    <month>02</month>
                    <year>2024</year>
                </pub-date>
                                        <volume>27</volume>
                                        <issue>5</issue>
                                        <fpage>1937</fpage>
                                        <lpage>1943</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20231106">
                        <day>11</day>
                        <month>06</month>
                        <year>2023</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20231225">
                        <day>12</day>
                        <month>25</month>
                        <year>2023</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1998, Politeknik Dergisi</copyright-statement>
                    <copyright-year>1998</copyright-year>
                    <copyright-holder>Politeknik Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>Bilgisayar ağlarının her geçen gün gelişmesi ve genişlemesi ve geliştirilen yazılımların çeşitliliği ile muhtemel saldırıların neden olabileceği zararlar tahminlerin ötesinde artmaktadır. Sızma Tespit Sistemleri (STS/IDS), sürekli artan ve çeşitlenen bu potansiyel saldırılara karşı etkili savunma araçlarından biridir. Asıl amaç, bu sistemleri çeşitli yapay zeka metotlarıyla eğiterek, sonraki saldırıları gerçek zamanlı olarak tespit etmek ve gerekli önlemleri alabilmektir. Bu çalışmada, hibrit bir modelde özellik seçiminde klasik özellik seçimi yöntemleri ve Sık Kullanılan Öğe Kümeleme kullanılmış ve elde edilen son özelliklerle, Lojistik Regresyon da dahil olmak üzere birçok makine öğrenmesi yöntemi kullanılarak ağ trafiği verilerinin normal ve saldırı için sınıflandırılması amaçlanmıştır. Yöntem, bu sınıflandırmayı yaparken özgün olarak 85 özelliği içeren bir veri setini karar vermede kullanmaktadır. Bu özellikler, ağ trafiğinin kaydedildiği bir PCAP dosyasından CICFlowMeter kullanılarak çıkarılmaktadır. Sonuçlar, çalışmada önerilen yöntemin veri setindeki 225000&#039;den fazla kaydı %97,68 başarı oranı ile sınıflandırdığını göstermektedir.</p></trans-abstract>
                                                                                                                                    <abstract><p>With the development and expansion of computer networks day by day and the diversity of software developed, the damage that possible attacks can cause is increasing beyond the predictions. Intrusion Detection Systems (STS/IDS) are one of the effective defense tools against these potential attacks that are constantly increasing and diversifying. The ultimate goal is to train these systems with various artificial intelligence methods, to detect subsequent attacks in real time and to take the necessary precautions. In this study, classical feature selection methods and Frequent Item Set Mining were used in feature selection in a hybrid model, and it was aimed to classify network traffic data for normal and attack by using many machine learning methods, including Logistic Regression, with the final features obtained. The method uses a data set originally containing 85 features to make a decision while making this classification. These attributes are extracted using CICFlowMeter from a PCAP file where network traffic is recorded. The results show that the proposed method in the study classifies more than 225000 records in the data set with a success rate of 97.68%.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Intrusion Detection Systems</kwd>
                                                    <kwd>  Frequent Item Set Mining</kwd>
                                                    <kwd>  Hybrid Feature Selection</kwd>
                                                    <kwd>  Machine Learning Methods</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Sızma Tespit Sistemleri</kwd>
                                                    <kwd>  Sık Kullanılan Öğe Kümeleme</kwd>
                                                    <kwd>  Hibrit Özellik Seçimi</kwd>
                                                    <kwd>  Makine Öğrenmesi</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] 	Awadh K. and Akbas A., “Intrusion detection model based on TF.IDF and C4.5 algorithms”, Politeknik Dergisi, 24:(4), 1691–1698, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Akbas A. and Buyrukoglu S., “Deep belief network based wireless sensor network connectivity analysis,” Balkan Journal of Electrical and Computer Engineering, 11: 262–266, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] 	Uyan O. G., Akbas A., and Gungor V. C., “Machine learning approaches for underwater sensor network parameter prediction,” Ad Hoc Networks, 144:103-139, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] 	Altunay H. C. and Albayrak Z., “Network intrusion detection approach based on convolutional neural network,” Avrupa Bilim ve Teknoloji Dergisi, 26: 22–29, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] 	Karaman M. S., Turan M., and Aydin M. A., “Yapay Sinir Ağı Kullanılarak Anomali Tabanlı Saldırı Tespit Modeli Uygulaması,” Avrupa Bilim ve Teknoloji Dergisi, Ejosat Ek Ozel Sayi (HORA): 10–17, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] 	Bakhshi T. and Ghita B., “Anomaly detection in encrypted internet traffic using hybrid deep learning,” Security and Communication Networks, 1–16, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] 	Wei S., Zhang Z., Li S., and Jiang P., “Calibrating network traffic with one-dimensional convolutional neural network with autoencoder and independent recurrent neural network for mobile malware detection,” Security and Communication Networks, (2021):1–10, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] 	Arslan R. S., “Fasttrafficanalyzer: An efficient method for intrusion detection systems to analyze network traffic,” Dicle Universitesi Muhendislik Fakultesi Muhendislik Dergisi, 12:(4) 565–572, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] 	Pehlivanoglu M. K., Remzi A., and Odabas D. E., “Iki seviyeli hibrit makine ogrenmesi yontemi ile saldiri tespiti,” Gazi Muhendislik Bilimleri Dergisi, 5:(3), 258–272, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] Ozekes S. and Karakoc E. N., “Makine ogrenmesi yontemleriyle anormal ag trafiginin tespit edilmesi,” Duzce universitesi Bilim ve Teknoloji Dergisi, 7:(1), 566–576, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] 	Tokyurek E., “Birliktelik kural cikarim algoritmalari kullanilarak market sepet analizi,” Master’s thesis, Bilecik Seyh Edebali Universitesi, Fen Bilimleri Enstitusu, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] 	Hidayanto B. C., Muhammad R. F., Kusumawardani R. P., and Syafaat A., “Network intrusion detection systems analysis using frequent item set mining algorithm fp-max and apriori,” Procedia Computer Science, 124:751–758, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] 	Moustafa N. and Slay J., “A hybrid feature selection for network intrusion detection systems: Central points,” arXiv preprint arXiv:1707.05505, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] 	Aung K. M. M. and Oo N. N., “Association rule pattern mining approaches network anomaly detection,” Ph.D. dissertation, Meral Portal, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15] 	Nalavade K. and Meshram B., “Mining association rules to evade network intrusion in network audit data,” International Journal of Advanced Computer Research, 4:(2), 560, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16] 	Sokhangoee Z. F. and Rezapour A., “A novel approach for spam detection based on association rule mining and genetic algorithm,” Computers &amp; Electrical Engineering, 97: 107655, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17] 	Cekmez U., Erdem Z., Yavuz A. G., Sahingoz O. K., and Buldu A., “Network anomaly detection with deep learning,” in 2018 26th Signal Processing and Communications Applications Conference (SIU). IEEE, 1–4, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18] 	IDS 2017 Datasets- canadian institute for cybersecurity, https://www.unb.ca/cic/datasets/ids-2017.html, (Accessed on 06/30/2023).</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19] 	Budak H., “Ozellik secim yontemleri ve yeni bir yaklasim,” Suleyman Demirel Universitesi Fen Bilimleri Enstitusu Dergisi, 22: 21–31, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20] Erkantarci B. and Bakal G., “An empirical study of sentiment analysis utilizing machine learning and deep learning algorithms,” Journal of Computational Social Science, 1–17, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21] 	Bakal G., Talari P., Kakani E. V., and Kavuluru R., “Exploiting semantic patterns over biomedical knowledge graphs for predicting treatment and causative relations,” Journal of biomedical informatics, 82:189–199, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22] 	Bakal G. and Kavuluru R., “Predicting treatment relations with semantic patterns over biomedical knowledge graphs,” in International Conference on Mining Intelligence and Knowledge Exploration. Springer, 586–596, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23] 	Pedregosa F., Varoquaux G., Gramfort A., Michel V., Thirion B., Grisel O., Blondel M., Prettenhofer P., Weiss R., Dubourg V., Vanderplas J., Passos A., Cournapeau D., Brucher M., Perrot M., and Duchesnay E., “Scikit-learn: Machine learning in Python,” Journal of Machine Learning Research, 12: 2825–2830, (2011).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
