A comparison of several intrusion detection methods using the NSL-KDD dataset
DOI:
https://doi.org/10.31185/wjcms.251Keywords:
Cyber Security, intrusion detection system, Deep Learning, Machine learningAbstract
The increasing significance of cybersecurity underscores the critical necessity of addressing evolving methods of hackers. This research investigates the way to classify and predict cyber-attacks on the NSL-KDD dataset using intrusion detection methods the investigation contrasts the capabilities of various algorithms, including RNN, MLP, CNN-LSTM, and ANN, in recognizing attacks. The results indicate that both MLP and RNN have the greatest efficiency and effectiveness for different time frames. these findings demonstrate the necessity of Constant evaluation and enhancement of intrusion detection systems in order to remain aware of the dynamic nature of the cyber threat landscape. Addressing cybersecurity issues necessitates a comprehensive approach that combines computational enhancements, human talent, organizational policies, and regulatory frameworks in order to create a powerful and stable cybersecurity system.
Downloads
References
Morgan, S. "Cybercrime Magazine," Cyberwarfare in The C-Suite". 2020. [Online].vailable: https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/
Vinayakumar R., Alazab M., Soman K.P., Poornachandran P., Al-Nemrat A., and Venkatraman S., "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, vol. 7, pp. 41525–41550, 2019, doi: 10.1109/ACCESS.2019.2895334.
Tavallaee M., Bagheri E., Lu W., and Ghorbani A.A., "A detailed analysis of the KDD CUP 99 data set," IEEE Symp. Comput. Intell. Secur. Def. Appl., pp. 1–6, 2009. doi: 10.1109/CISDA.2009.5356528.
Hajisalem V., and Babaie S., "A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection," Comput. Networks, vol. 136, pp. 37–50, 2018. doi: 10.1016/j.comnet.2018.02.028.
Liu H., and Lang B., "Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey," Appl. Sci., vol. 9, p. 4396, 2019. doi: 10.3390/app9204396.
Hindy H. et al., "A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems," IEEE Access, vol. 8, pp. 104650–104675, 2020. doi: 10.1109/ACCESS.2020.3000179.
Saranya T., Sridevi S., Deisy C., Chung T.D., and Khan M.K.A., "Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review," Procedia Comput. Sci., vol. 171, pp. 1251–1260, 2020. doi: 10.1016/j.procs.2020.04.133.
Rashid A., Siddique M. J., and Ahmed S. M., "Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System," 1rd International Conference on Advancements in Computational Sciences (ICACS). pp. 1–9, 2020. doi: 10.1109/ICACS47775.2020.9055946.
Tang T. A., Mhamdi L., McLernon D., Zaidi S. A. R., and Ghogho M., "Deep learning approach for Network Intrusion Detection in Software Defined Networking," International Conference on Wireless Networks and Mobile Communications (WINCOM). pp. 258–263, 2016. doi: 10.1109/WINCOM.2016.7777224.
Shone N., Ngoc T. N., Phai V. D., and Shi Q., "A Deep Learning Approach to Network Intrusion Detection," IEEE Trans. Emerg. Top. Comput. Intell., vol. 2, no. 1, pp. 41–50, 2018, doi: 10.1109/TETCI.2017.2772792.
Wu K., Chen Z., and Li W., "A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks," IEEE Access, vol. 6, pp. 50850–50859, 2018, doi: 10.1109/ACCESS.2018.2868993.
Ahmim A., Derdour M., and Ferrag M. A., "An intrusion detection system based on combining probability predictions of a tree of classifiers," Int. J. Commun. Syst., vol. 13, no. 9, 2938, doi: 10.1002/dac.3547.
Al-Qatf M., Lasheng Y., Al-Habib M., and Al-Sabahi K., "Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection," IEEE Access, vol. 6, pp. 52841–52856, 2018, doi: 10.1109/ACCESS.2018.2869577.
Tang T.A., Mhamdi L., McLernon D., Zaidi S.A.R., and Ghogho M., "Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks," in 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), 2018, pp. 202–206. doi: 10.1109/NETSOFT.2018.8460090.
Kasongo S.M. and Sun Y., "A Deep Learning Method with Filter Based Feature Engineering for Wireless Intrusion Detection System," IEEE Access, vol. 7, pp. 18597–38607, 2019, doi: 10.1109/ACCESS.2019.2905633.
Gao X., Shan C., Hu C., and Liu Z., "An Adaptive Ensemble Machine Learning Model for Intrusion Detection," IEEE Access, vol. 7, pp. 82512–82521, 2019, doi: 10.1109/ACCESS.2019.2923640.
Yang Y., Zheng K., Wu C., and Yang Y., "Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network," Sensors, vol. 39, no. 33, 2019, doi: 10.3390/s19112528.
Papamartzivanos D., Gómez Mármol F., and Kambourakis G., "Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems," IEEE Access, vol. 7, pp. 31546–13560, 2019, doi: 10.1109/ACCESS.2019.2893871.
Ieracitano C., Adeel A., Morabito F.C., and Hussain A., "A novel statistical analysis and autoencoder driven intelligent intrusion detection approach," Neurocomputing, vol. 187, pp. 53–62, 2020, doi: 10.1016/j.neucom.2019.11.016.
Haggag M., Tantawy M.M., and El-Soudani M.M.S., "Implementing a Deep Learning Model for Intrusion Detection on Apache Spark Platform," IEEE Access, vol. 8, pp. 361669–163672, 2020, doi: 10.1109/ACCESS.2020.3019931.
Liu L., Wang P., Lin J., and Liu L., "Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning," IEEE Access, vol. 9, pp. 7559–7563, 2021, doi: 10.1109/ACCESS.2020.3048198.
Xu W., Jang-Jaccard J., Singh A., Wei Y., and Sabrina F., "Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset," IEEE Access, vol. 9, pp. 140136–140146, 2021, doi: 10.1109/ACCESS.2021.3116612.
Mashuqur A.K.M., Mazumder R., Kamruzzaman N.M., Akter N., Arbe N., and Rahman M.M., "Network Intrusion Detection Using Hybrid Machine Learning Model," in International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), 2021, pp. 1–8. doi: 10.1109/ICAECT49130.2021.9392483.
Alotaibi S.D. et al., "Deep Neural Network-Based Intrusion Detection System through PCA," Math. Probl. Eng., vol. 2922, p. 6488571, 2022, doi: 10.1155/2022/6488571.
Wu T., Fan H., Zhu H., You C., Zhou H., and Huang X., "Intrusion detection system combined enhanced random forest with SMOTE algorithm," EURASIP J. Adv. Signal Process., vol. 2922, no. 3, p. 39, 2022, doi: 10.1186/s13634-022-00871-6.
Cui J., Zong L., Xie J., and Tang M., "A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data," Appl. Intell., 2022, doi: 10.1007/s10489-022-03361-2.
Thirimanne S. P., Jayawardana L., Yasakethu L., Liyanaarachchi P., and Hewage C., "Deep Neural Network Based Real-Time Intrusion Detection System," SN Comput. Sci., vol. 1, no. 2, p. 145, 2022, doi: 10.1007/s42979-022-01031-1.
"KDD Cup 3999." [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup98/kddcup98.html
Amiri F., Yousefi M.M.R., Lucas C., Shakery A., and Yazdani N., "Mutual information-based feature selection for intrusion detection systems," J. Netw. Comput. Appl., vol. 14, no. 4, pp. 3384–1199, 2011, doi: 10.1016/j.jnca.2011.01.002.
Goodfellow, I., Bengio, Y., & Courville, A. (2016). "Deep Learning". MIT Press.
Xin Y. et al., "Machine Learning and Deep Learning Methods for Cybersecurity," IEEE Access, vol. 6, pp. 15165–35381, 2018, doi: 10.1109/ACCESS.2018.2836950.
Aledhari M., Razzak R., and Parizi R.M., "Machine learning for network application security: Empirical evaluation and optimization," Comput. Electr. Eng., vol. 93, 2923, doi: 10.1016/j.compeleceng.2021.107052.
Jinhai, Song., Zhiyong, Zhang., B., Gupta. (2023). A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet. International Journal of Information Security and Privacy, doi: 10.4018/ijisp.325232
B. Mohammed, E. K. Gbashi, (2021), "Intrusion Detection System for NSL-KDD dataset based on deep learning and recursive feature elimination," Engineering and Technology Journal, Vol. 39, No. 07, pp. 1069-1079, 2021. DOI: https://doi.org/10.30684/etj.v39i7.1695
(2022). Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset. doi: 10.48550/arxiv.2208.09711
Maseno E.M., Wang Z., and Xing H., "A Systematic Review on Hybrid Intrusion Detection System," Secur. Commun. Networks, vol. 2022, p. 9663052, 2022, doi: 10.1155/2022/9663052
Downloads
Published
Issue
Section
License
Copyright (c) 2024 hazem salim abdullah

This work is licensed under a Creative Commons Attribution 4.0 International License.