Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization

Authors

  • murtadha ali Iraqi Ministry of Education,

DOI:

https://doi.org/10.31185/wjcms.264

Keywords:

Cybersecurity measures, Intrusion Detection Systems (IDS), Grey Wolf Optimization (GWO) algorithm, (RNN-LSTM), Optimization

Abstract

While this dependence on interconnected computer networks and the web requires robust cybersecurity. Cyber threats have been met with solutions like Intrusion Detection Systems (IDS). IDS are commonly rule-based, and very often use either signature-based or heuristic approaches to detect intrusions. Therefore, for such we recommend an IDS that merges the Grey Wolf Optimization (GWO) algorithm and Recurrent Neural Networks with Long Short-Term Memory (RNN-LSTM). RNN-LSTM to Handle Dynamic Network data, but not provided enough complain details in model training. Based on the behavior of grey wolf, an optimization technique GWO is implemented for intrusion detection to enhance accuracy and minimize false alarm in RNN-LSTM. Preprocess and segment network data with creating RNN-LSTM model for considering the dependence of our dataset Our approach improves the IDS performance by optimizing hyperparameters such as hidden layers, units, learning rates using GWO. The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate.

The research advances IDSs, addressing the limitations of traditional systems, and underscores the potential of AI and optimization in complex network security. This study demonstrates the promise of RNN-LSTM and GWO for creating robust, adaptive intrusion detection systems in intricate network environments.

Downloads

Download data is not yet available.

References

B. Ray and R. La, "Deep Learning-Based Intrusion Detection Systems: A Survey," IEEE Access, vol. 9, pp. 73568-73584, 2021.

S. Mirjalili and A. Lewis, "The Grey Wolf Optimizer," Advances in Engineering Software, vol. 69, pp. 46-61, 2014.

J. Brownlee, "Time Series Forecasting with Recurrent Neural Networks," Machine Learning Mastery, 2019. [Online]. Available: https://machinelearningmastery.com/time-series-forecasting-recurrent-neural-networks-python-tensorflow-keras/. [Accessed: 06-Jul-2024].

M. Javaheripi, S. Mirjalili, and A. Lewis, "A New Grey Wolf Optimizer for Optimization Tasks," Neural Computing and Applications, vol. 31, no. 3, pp. 1231-1254, 2019.

S. Alsudani and M. N. Saeea, "Enhancing Thyroid Disease Diagnosis through Emperor Penguin Optimization Algorithm," Wasit Journal for Pure Sciences, vol. 2, no. 4, Dec. 2023.

S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey wolf optimizer," Advances in Engineering Software, vol. 69, pp. 46-61, 2014.

A. H. Hussien and M. K. Abbass, "Grey Wolf Optimizer: Review and Applications," Expert Systems with Applications, vol. 127, pp. 27-49, 2019.

A. Al-Mahameed, O. A. Alomari, A. M. Alkhayyat, and A. Mahmood, "Grey Wolf Optimizer for Feature Selection in Network Intrusion Detection Systems," Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 2, pp. 583-592, 2019.

X. Lu, M. Wang, M. Zhang, Y. Shen, and L. Li, "Intrusion Detection Method Based on Improved Grey Wolf Optimization Algorithm and LSTM," IEEE Access, vol. 7, pp. 160913-160923, 2019.

M. Mirjalili et al., "Grey Wolf Optimizer," Advances in Engineering Software, 2014.

W. Lee et al., "An Intrusion Detection System Using Long Short-Term Memory with Feature Learning," IEEE Access, 2018.

S. Patel et al., "Hybrid LSTM-PSO for Anomaly-Based Intrusion Detection System," in Proceedings of the 2020 IEEE 7th International Conference on Industrial Engineering and Applications (ICIEA), 2020.

M. F. Monwar et al., "A Novel Approach for Intrusion Detection in Network Traffic Using Deep Neural Networks," Computers & Security, 2020.

S. Choudhary and N. Kesswani, "Analysis of KDD-Cup’99, NSL-KDD, and UNSW-NB15 Datasets using Deep Learning in IoT," Procedia Computer Science, vol. 167, pp. 1561-1573, 2020.

S. Alsudani, H. Nasrawi, M. Shattawi, and A. Ghazikhani, "Enhancing Spam Detection: A Crow-Optimized FFNN with LSTM for Email Security," Wasit Journal of Computer and Mathematics Science, vol. 3, no. 1, pp. 1-15, Mar. 2024.

K. Yadav and A. Yadav, "Intrusion detection system using a long short-term memory network," Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 3, pp. 953-960, 2020.

X. Wang and S. Ha, "A novel intrusion detection model based on LDA-RNN for industrial control systems," IEEE Access, vol. 8, pp. 53403-53413, 2020.

Y. Zhu et al., "Intrusion detection system using LSTM-based feature extraction and linear discriminant analysis," IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10791-10800, 2021.

S. W. A. Alsudani and A. Ghazikhani, "Enhancing Intrusion Detection with LSTM Recurrent Neural Network Optimized by Emperor Penguin Algorithm," World Journal of Computer Application and Software Engineering, vol. 2, no. 3, 2023. [Online]. Available: https://doi.org/10.31185/wjcms.166. [Accessed: 06-Jul-2024].

A. T. Assy, Y. Mostafa, A. A. El-khaleq, and M. Mashaly, "Anomaly-Based Intrusion Detection System using One-Dimensional Convolutional Neural Network," Procedia Computer Science, vol. 220, pp. 78-85, 2023.

Downloads

Published

2024-12-30

Issue

Section

Computer

How to Cite

[1]
murtadha ali, “Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization”, WJCMS, vol. 3, no. 4, pp. 1–14, Dec. 2024, doi: 10.31185/wjcms.264.