Intrusion Detection Systems Based on RNN and GRU Models using CSE-CIC-IDS2018 Dataset in AWS Cloud
DOI:
https://doi.org/10.29304/jqcsm.2024.16.41780Keywords:
deep learning, Cloud Computing, GRU, RNN, CSE-CIC-IDS2018, intrusion detection systemAbstract
Globally, cloud computing (CC) is becoming a necessary technological advancement. This method is a breakthrough in collaborative services and data storage. Nevertheless, the switch to CC has increased security risks, and the networks and daily interactions we engage in depend on network security. An efficient intrusion detection system is essential as attackers create new attack types and network sizes continue to rise. IDS is dependent primarily on determining whether network packets are malicious or benign. Deep learning algorithms have proved to be effective in detecting intrusions compared to other machine learning methods. In this study, we created deep learning methods to recognize attacks using recurrent neural network (RNN) architecture, namely the GRU (Gated Recurrent Unit) architecture. We use these models to handle binary and multiclass classification on the updated cybersecurity CSE-CIC-IDS2018 dataset. The recommended approach offers superior intrusion detection performance regarding Recall, accuracy, and precision. The recommended procedure yielded accuracy and precision values of 99.92 and 99.685, respectively.
Downloads
References
Lata, S., & Singh, D. (2022). Intrusion detection system in cloud environment: Literature survey & future research directions. International Journal of Information Management Data Insights, 2(2), 100134.
Al-Nemrat, A., Soman, K. P., Poornachandran, P., Alazab, M., Vinayakumar, R., & Venkatraman, S. (2019). An intelligent intrusion detection system using deep learning. Access Ieee, 7, 41525-41550.3. Xu, C. Z., Ye, K., and Lin, P. (2019). a deep learning-based dynamic network anomaly detection system. 3.Pages 161–176 are included in the proceedings of Cloud Computing–CLOUD 2019: 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019. International Publishing Springer...
Wang, Y. C., Houng, Y. C., Chen, H. X., & Tseng, S. M. (2023). Network anomaly intrusion detection based on deep learning approach. Sensors, 23(4), 2171.
Mahdi, H. M. S., Hassan, N. F., & Abdul-Majeed, G. H. (2021). An improved chacha algorithm for securing data on iot devices. SN Appl Sci 3: 429
] Lama, A., and Intellectual, P. NETWORK-BASED Interruption Discovery Frameworks Utilizing AI ALGORITHMS.
MS, M. (2013). Proposed block cipher algorithm with cloud computing based on keys generator (Doctoral dissertation, MS Thesis, University of Technology, Iraq).
Farhan, R. I., Maolood, A. T., and Hassan, N. (2020). Execution investigation of stream put together goes after identification with respect to CSE-CIC-IDS2018 dataset utilizing profound learning. Indones. J. Electr. Eng. Comput. Sci, 20(3), 1413-1418.
Shone, N., Ngoc, T. N., Phai, V. D., and Shi, Q. (2018). A profound learning way to deal with network interruption discovery. IEEE exchanges on arising themes in computational knowledge, 2(1), 41-50.
Azeez, R. A., Abdul-Hussein, M. K., Mahdi, M. S., & ALRikabi, H. T. S. (2021). Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique. Periodicals of Engineering and Natural Sciences, 10(1), 178-187.
Chockwanich, N., and Visoottiviseth, V. (2019, February). Interruption identification by profound learning with tensorflow. In 2019 21st worldwide gathering on cutting edge correspondence innovation (ICACT) (pp. 654-659). IEEE.
Kasongo, S. M. (2023). A profound learning procedure for interruption identification framework utilizing an Intermittent Brain Organizations based system. PC Interchanges, 199, 113-125
Zhang, H., Zhang, B., Huang, L., Zhang, Z., and Huang, H. (2023). A proficient two-stage network interruption identification framework in the Web of Things. Data, 14(2), 77.
Laghrissi, F., Douzi, S., Douzi, K., and Hssina, B. (2021). Interruption discovery frameworks utilizing long transient memory (LSTM). Diary of Large Information, 8(1), 65.
Hizal, S., ÇAVUŞOĞLU, Ü., and AKGÜN, D. (2021, June). Another profound learning-based interruption identification framework for cloud security. In 2021 third Worldwide Congress on Human-PC Connection, Streamlining and Automated Applications (HORA) (pp. 1-4). IEEE.
Basnet, R. B., Shash, R., Johnson, C., Walgren, L., and Doleck, T. (2019). Towards Distinguishing and Grouping Organization Interruption Traffic Utilizing Profound Learning Systems. J. Web Serv. Inf. Secur., 9(4), 1-17.
Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access, 5, 21954-21961.
Shiri, F. M., Perumal, T., Mustapha, N., & Mohamed, R. (2023). A comprehensive overview and comparative analysis on deep learning models: CNN, RNN, LSTM, GRU. arXiv preprint arXiv:2305.17473.
Aljuaid, W. A. H., & Alshamrani, S. S. (2024). A deep learning approach for intrusion detection systems in cloud computing environments. Applied Sciences, 14(13), 5381.
Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150.
Pham, V., Seo, E., & Chung, T. M. (2020). Lightweight Convolutional Neural Network Based Intrusion Detection System. J. Commun., 15(11), 808-817.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Farah faiq kamel, Mohammed Salih Mahdi
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.