Accurate Deep Neural Network Technique Based Network Intrusions Detection System

Authors

  • Batool Jameel Zaidan Foundation of Martyrs, Najaf Martyrs Directorate, Department of IT, Najaf/Iraq,

DOI:

https://doi.org/10.29304/jqcsm.2024.16.41781

Keywords:

DNN, intrusion detection, ML, F1-score, Accuracy, Precision, Recall

Abstract

 Because of the fast growing in network system, many categories of intrusion has been discovered that differs from current one and convention firewall and definite rules set and strategies are unable of recognizing this intrusion in real-time. Hence, this demand is requirements of real-times intrusions detection systems (RTs-IDS). The vital aim of this paper is to build an RT-IDSs proficient of classifying intrusion by analyzing the outbound and incoming networks information in real-times. The suggested method contains of deep neural networks (DNNs) trained by use 28 types of the NSL-KDDs datasets. Furthermore, it comprises the machine learning (MLs) pipelines with successive modules for category of data encode and features scaling, that is use before transmit the real-times information to the train DNNs models to create prediction. Composed of the train DNNs models, the MLs pipelines are introduced in the servers that can be access through representation state transfer applications program interface (RESTs API). The DNNs has displayed outstand test performance result realizing around 70% to 96% for f1-score, accuracy, precisions, and recalls. These works comprise a complete practical clarification regarding the implementations and functional of the whole systems. The suggested system usability and efficiency have been increased by its comfort of implementations and remotely accessing. In addition, the proposed model is extremely beneficial for rapidly detects the intrusion by analyze incoming and outbound networks traffics.

Downloads

Download data is not yet available.

References

Tavallaee M, Bagheri E, Lu W, Ghorbani AA. A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE symposium on computational intelligence in security and defense applications (CISDA), Ottawa, ON, Canada, July 2009. https:// doi.org/10.1109/CISDA.2009.5356528

Edosa Osa, et al., Design and implementation of a deep neural network approach for intrusion detection systems, e-Prime - Advances in Electrical Engineering, Electronics and Energy 7 (2024) 100434

Albara Awajan, A Novel Deep Learning-Based Intrusion Detection System for IoT Networks, Computers 2023, 12, 34

E. Osa, Cyber security terminologies and concepts.’ SMART-IEEE-ACity-ICTUCRACC-ICTU-foundations series book chapter on web of deceit - African multistakeholders’ perspective on online safety and associated correlates using multi-throng theoretical, Rev. Empir. Des. Approaches (2022) 231–236,

T. Mazhar, D.B. Talpur, T.A. Shloul, Y.Y. Ghadi, I. Haq, I. Ullah, K. Ouahada, H. Hamam, Analysis of IoT security challenges and its solutions using artificial intelligence, Brain Sci. 13 (2023) 683, https://doi.org/10.3390/brainsci13040683.

R.R. Devi, M. Abualkibash, Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets - a review paper, Int. J. Comput. Sci. Inf. Technol. 11 (3) (2019) (IJCSIT) VolJune.

A. Abuh, P.E. Orukpe, Development of an integrated campus security alerting and access control system, in: Chapter 7 in Emerging Trends in Engineering Research and Technology, 9, Book Publisher International, United Kingdom, 2020, pp. 57–67.

A. G´eron ‘Hands-on machine learning with scikit-learn, Keras, and TensorFlow’ O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472 (2019).

S. Sapre, P. Ahmadi, K. Islam ‘A robust comparison of the KDDCup99 and NSL-KDD IoT network intrusion detection datasets through various machine learning algorithms’ arXiv:1912.13204v1 (2019) [cs.LG] 31 Dec 2019.

P. Wei, Y. Li, Z. Zhang, T. Hu, Z. Li, D. Liu, An optimization method for intrusion detection classification model based on deep belief network, IEEE Access 7 (2019) 87593–8760 https://doi.org/10.1109/ACCESS.2019.2925828.

R. Vinayakumar, M. Alazab, K.P. Soman, P. Poornachandran, A. Al-Nemrat, S. Venkatraman, Deep learning approach for intelligent intrusion detection system, IEEE Access 7 (2019) 41525–41550, https://doi.org/10.1109/ ACCESS.2019.2895334.

E. Osa, O.E. Oghenevbaire, Comparative analysis of machine learning models in computer network intrusion detection, in: Proceedings of the IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON), 2022, pp. 1–5, https://doi.org/10.1109/ NIGERCON54645.2022.9803175.

W. Wang, M. Zhu, X. Zeng, X. Ye, Malware traffic classification using convolutional neural network for representation learning, Int. Conf. Inf. Network. (2017) 712–717.

A.K. Sahu, S. Sharma, M. Tanveer, R. Raja, Internet of things attack detection using hybrid deep learning model, Comput. Commun. 176 (2021) 146–154, 2021.

R.C. Aygun, A.G. Yavuz, Network anomaly detection with stochastically improved autoencoder based models, in: Proceedings of the 4th International Conference on Cyber Security and Cloud Computing, 2017, pp. 193–198.

M. Asad, M. Asim, T. Javed, M.O. Beg, H. Mujtaba, S. Abbas, Deep-detect: detection of distributed denial of service attacks using deep learning, Comput. J. 63 (2020) 983–994.

F. Meng, Y. Fu, F. Lou, Z. Chen, An effective network attack detection method based on kernel PCA and LSTMRNN, in: Proceedings of the International Conference on Computer Systems, Electronics and Control (ICCSEC), 2017.

I. Sharafaldin, A.H. Lashkari, A.A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, in: Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, 2018. January

H.A. Afolabi, A.A. Aburas, RTL-DL: a hybrid deep learning framework for DDOS attack detection in a big data environment, Int. J. Comput. Netw. Commun. Vol.14 (No.6) (2022) (IJCNC)November.

Faruqui, N.; Yousuf, M.A.; Whaiduzzaman, M.; Azad, A.; Barros, A.; Moni, M.A. LungNet: A hybrid deep-CNN model for lung cancer diagnosis using CT and wearable sensor-based medical IoT data. Comput. Biol. Med. 2021, 139, 104961.

Wójcicki, K.; Biega ´nska, M.; Paliwoda, B.; Górna, J. Internet of Things in Industry: Research Profiling, Application, Challenges and Opportunities—A Review. Energies 2022, 15, 1806.

Hasan, M.K.; Akhtaruzzaman, M.; Kabir, S.R.; Gadekallu, T.R.; Islam, S.; Magalingam, P.; Hassan, R.; Alazab, M.; Alazab, M.A. Evolution of industry and blockchain era: Monitoring price hike and corruption using BIoT for smart government and industry 4.0. IEEE Trans. Ind. Inform. 2022, 18, 9153–9161.

Zhao, Y.; Lian, Y. Event-driven Circuits and Systems: A Promising Low Power Technique for Intelligent Sensors in AIoT Era. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 3122–3128.

Soldatos, J.; Gusmeroli, S.; Malo, P.; Di Orio, G. Internet of things applications in future manufacturing. In Digitising the Industry Internet of Things Connecting the Physical, Digital and Virtual Worlds; River Publishers: Delft, The Netherlands, 2022; pp. 153–183.

Kshitiz Sharma, et al., Anomaly Detection in Network Traffic using Deep Learning, 2023 International Conference on Recent Advances in Science and Engineering Technology (ICRASET), DOI: 10.1109/ICRASET59632.2023.10419951

Rondon, L.P.; Babun, L.; Aris, A.; Akkaya, K.; Uluagac, A.S. Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective. Ad Hoc Netw. 2022, 125, 102728.

Nayak, J.; Meher, S.K.; Souri, A.; Naik, B.; Vimal, S. Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. J. Supercomput. 2022, 78, 14866–14891.

Husnain, M.; Hayat, K.; Cambiaso, E.; Fayyaz, U.U.; Mongelli, M.; Akram, H.; Ghazanfar Abbas, S.; Shah, G.A. Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System. Sensors 2022, 22, 567.

Zheng, Y.; Li, Z.; Xu, X.; Zhao, Q. Dynamic defenses in cyber security: Techniques, methods and challenges. Digit. Commun. Netw. 2022, 8, 422–435.

Tavallaee M, Bagheri E, Lu W, Ghorbani AA. A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE symposium on computational intelligence in security and defense applications (CISDA), Ottawa, ON, Canada, July 2009. https:// doi.org/10.1109/CISDA.2009.5356528.

Nimbalkar, P.; Kshirsagar, D. Analysis of rule-based classifiers for IDS in IoT. In Data Science and Security; Springer: New York, NY, USA, 2021; pp. 461–467.

Yılmaz, H.E.; Sirel, A.; Esen, M.F. The impact of internet of things self-security on daily business and business continuity. In Research Anthology on Business Continuity and Navigating Times of Crisis; IGI Global: Hershey, PA, USA, 2022; pp. 695–712. 19.

Harada, R.; Shibata, N.; Kaneko, S.; Honda, K.; Terada, J.; Ishida, Y.; Akashi, K.; Miyachi, T. Quick Suppression of DDoS Attacks by Frame Priority Control in IoT Backhaul with Construction of Mirai-based Attacks. IEEE Access 2022, 10, 22392–22399.

Alazab, A.; Khraisat, A.; Alazab, M.; Singh, S. Detection of Obfuscated Malicious JavaScript Code. Future Internet 2022, 14, 217.

Alazab, M.; Abu Khurma, R.; Awajan, A.; Wedyan, M. Digital Forensics Classification Based on a Hybrid Neural Network and the Salp Swarm Algorithm. Electronics 2022, 11, 1903.

Alazab, M.; Khurma, R.A.; Awajan, A.; Camacho, D. A new intrusion detection system based on moth–flame optimizer algorithm. Expert Syst. Appl. 2022, 210, 118439.

Alzubi, O.A.; Alzubi, J.A.; Alazab, M.; Alrabea, A.; Awajan, A.; Qiqieh, I. Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment. Electronics 2022, 11, 3007.

Alani, M.M.; Damiani, E.; Ghosh, U. DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT. In Proceedings of the 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), Hong Kong, China, 18–21 July 2022; IEEE: New York, NY, USA, 2022; pp. 169–174. 31.

Ravi, V.; Chaganti, R.; Alazab, M. Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system. Comput. Electr. Eng. 2022, 102, 108156.

Abdel-Basset, M.; Moustafa, N.; Hawash, H.; Ding, W. Deep Learning Techniques for IoT Security and Privacy; Springer: New York, NY, USA, 2022; Volume 997.

An, G.H.; Cho, T.H. Improving Sinkhole Attack Detection Rate through Knowledge-Based Specification Rule for a Sinkhole Attack Intrusion Detection Technique of IoT. Int. J. Comput. Netw. Appl. (IJCNA) 2022, 9, 169–178.

Hou, D.; Zhao, K.; Li, W.; Du, S. A Realistic, Flexible and Extendible Network Emulation Platform for Space Networks. Electronics 2022, 11, 1236.

Abdullah Aljumah, IoT-based intrusion detection system using convolution neural networks, PeerJ Comput. Sci., DOI 10.7717/peerj-cs.721,2021

Downloads

Published

2024-12-30

How to Cite

Jameel Zaidan, B. (2024). Accurate Deep Neural Network Technique Based Network Intrusions Detection System. Journal of Al-Qadisiyah for Computer Science and Mathematics, 16(4), Comp. 161–175. https://doi.org/10.29304/jqcsm.2024.16.41781

Issue

Section

Computer Articles