Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks

Mohammed Abdulhammed Al-Shabi(1*)
(1) Department of Management Information System, College of Business Administration, Taibah University, Saudi Arabia
(*) Corresponding Author
DOI : 10.54039/ijcnis.v13i3.5148

Abstract

Recent years have witnessed a tremendous development in various scientific and industrial fields. As a result, different types of networks are widely introduced which are vulnerable to intrusion. In view of the same, numerous studies have been devoted to detecting all types of intrusion and protect the networks from these penetrations. In this paper, a novel network intrusion detection system has been designed to detect cyber-attacks using complex deep neuronal networks. The developed system is trained and tested on the standard dataset KDDCUP99 via pycharm program. Relevant to existing intrusion detection methods with similar deep neuronal networks and traditional machine learning algorithms, the proposed detection system achieves better results in terms of detection accuracy.

Keywords


Cyber security, Intrusion detection system, Complex deep neural networks, Deep learning, KDD CUP99 dataset, Computer network.

References


R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, Deep learning approach for intelligent intrusion detection system, IEEE Access, vol. 7, pp. 41525–41550, 2019.

A. Aldweesh, A. Derhab, and A. Z. Emam, Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues, Knowledge-Based Syst., vol. 189, p. 105124, 2020.

S. Dua and X. Du, Data mining and machine learning in cybersecurity. CRC press, 2016.

H. Liu and B. Lang, Machine learning and deep learning methods for intrusion detection systems: A survey, Appl. Sci., vol. 9, no. 20, p. 4396, 2019.

G. Karatas, O. Demir, and O. K. Sahingoz, Deep learning in intrusion detection systems, in 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018, pp. 113–116.

P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, A detailed investigation and analysis of using machine learning techniques for intrusion detection, IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 686–728, 2018.

A. Azab, M. Alazab, and M. Aiash, Machine learning based botnet identification traffic, in 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, pp. 1788–1794.

G. E. Hinton, A practical guide to training restricted Boltzmann machines, in Neural networks: Tricks of the trade, Springer, 2012, pp. 599–619.

A. Graves, A. Mohamed, and G. Hinton, Speech recognition with deep recurrent neural networks, in 2013 IEEE international conference on acoustics, speech and signal processing, 2013, pp. 6645–6649.

A. Graves and N. Jaitly, Towards end-to-end speech recognition with recurrent neural networks, in international conference on machine learning, 2014, pp. 1764–1772.

I. Sutskever, O. Vinyals, and Q. V Le, Sequence to sequence learning with neural networks, in Advances in neural information processing systems, 2014, pp. 3104–3112.

R. I. Dr. Hassan Alahmad, Using Neural Networks to Build an Intrusion Detection System based on Standard Dataset (KDD99), Tishreen Univ. J. Res. Sci. Stud. - Eng. Sci. Ser., vol. 39, no. 5, pp. 287–310, 2017.

V. N. Tiwari, S. Rathore, and K. Patidar, Enhanced Method for Intrusion Detection over KDD Cup 99 Dataset.

W. Lee, S. J. Stolfo, and K. W. Mok, Adaptive intrusion detection: A data mining approach, Artif. Intell. Rev., vol. 14, no. 6, pp. 533–567, 2000.

KDD99 Dataset., 1999. [Online]. Available: https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [Accessed: 16-Oct-2019].

Eastmount, Intrusion detection and attack recognition based on machine learning KDD CUP99 dataset as an example, 2019. [Online]. Available: https://www.arabicprogrammer.com/article/7432839791/. [Accessed: 23-Nov-2019].

A. Özgür and H. Erdem, A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015, PeerJ Prepr., vol. 4, p. e1954v1, 2016.

M. A. Al-Shabi, Credit card fraud detection using autoencoder model in unbalanced datasets, J. Adv. Math. Comput. Sci., pp. 1–16, 2019.

C. Yin, Y. Zhu, J. Fei, and X. He, A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, vol. 5, pp. 21954–21961, 2017.

W.-H. Lin, H.-C. Lin, P. Wang, B.-H. Wu, and J.-Y. Tsai, Using convolutional neural networks to network intrusion detection for cyber threats, in 2018 IEEE International Conference on Applied System Invention (ICASI), 2018, pp. 1107–1110.

R. K. Vigneswaran, R. Vinayakumar, K. P. Soman, and P. Poornachandran, Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security, in 2018 9th International conference on computing, communication and networking technologies (ICCCNT), 2018, pp. 1–6.

B. Alsughayyir, A. M. Qamar, and R. Khan, developing a network attack detection system using deep learning, in 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1–5.


Article Statistic

Abstract view : 63 times
PDF views : 20 times

How To Cite This :

Refbacks

  • There are currently no refbacks.


International Journal of Communication Networks and Information Security (IJCNIS)               ISSN: 2073-607X (Online)