A Deep Learning Approach for Intrusion Detection

International Journal of Computer Science and Engineering
© 2023 by SSRG - IJCSE Journal
Volume 10 Issue 11
Year of Publication : 2023
Authors : T. Sai Harshitha, V. Sreenidhi, Sk. Parveen, P Tejaswini, Yerininti Venkata Narayana

pdf
How to Cite?

T. Sai Harshitha, V. Sreenidhi, Sk. Parveen, P Tejaswini, Yerininti Venkata Narayana, "A Deep Learning Approach for Intrusion Detection," SSRG International Journal of Computer Science and Engineering , vol. 10,  no. 11, pp. 43-48, 2023. Crossref, https://doi.org/10.14445/23488387/IJCSE-V10I11P106

Abstract:

In the ever-evolving field of cybersecurity, where protecting against unauthorized activities and emerging cyber threats is of paramount importance, this study explores the use of Convolutional Neural Networks (CNNs) to enhance intrusion detection capabilities. Traditional methods often struggle to keep pace with the increasing complexity and diversity of cyber threats, leaving organizations susceptible to data breaches, service disruptions, and financial losses. To address these challenges, CNNs, renowned for their feature extraction capabilities in image analysis, were adapted to the domain of network traffic analysis for precise intrusion detection. Also, conducted a comparative analysis, comparing the CNN approach against Autoencoders, a widely-used unsupervised learning technique for anomaly detection and evaluated the performance of CNN and autoencoders using metrics like accuracy, precision, recall, F1-Score, and AUC-ROC. The current study incorporates the Simargyl2022 dataset to enhance the quality of our results and analyses. This evaluation reveals the strengths and weaknesses of each technique, empowering cybersecurity professionals to make informed decisions about their intrusion detection systems, ultimately strengthening defenses against the ever-evolving cyber threat landscape and ensuring a safer digital world.

Keywords:

Cybersecurity, Intrusion Detection System (IDS), Convolutional Neural Networks (CNN), Deep Learning, Malware, Port Scanning, Denial of Service (DoS), Network Security, Anomaly Detection, Cyberattacks.

References:

[1] Ghulam Muhammad, M. Shamim Hossain, and Sahil Garg, “Stacked Autoencoder-Based Intrusion Detection System to Combat Financial Fraudulent,” IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2071-2078, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Yerininti Venkata Narayana, and Mooramreddy Sreedevi, “Deep Neural System for Identifying Cybercrime Activities in Networks,” Journal of Theoretical and Applied Information Technology, vol. 101, no. 16, pp. 6414-6424, 2023.
[Google Scholar] [Publisher Link]
[3] Fadi Aloul et al., “Network Intrusion Detection on the IoT Edge Using Adversarial Autoencoders,” 2021 International Conference on Information Technology (ICIT), IEEE, pp. 120-125, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Firuz Kamalov et al., “Autoencoder-based Intrusion Detection System,” 2021 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp. 1-5, 2021.
[CrossRef] [Publisher Link]
[5] Ruijie Zhao et al., “An Efficient Intrusion Detection Method Based on Dynamic Autoencoder,” IEEE Wireless Communications Letters, IEEE, vol. 10, no. 8, pp. 1707-1711, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Kohei Shiomoto, “Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples,” Journal of Network and Systems Management, vol. 31, no. 5, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Sultan Zavrak, and Murat Ä°skefiyeli, “Anomaly-Based Intrusion Detection from Network Flow Features Using Variational Autoencoder,” IEEE Access, vol. 8, pp. 108346-108358, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Yu Yan et al., “A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM,” ICC 2020 - 2020 IEEE International Conference on Communications (ICC), IEEE, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Wenjuan Wang et al., “Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine,” IEEE Transactions on Cloud Computing, vol. 10, no. 3, pp. 1634-1646, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Byeongjun Min et al., “Network Anomaly Detection Using Memory-Augmented Deep Autoencoder,” IEEE Access, vol. 9, pp. 104695- 104706, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Wang Hui et al., “A Framework for Network Intrusion Detection Based on Unsupervised Learning,” 2021 IEEE International Conference on Artificial Intelligence and Industrial Design (AIID), IEEE, pp. 188-193, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Prabhav Gupta, Yash Ghatole, and Nihal Reddy, “Stacked Autoencoder based Intrusion Detection System using One-Class Classification,” 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), IEEE, pp. 643-648, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Ali Hakem Alsaeedi et al., “Dynamic Clustering Strategies Boosting Deep Learning in Olive Leaf Disease Diagnosis,” Sustainability, vol. 15, no. 18, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Youngrok Song, Sangwon Hyun, and Yun-Gyung Cheong, “Analysis of Autoencoders for Network Intrusion Detection,” Sensors, vol. 21, no. 13, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Srikanthyadav Moraboena, Gayatri Ketepalli, and Padmaja Ragam, “A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder,” Revue d'Intelligence Artificielle, vol. 34, no. 4, pp. 457-463, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Hyunseung Choi et al., “Unsupervised Learning Approach for Network Intrusion Detection System Using Autoencoders,” The Journal of Supercomputing, vol. 75, pp. 5597–5621, 2019.
[CrossRef] [Google Scholar] [Publisher Link]