Skip to main content
Top

2022 | OriginalPaper | Chapter

Classification of Network Intrusion Detection System Using Deep Learning

Authors : Neha Sharma, Narendra Singh Yadav

Published in: Cyber Security, Privacy and Networking

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Over the past  one decade, there has been a continuous rise in the usage of Internet services all over the world. However, numerous challenges emerge since malicious attacks are constantly changing and are happening in exceptionally huge volumes requiring an adaptable solution. This has led to a desperate need not only of detection and classification of attacks at host as well as network side but also the detection being automatic and in a certain time frame, as a result of which the world has seen many developments in this field with machine learning and deep learning playing a huge role in it. Because of the dynamic effect of malware with constantly changing attack techniques, the malware datasets accessible openly are to be updated efficiently and benchmarked. In order to develop an effective intrusion detection system, machine learning or deep learning techniques are also becoming more advanced day by day, and it is important to utilize their benefits in this field. This paper focuses on the development of network intrusion detection systems (NIDS) using deep learning. This paper uses UNSW-NB15 dataset as it is one of the most recent and improved IDS datasets. It has been improved on many factors from its predecessor KDD CUP99. Convolutional neural network and recurrent neural network have been implemented to compare the results. The classifications implemented in this paper are both in binary and multiclass with the major focus regarding maximum macro precision, recall, and f-score for the multiclass approach.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mukherjee B, Heberlein LT, Levitt KN (1994) Network intrusion detection. IEEE Netw 8(3):26–41CrossRef Mukherjee B, Heberlein LT, Levitt KN (1994) Network intrusion detection. IEEE Netw 8(3):26–41CrossRef
2.
go back to reference Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor
3.
go back to reference Staudemeyer RC (2015) Applying long short-term memory recurrent neural networks to intrusion detection. S Afr Comput J 56(1):136–154 Staudemeyer RC (2015) Applying long short-term memory recurrent neural networks to intrusion detection. S Afr Comput J 56(1):136–154
4.
go back to reference Moustafa N, Slay J (2015) The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In: 2015 4th international workshop on building analysis datasets and gathering experience returns for security, Nov 2015 Moustafa N, Slay J (2015) The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In: 2015 4th international workshop on building analysis datasets and gathering experience returns for security, Nov 2015
5.
go back to reference Sharma P, Sengupta J, Suri PK (2019) Survey of intrusion detection techniques and architectures in cloud computing. Int J High Perform Comput Netw 13(2):184–198CrossRef Sharma P, Sengupta J, Suri PK (2019) Survey of intrusion detection techniques and architectures in cloud computing. Int J High Perform Comput Netw 13(2):184–198CrossRef
6.
go back to reference Kamarudin MH, Maple C, Watson T (2019) Hybrid feature selection technique for intrusion detection system. Int J High Perform Comput Netw 13(2):232–240CrossRef Kamarudin MH, Maple C, Watson T (2019) Hybrid feature selection technique for intrusion detection system. Int J High Perform Comput Netw 13(2):232–240CrossRef
7.
go back to reference Kumar P, Kumar R, Gupta GP, Tripathi R (2021) A distributed framework for detecting DDoS attacks in smart contract-based blockchain-IoT systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112 Kumar P, Kumar R, Gupta GP, Tripathi R (2021) A distributed framework for detecting DDoS attacks in smart contract-based blockchain-IoT systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112
8.
go back to reference Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry 2020 Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry 2020
9.
go back to reference Kanimozhi V, Jacob P (2019) UNSW-NB15 dataset feature selection and network intrusion detection using deep learning. Int J Recent Technol Eng (IJRTE) Kanimozhi V, Jacob P (2019) UNSW-NB15 dataset feature selection and network intrusion detection using deep learning. Int J Recent Technol Eng (IJRTE)
10.
go back to reference Kocher G, Kumar G (2021) Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset. Int J Netw Secur Appl (IJNSA) Kocher G, Kumar G (2021) Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset. Int J Netw Secur Appl (IJNSA)
11.
go back to reference Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: a survey. State Key Laboratory of Software Development Environment, Beihang University, Beijing, 11–17 Oct 2019 Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: a survey. State Key Laboratory of Software Development Environment, Beihang University, Beijing, 11–17 Oct 2019
12.
go back to reference Srinivasan S, Anivilla S, Ravi V, Kp S (2020) DCNN-IDS: deep convolutional neural network based intrusion detection system. In: TechRxiv, 18–21 Oct 2020. IEEE Srinivasan S, Anivilla S, Ravi V, Kp S (2020) DCNN-IDS: deep convolutional neural network based intrusion detection system. In: TechRxiv, 18–21 Oct 2020. IEEE
14.
go back to reference Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military communications and information systems conference (MilCIS), Canberra Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military communications and information systems conference (MilCIS), Canberra
15.
go back to reference Ren J, Guo J, Qian W, Yuan H, Hao X, Jingjing H (2019) Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Secur Commun Netw Ren J, Guo J, Qian W, Yuan H, Hao X, Jingjing H (2019) Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Secur Commun Netw
16.
go back to reference Letteri I, Penna GD, Gasperis GD (2019) Security in the internet of things: botnet detection in software-defined networks by deep learning techniques. Int J High Perform Comput Netw 15(3–4):170–182CrossRef Letteri I, Penna GD, Gasperis GD (2019) Security in the internet of things: botnet detection in software-defined networks by deep learning techniques. Int J High Perform Comput Netw 15(3–4):170–182CrossRef
17.
go back to reference Zheng H, He J, Zhang Y, Wu J, Ji Z (2019) A mathematical model for intimacy-based security protection in social network without violation of privacy. Int J High Perform Comput Netw 15(3–4):121–132CrossRef Zheng H, He J, Zhang Y, Wu J, Ji Z (2019) A mathematical model for intimacy-based security protection in social network without violation of privacy. Int J High Perform Comput Netw 15(3–4):121–132CrossRef
18.
go back to reference Kumar P, Gupta GP, Tripathi R (2021) Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks. Arab J Sci Eng 46(4):3749–3778CrossRef Kumar P, Gupta GP, Tripathi R (2021) Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks. Arab J Sci Eng 46(4):3749–3778CrossRef
19.
go back to reference Kumar R, Kumar P, Tripathi R, Gupta GP, Gadekallu TR, Srivastava G (2021) Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Netw 187:107819 Kumar R, Kumar P, Tripathi R, Gupta GP, Gadekallu TR, Srivastava G (2021) Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Netw 187:107819
20.
go back to reference Nagisetty A, Gupta GP (2019) Framework for detection of malicious activities in IoT networks using keras deep learning library. In: 2019 3rd international conference on computing methodologies and communication (ICCMC), Mar 2019. IEEE, pp 633–637 Nagisetty A, Gupta GP (2019) Framework for detection of malicious activities in IoT networks using keras deep learning library. In: 2019 3rd international conference on computing methodologies and communication (ICCMC), Mar 2019. IEEE, pp 633–637
21.
go back to reference Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput Commun 166:110–124CrossRef Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput Commun 166:110–124CrossRef
Metadata
Title
Classification of Network Intrusion Detection System Using Deep Learning
Authors
Neha Sharma
Narendra Singh Yadav
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_19