Skip to main content
Top

2022 | OriginalPaper | Chapter

Intelligent Intrusion Detection System Using Deep Learning Technique

Authors : Azriel Henry, Sunil Gautam

Published in: Computing, Communication and Learning

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There is constant growth in the digitization of information across the world. However, this rapid growth has raised concerns over the security of the information. Today’s internet is made up of nearly half a million different networks. Network intrusions are very common these days which put user information at high risk. An intrusion detection system (IDS) is a software/system to analyze and monitor the data for the detection of intrusions in the host/network. An intrusion Detection System competent in detecting zero-day attacks and network anomalies is highly demanded. Researchers have used different methods to develop robust IDS. However, none of the methods is exceptionally well and meets every requirement of IDS. Machine learning/Deep learning (ML/DL) are among the widely used methods to develop IDS. This proposed technique uses a DL model, Recurrent Neural Network (RNN) with Gated Recurrent Unit (GRU) framework. There are several datasets to evaluate the performance of the learning techniques. CICIDS 2017 is the dataset that contains a variety of cyber-attacks. The proposed technique will use the same to evaluate the deep learning technique. Moreover, the study will also showcase the comparison between the results of existing machine learning algorithms and the proposed algorithm. The comparison would be done on different matrices such as True positive (TP) and False positive (FP) rates, accuracy, precision, etc.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mahendra, P., et al.: An efficient feature selection based bayesian and rough set approach for intrusion detection. Appl. Soft Comput. 87, 105980 (2020) Mahendra, P., et al.: An efficient feature selection based bayesian and rough set approach for intrusion detection. Appl. Soft Comput. 87, 105980 (2020)
2.
go back to reference Ansam, K., et al.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1) (2019) Ansam, K., et al.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1) (2019)
3.
go back to reference Nasrin, S., et al.: Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Network. Appl. 12(2), 493–501 (2018) Nasrin, S., et al.: Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Network. Appl. 12(2), 493–501 (2018)
4.
go back to reference Jyothsna, V., et al.: A review of anomaly based intrusion detection systems. Int. J. Comput. Appl. 28(7), 26–35 (2011) Jyothsna, V., et al.: A review of anomaly based intrusion detection systems. Int. J. Comput. Appl. 28(7), 26–35 (2011)
5.
go back to reference Inadyuti, D., et al.: Immune System Based Intrusion Detection System (IS-Ids): a proposed model. IEEE Access 8, 34929–34941 (2020) Inadyuti, D., et al.: Immune System Based Intrusion Detection System (IS-Ids): a proposed model. IEEE Access 8, 34929–34941 (2020)
6.
go back to reference Wisanwanichthan, T., Thammawichai, M.: A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE Access 9, 138432–138450 (2021)CrossRef Wisanwanichthan, T., Thammawichai, M.: A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE Access 9, 138432–138450 (2021)CrossRef
7.
go back to reference Adhi, T.B., et al.: Tse-Ids: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497–94507 (2019) Adhi, T.B., et al.: Tse-Ids: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497–94507 (2019)
8.
go back to reference Guo, P., et al.: A hybrid unsupervised clustering-based anomaly detection method. Tsinghua Sci. Technol. 26(2), 146–153 (2021) Guo, P., et al.: A hybrid unsupervised clustering-based anomaly detection method. Tsinghua Sci. Technol. 26(2), 146–153 (2021)
9.
go back to reference Aleesa, M., et al.: Deep-intrusion detection system with enhanced UNSW-NB15 dataset based on deep learning techniques. J. Eng. Sci. Technol. 16(1), 711–727 (2021) Aleesa, M., et al.: Deep-intrusion detection system with enhanced UNSW-NB15 dataset based on deep learning techniques. J. Eng. Sci. Technol. 16(1), 711–727 (2021)
10.
go back to reference Robson, V.M., et al.: Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access 9, 61024–61034 (2021) Robson, V.M., et al.: Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access 9, 61024–61034 (2021)
11.
go back to reference Ming, Z., et al.: sequential model based intrusion detection system for IOT servers using deep learning methods. Sensors 21(4), 1113 (2021) Ming, Z., et al.: sequential model based intrusion detection system for IOT servers using deep learning methods. Sensors 21(4), 1113 (2021)
12.
go back to reference Zhang, R., et al.: A multifractal analysis and machine learning based intrusion detection system with an application in a UAS/Radar system. Drones 6(1), 21 (2022) Zhang, R., et al.: A multifractal analysis and machine learning based intrusion detection system with an application in a UAS/Radar system. Drones 6(1), 21 (2022)
13.
go back to reference Ullah, I., Mahmoud, Q.H.: Design and development of a deep learning-based model for anomaly detection in IOT networks. IEEE Access 9, 103906–103926 (2021)CrossRef Ullah, I., Mahmoud, Q.H.: Design and development of a deep learning-based model for anomaly detection in IOT networks. IEEE Access 9, 103906–103926 (2021)CrossRef
14.
go back to reference Yao, R., et al.: Intrusion detection system in the advanced metering infrastructure: a cross-layer feature-fusion CNN-LSTM-based approach. Sensors 21(2), 626 (2021) Yao, R., et al.: Intrusion detection system in the advanced metering infrastructure: a cross-layer feature-fusion CNN-LSTM-based approach. Sensors 21(2), 626 (2021)
15.
go back to reference Zhu, H., et al.: Multiple ant colony optimization based on pearson correlation coefficient. IEEE Access 7, 61628–61638 (2019) Zhu, H., et al.: Multiple ant colony optimization based on pearson correlation coefficient. IEEE Access 7, 61628–61638 (2019)
16.
go back to reference Feng, W., et al.: An expert recommendation algorithm based on pearson correlation coefficient and FP-growth. Cluster Comput. 22(S3), 7401–7412 (2018) Feng, W., et al.: An expert recommendation algorithm based on pearson correlation coefficient and FP-growth. Cluster Comput. 22(S3), 7401–7412 (2018)
17.
go back to reference Nesma, M.R., et al.: Recurrent neural networks: an embedded computing perspective. IEEE Access 8, 57967–57996 (2020) Nesma, M.R., et al.: Recurrent neural networks: an embedded computing perspective. IEEE Access 8, 57967–57996 (2020)
18.
go back to reference Wei, X., et al.: An RNN-based delay-guaranteed monitoring framework in underwater wireless sensor networks. IEEE Access 7, 25959–25971 (2019) Wei, X., et al.: An RNN-based delay-guaranteed monitoring framework in underwater wireless sensor networks. IEEE Access 7, 25959–25971 (2019)
19.
go back to reference Apeksha, S., et al.: Performance evaluation of deep neural networks applied to speech recognition: RNN, LSTM and Gru. J. Artif. Intell. Soft Comput. Res. 9(4), 235–245 (2019) Apeksha, S., et al.: Performance evaluation of deep neural networks applied to speech recognition: RNN, LSTM and Gru. J. Artif. Intell. Soft Comput. Res. 9(4), 235–245 (2019)
20.
go back to reference Fredrik, W., et al.: Spotting words in medieval manuscripts. Studia Neophilologica 86(sup1), 171–186 (2014) Fredrik, W., et al.: Spotting words in medieval manuscripts. Studia Neophilologica 86(sup1), 171–186 (2014)
21.
go back to reference Elise, A., et al.: Machine learning for cross-gazetteer matching of natural features. Int. J. Geograph. Inform. Sci. 34(4), 708–734 (2019) Elise, A., et al.: Machine learning for cross-gazetteer matching of natural features. Int. J. Geograph. Inform. Sci. 34(4), 708–734 (2019)
22.
go back to reference Zhang, Q., et al.: A new road extraction method using sentinel-1 SAR images based on the deep fully convolutional neural network. Eur. J. Remote Sens. 52(1), 572–582 (2019) Zhang, Q., et al.: A new road extraction method using sentinel-1 SAR images based on the deep fully convolutional neural network. Eur. J. Remote Sens. 52(1), 572–582 (2019)
23.
go back to reference Pelletier, Z., et al.: Evaluating the CIC IDS-2017 dataset using machine learning methods and creating multiple predictive models in the statistical computing language R”. Int. Res. J. Adv. Eng. Sci. 5(2), 187–191 (2017) Pelletier, Z., et al.: Evaluating the CIC IDS-2017 dataset using machine learning methods and creating multiple predictive models in the statistical computing language R”. Int. Res. J. Adv. Eng. Sci. 5(2), 187–191 (2017)
24.
go back to reference Arif, Y., et al.: Improving AdaBoost-Based Intrusion Detection System (IDS) performance on CIC Ids 2017 dataset. J. Phys. Conf. Ser. 1192, 012018 (2019) Arif, Y., et al.: Improving AdaBoost-Based Intrusion Detection System (IDS) performance on CIC Ids 2017 dataset. J. Phys. Conf. Ser. 1192, 012018 (2019)
Metadata
Title
Intelligent Intrusion Detection System Using Deep Learning Technique
Authors
Azriel Henry
Sunil Gautam
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-21750-0_19

Premium Partner