Journal of Machine and Computing


An Enhanced Hybrid Deep Learning Model to Enhance Network Intrusion Detection Capabilities for Cybersecurity



Journal of Machine and Computing

Received On : 10 April 2023

Revised On : 12 October 2023

Accepted On : 12 March 2024

Published On : 05 April 2024

Volume 04, Issue 02

Pages : 472-486


Abstract


Recently, we have noticed tremendous growth in the field of Information Technology. This increased growth has proliferated the use of new technologies and continued advancement of networking systems. These systems are widely adopted for real-time online and offline tasks. Due to this growth in information technology, maintaining security has gained huge attention as these systems are vulnerable to various attacks. In this context, an Intrusion Detection System (IDS) plays an important role in ensuring security by detecting and preventing suspicious activities within the network. However, as technology is overgrowing, malicious activities are also increasing. Moreover, legacy IDS methods cannot handle new threats, such as traditional signature-based methods requiring a predefined rule set to detect malicious activity. Also, several new methods have been proposed earlier to address security-related issues; however, the performance of these methods is limited due to poor attack detection accuracy and increased false positive rates. In this work, we propose and compare different deep-learning (DL) models that can be used to construct IDSs to provide network security. Details on convolutional neural networks (CNNs), Multilayer Perceptron (MLP), and long short-term memories (LSTMs) are introduced. A discussion of the outcomes achieved follows an assessment of the proposed DL model known as the FOA-CNN-LSTM technique. Comparisons are made between the suggested models and other machine-learning methods. This work presents a deep-learning approach based on hybrid CNN-LSTM with Fruit fly Optimization Algorithm (FOA) by ensemble techniques to distinguish between normal and abnormal behaviors.


Keywords


Intrusion Detection System, Cyberattacks, Fruit fly Optimization Algorithm, LSTM, CNN, DNN, RNN.


  1. J. Armin, B. Thompson, D. Ariu, G. Giacinto, F. Roli, and P. Kijewski, “2020 Cybercrime Economic Costs: No Measure No Solution,” 2015 10th International Conference on Availability, Reliability and Security, Aug. 2015, doi: 10.1109/ares.2015.56.
  2. J. S. Nye, “Deterrence and Dissuasion in Cyberspace,” International Security, vol. 41, no. 3, pp. 44–71, Jan. 2017, doi: 10.1162/isec_a_00266.
  3. N. K. Raja, K. Babu, A. Senthamaraiselvan, and K. Arulanandam, “Routers Sequential Comparing Two Sample Packets for Dropping Worms,” International Journal of Computer Network and Information Security, vol. 4, no. 9, pp. 38–46, Aug. 2012, doi: 10.5815/ijcnis.2012.09.05.
  4. B. A. Tama, L. Nkenyereye, S. M. R. Islam, and K.-S. Kwak, “An Enhanced Anomaly Detection in Web Traffic Using a Stack of Classifier Ensemble,” IEEE Access, vol. 8, pp. 24120–24134, 2020, doi: 10.1109/access.2020.2969428.
  5. Umar, M. A., Zhanfang, C., & Liu, Y. , “A Hybrid Intrusion Detection with Decision Tree for Feature Selection”, arXiv preprint, 2020), arXiv:2009.13067.
  6. A. Abdollahi and M. Fathi, “An Intrusion Detection System on Ping of Death Attacks in IoT Networks,” Wireless Personal Communications, vol. 112, no. 4, pp. 2057–2070, Jan. 2020, doi: 10.1007/s11277-020-07139-y.
  7. P. Kumar, G. P. Gupta, and R. Tripathi, “Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks,” Arabian Journal for Science and Engineering, vol. 46, no. 4, pp. 3749–3778, Jan. 2021, doi: 10.1007/s13369-020-05181-3.
  8. K. Adhikary, S. Bhushan, S. Kumar, and K. Dutta, “Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP’99 Dataset by Random Forest Method for Detecting DDoS Attacks,” Wireless Personal Communications, vol. 123, no. 4, pp. 3127–3145, Oct. 2021, doi: 10.1007/s11277-021-09280-8.
  9. M. Li, D. Han, X. Yin, H. Liu, and D. Li, “Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features,” Security and Communication Networks, vol. 2021, pp. 1–15, Aug. 2021, doi: 10.1155/2021/7045823.
  10. R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525–41550, 2019, doi: 10.1109/access.2019.2895334.
  11. S. Einy, C. Oz, and Y. D. Navaei, “The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems,” Mathematical Problems in Engineering, vol. 2021, pp. 1–10, Mar. 2021, doi: 10.1155/2021/6639714.
  12. K. Kim, M. E. Aminanto, and H. C. Tanuwidjaja, “Deep Feature Learning,” Network Intrusion Detection using Deep Learning, pp. 47–68, 2018, doi: 10.1007/978-981-13-1444-5_6.
  13. W.-T. Pan, “A new Fruit Fly Optimization Algorithm: Taking the financial distress model as an example,” Knowledge-Based Systems, vol. 26, pp. 69–74, Feb. 2012, doi: 10.1016/j.knosys.2011.07.001.
  14. A. Das and . P., “An Approach for Identifying Network Intrusion in an Automated Process Control Computer System,” International Journal of Electrical and Electronics Research, vol. 10, no. 4, pp. 1219–1224, Dec. 2022, doi: 10.37391/ijeer.100472.
  15. S. Borah, R. Panigrahi, and A. Chakraborty, “An Enhanced Intrusion Detection System Based on Clustering,” Progress in Advanced Computing and Intelligent Engineering, pp. 37–45, Dec. 2017, doi: 10.1007/978-981-10-6875-1_5.
  16. D. Baskaya and R. Samet, “DDoS Attacks Detection by Using Machine Learning Methods on Online Systems,” 2020 5th International Conference on Computer Science and Engineering (UBMK), Sep. 2020, doi: 10.1109/ubmk50275.2020.9219476.
  17. M. Wang, Y. Lu, and J. Qin, “A dynamic MLP-based DDoS attack detection method using feature selection and feedback,” Computers & Security, vol. 88, p. 101645, Jan. 2020, doi: 10.1016/j.cose.2019.101645.
  18. W. Guo and Z. Zhao, “A Novel Hybrid BND-FOA-LSSVM Model for Electricity Price Forecasting,” Information, vol. 8, no. 4, p. 120, Sep. 2017, doi: 10.3390/info8040120.
  19. H. Aiqin and W. Yong, “Pressure Model of Control Valve Based on LS-SVM with the Fruit Fly Algorithm,” Algorithms, vol. 7, no. 3, pp. 363–375, Jul. 2014, doi: 10.3390/a7030363.
  20. M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, “Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study,” Journal of Information Security and Applications, vol. 50, p. 102419, Feb. 2020, doi: 10.1016/j.jisa.2019.102419.

Acknowledgements


Authors thank Reviewers for taking the time and effort necessary to review the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Abhijit Das, Shobha N, Natesh M, Gyanendra Tiwary and Karthik V, “An Enhanced Hybrid Deep Learning Model to Enhance Network Intrusion Detection Capabilities for Cybersecurity", pp. 472-486, April 2024. doi: 10.53759/7669/jmc202404045.


Copyright


© 2024 Abhijit Das, Shobha N, Natesh M, Gyanendra Tiwary and Karthik V. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.