A Comparative Study of Using Deep Learning Algorithms in Network Intrusion Detection

被引:4
作者
Elsayed, Salwa [1 ]
Mohamed, Khalil [1 ]
Madkour, Mohamed Ashraf [1 ]
机构
[1] Al Azhar Univ, Fac Engn, Syst & Comp Engn Dept, Nasr City 11765, Cairo, Egypt
关键词
Network security; Intrusion detection; anomaly detection; NIDS; deep learning algorithms; NSL-KDD dataset; binary classification; multi-classification; ANOMALY DETECTION;
D O I
10.1109/ACCESS.2024.3389096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study introduces a deep learning approach for network intrusion detection (NIDS), which excels in both binary and multi-classification tasks. This approach combines the strengths of six distinct deep learning algorithms: DNN, CNN, RNN, LSTM, GRU, and a Hybrid CNN-LSTM architecture. The NSL-KDD dataset, a widely recognized benchmark for intrusion detection research, was utilized for implementation and evaluation. In binary classification, the approach demonstrates exceptional capabilities, with the GRU approach outperforming others. Similarly, the DNN, LSTM, CNN, and RNN approaches exhibit robust performance, showcasing their efficacy in detecting anomalies within network data. In the multi-classification setting, the DNN approach stands out with outstanding performance. While other approaches, including RNN, CNN, LSTM, GRU, and the Hybrid CNN-LSTM approach, also maintain commendable results, the DNN approach proves to be the most effective in handling complex network patterns. This research provides valuable insights into the application of deep learning approaches using the NSL-KDD dataset for network anomaly detection, emphasizing their versatility and reliability across different classification scenarios. The findings lay the groundwork for further exploration and utilization of deep learning methodologies in enhancing network security.
引用
收藏
页码:58851 / 58870
页数:20
相关论文
共 50 条
[1]   Human Activity Recognition Based on Deep-Temporal Learning Using Convolution Neural Networks Features and Bidirectional Gated Recurrent Unit With Features Selection [J].
Ahmad, Tariq ;
Wu, Jinsong ;
Alwageed, Hathal Salamah ;
Khan, Faheem ;
Khan, Jawad ;
Lee, Youngmoon .
IEEE ACCESS, 2023, 11 :33148-33159
[2]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[3]  
Akleman E., 2020, Computer, V53, P1, DOI [10.1109/MC.2020.3004171, DOI 10.1109/MC.2020.3004171]
[4]   Intelligent Techniques for Detecting Network Attacks: Review and Research Directions [J].
Aljabri, Malak ;
Aljameel, Sumayh S. ;
Mohammad, Rami Mustafa A. ;
Almotiri, Sultan H. ;
Mirza, Samiha ;
Anis, Fatima M. ;
Aboulnour, Menna ;
Alomari, Dorieh M. ;
Alhamed, Dina H. ;
Altamimi, Hanan S. .
SENSORS, 2021, 21 (21)
[5]   Developing a Network Attack Detection System Using Deep Learning [J].
Alsughayyir, Bayan ;
Qamar, Ali Mustafa ;
Khan, Rehanullah .
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, :232-236
[6]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[7]  
Andreas B., 2020, SMU Data Sc. Rev., V3, P8
[8]   Network Intrusion Detection Model Based on CNN and GRU [J].
Cao, Bo ;
Li, Chenghai ;
Song, Yafei ;
Qin, Yueyi ;
Chen, Chen .
APPLIED SCIENCES-BASEL, 2022, 12 (09)
[9]   A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems [J].
Eesa, Adel Sabry ;
Orman, Zeynep ;
Brifcani, Adnan Mohsin Abdulazeez .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) :2670-2679
[10]   Empirical study on multiclass classification-based network intrusion detection [J].
Elmasry, Wisam ;
Akbulut, Akhan ;
Zaim, Abdul Halim .
COMPUTATIONAL INTELLIGENCE, 2019, 35 (04) :919-954