Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks

被引:1
|
作者
El Asry, Chadia [1 ]
Benchaji, Ibtissam [1 ]
Douzi, Samira [2 ]
El Ouahidi, Bouabid [1 ]
机构
[1] Mohammed V Univ, Fac Sci, Intelligent Proc & Secur Syst IPSS, Rabat, Morocco
[2] Mohammed V Univ Rabat, Fac Med & Pharm FMPR, Rabat, Morocco
关键词
Intrusion detection systems; deep learning; SHapley Additive exPlanations (SHAP) values; Long-Short- Term-Memory (LSTM); feature selection;
D O I
10.12720/jait.15.9.1070-1078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new approach to improve the detection of network security by combining feature selection with Long-Short-Term-Memory (LSTM) approaches. The SHapley Additive exPlanations (SHAP) values approach is utilized for feature selection, in conjunction with cross-validation, to identify the most effective set of features that improve model recall for each specific sort of assault. We employ the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset to train and assess the efficacy of our model. The suggested model exhibits greater performance in comparison to standard LSTM models when utilizing all features. Furthermore, it surpasses current leading models with an accuracy of 99.74%, precision of 95.42%, recall of 94.92%, and F1-Score of 94.90%. In addition, the model demonstrates outstanding aptitude in precisely detecting Remote-to-Local (R2L) and User-to-Root (U2R) attacks, which are complex forms of intrusions that exploit vulnerabilities to gain unauthorized access to systems or networks. Although infrequent, these assaults provide a substantial risk because they have the ability to do substantial harm and compromise confidential data.
引用
收藏
页码:1070 / 1078
页数:9
相关论文
共 38 条
  • [1] Selection of Effective Network Parameters in Attacks for Intrusion Detection
    Zargar, Gholam Reza
    Kabiri, Peyman
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2010, 6171 : 643 - +
  • [2] Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things
    Li, Xinghua
    Xu, Mengfan
    Vijayakumar, Pandi
    Kumar, Neeraj
    Liu, Ximeng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 8820 - 8831
  • [3] Towards Effective Virtualization of Intrusion Detection Systems
    Zhang, Nuyun
    Li, Hongda
    Hu, Hongxin
    Park, Younghee
    SDN-NFVSEC'17: PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION, 2017, : 47 - 50
  • [4] Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
    Alotaibi, Afnan
    Rassam, Murad A.
    FUTURE INTERNET, 2023, 15 (02)
  • [5] A Comprehensive Review of Various Approaches to Intrusion Detection Systems
    Shinde, Swati
    Borde, Tejas
    Deo, Aditya
    Dhamak, Suraj
    Dungarwal, Shreyas
    INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 : 177 - 189
  • [6] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [7] A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and Challenges
    Luis Gutierrez-Garcia, Jose
    Sanchez-DelaCruz, Eddy
    del Pilar Pozos-Parra, Maria
    ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 59 - 78
  • [8] A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems
    Khoei, Tala Talaei
    Kaabouch, Naima
    INFORMATION, 2023, 14 (02)
  • [9] Improved Robust Adversarial Model against Evasion Attacks on Intrusion Detection Systems
    Anaedevha, R. N.
    Trofimov, A. G.
    OPTICAL MEMORY AND NEURAL NETWORKS, 2024, 33 (SUPPL3) : S414 - S423
  • [10] Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach
    Li, Xiping
    Dong, Wei
    Sun, Yi
    Chen, Shaolong
    Kong, Detong
    Yang, Shujie
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1364 - 1369