Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks

被引:1
作者
El Asry, Chadia [1 ]
Benchaji, Ibtissam [1 ]
Douzi, Samira [2 ]
El Ouahidi, Bouabid [1 ]
机构
[1] Mohammed V Univ, Fac Sci, Intelligent Proc & Secur Syst IPSS, Rabat, Morocco
[2] Mohammed V Univ Rabat, Fac Med & Pharm FMPR, Rabat, Morocco
关键词
Intrusion detection systems; deep learning; SHapley Additive exPlanations (SHAP) values; Long-Short- Term-Memory (LSTM); feature selection;
D O I
10.12720/jait.15.9.1070-1078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new approach to improve the detection of network security by combining feature selection with Long-Short-Term-Memory (LSTM) approaches. The SHapley Additive exPlanations (SHAP) values approach is utilized for feature selection, in conjunction with cross-validation, to identify the most effective set of features that improve model recall for each specific sort of assault. We employ the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset to train and assess the efficacy of our model. The suggested model exhibits greater performance in comparison to standard LSTM models when utilizing all features. Furthermore, it surpasses current leading models with an accuracy of 99.74%, precision of 95.42%, recall of 94.92%, and F1-Score of 94.90%. In addition, the model demonstrates outstanding aptitude in precisely detecting Remote-to-Local (R2L) and User-to-Root (U2R) attacks, which are complex forms of intrusions that exploit vulnerabilities to gain unauthorized access to systems or networks. Although infrequent, these assaults provide a substantial risk because they have the ability to do substantial harm and compromise confidential data.
引用
收藏
页码:1070 / 1078
页数:9
相关论文
共 41 条
  • [21] Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms
    Zhang, Chaoyun
    Costa-Perez, Xavier
    Patras, Paul
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (03) : 1294 - 1311
  • [22] Optimizing intrusion detection in industrial cyber-physical systems through transfer learning approaches
    Nour, Amro A.
    Mehbodniya, Abolfazl
    Webber, Julian L.
    Bostani, Ali
    Shah, Bhoomi
    Ergashevich, Beknazarov Zafarjon
    Sathishkumar, K.
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 111
  • [23] Mitigating backdoor attacks in Federated Learning based intrusion detection systems through Neuron Synaptic Weight Adjustment
    Zukaib, Umer
    Cui, Xiaohui
    KNOWLEDGE-BASED SYSTEMS, 2025, 314
  • [24] Frequency-Based Representation of Massive Alerts and Combination of Indicators by Heterogeneous Intrusion Detection Systems for Anomaly Detection
    Park, Hyunjae
    Choi, Young-June
    SENSORS, 2022, 22 (12)
  • [25] Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa
    Derhab, Abdelouahid
    Emam, Ahmed Z.
    KNOWLEDGE-BASED SYSTEMS, 2020, 189 (189)
  • [26] In-vehicle network intrusion detection systems: a systematic survey of deep learning-based approaches
    Luo, Feng
    Wang, Jiajia
    Zhang, Xuan
    Jiang, Yifan
    Li, Zhihao
    Luo, Cheng
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [27] Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud-Fog-Edge architectures
    Hernandez-Jaimes, Mireya Lucia
    Martinez-Cruz, Alfonso
    Ramirez-Gutierrez, Kelsey Alejandra
    Feregrino-Uribe, Claudia
    INTERNET OF THINGS, 2023, 23
  • [28] Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation ☆
    Barbosa, Guilherme Nunes Nasseh
    Andreoni, Martin
    Mattos, Diogo Menezes Ferrazani
    AD HOC NETWORKS, 2024, 159
  • [29] Transferability Evaluation in Wi-Fi Intrusion Detection Systems Through Machine Learning and Deep Learning Approaches
    Yonbawi, Saud
    Afzal, Adil
    Yasir, Muhammad
    Rizwan, Muhammad
    Kryvinska, Natalia
    IEEE ACCESS, 2025, 13 : 11248 - 11264
  • [30] A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
    Khraisat, Ansam
    Alazab, Ammar
    CYBERSECURITY, 2021, 4 (01)