Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks

被引:1
作者
El Asry, Chadia [1 ]
Benchaji, Ibtissam [1 ]
Douzi, Samira [2 ]
El Ouahidi, Bouabid [1 ]
机构
[1] Mohammed V Univ, Fac Sci, Intelligent Proc & Secur Syst IPSS, Rabat, Morocco
[2] Mohammed V Univ Rabat, Fac Med & Pharm FMPR, Rabat, Morocco
关键词
Intrusion detection systems; deep learning; SHapley Additive exPlanations (SHAP) values; Long-Short- Term-Memory (LSTM); feature selection;
D O I
10.12720/jait.15.9.1070-1078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new approach to improve the detection of network security by combining feature selection with Long-Short-Term-Memory (LSTM) approaches. The SHapley Additive exPlanations (SHAP) values approach is utilized for feature selection, in conjunction with cross-validation, to identify the most effective set of features that improve model recall for each specific sort of assault. We employ the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset to train and assess the efficacy of our model. The suggested model exhibits greater performance in comparison to standard LSTM models when utilizing all features. Furthermore, it surpasses current leading models with an accuracy of 99.74%, precision of 95.42%, recall of 94.92%, and F1-Score of 94.90%. In addition, the model demonstrates outstanding aptitude in precisely detecting Remote-to-Local (R2L) and User-to-Root (U2R) attacks, which are complex forms of intrusions that exploit vulnerabilities to gain unauthorized access to systems or networks. Although infrequent, these assaults provide a substantial risk because they have the ability to do substantial harm and compromise confidential data.
引用
收藏
页码:1070 / 1078
页数:9
相关论文
共 41 条
[31]   Safeguarding GRU-Based Intrusion Detection Systems From Adversarial Attacks With Dynamic Label Watermark in CAN Bus Communication [J].
Zhao, Haihang ;
Wang, Yi ;
Cheng, Anyu ;
Wang, Shanshan ;
Yuan, Jing ;
Wang, Hongrong .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (07) :7668-7676
[32]   Low-frequency Forced Oscillation Source Location for Bulk Power Systems: A Deep Learning Approach [J].
Talukder, Soumyabrata ;
Liu, Shaopeng ;
Wang, Honggang ;
Zheng, Gang .
2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, :3499-3504
[33]   A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges [J].
Ansam Khraisat ;
Ammar Alazab .
Cybersecurity, 4
[34]   SPARK and SAD: Leading-edge deep learning frameworks for robust and effective intrusion detection in SCADA systems [J].
Bhukya, Raghuram ;
Moeed, Syed Abdul ;
Medavaka, Anusha ;
Khadidos, Alaa O. ;
Khadidos, Adil O. ;
Selvarajan, Shitharth .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2025, 49
[35]   Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features [J].
Kotwal K. ;
Mostaani Z. ;
Marcel S. .
IEEE Transactions on Biometrics, Behavior, and Identity Science, 2020, 2 (01) :15-25
[36]   Optimizing Deep Learning Based Intrusion Detection Systems Defense Against White-Box and Backdoor Adversarial Attacks Through a Genetic Algorithm [J].
Alrawashdeh, Khaled ;
Goldsmith, Stephen .
2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
[37]   Enhanced Hybrid Deep Learning Models-Based Anomaly Detection Method for Two-Stage Binary and Multi-Class Classification of Attacks in Intrusion Detection Systems [J].
Kamal, Hesham ;
Mashaly, Maggie .
ALGORITHMS, 2025, 18 (02)
[38]   A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs [J].
Vinayakumar, R. ;
Soman, K. P. ;
Poornachandran, Prabaharan .
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (03) :65-89
[39]   STNet: A Time-Frequency Analysis-Based Intrusion Detection Network for Distributed Optical Fiber Acoustic Sensing Systems [J].
Zeng, Yiming ;
Zhang, Jianwei ;
Zhong, Yuzhong ;
Deng, Lin ;
Wang, Maoning .
SENSORS, 2024, 24 (05)
[40]   Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques [J].
Kamal, Hesham ;
Mashaly, Maggie .
FUTURE INTERNET, 2024, 16 (12)