An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model

被引:0
作者
Ramaiah, Mangayarkarasi [1 ]
Vanmathi, C. [1 ]
Khan, Mohammad Zubair [2 ]
Vanitha, M. [1 ]
Deepa, M. [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci Engn & Informat Syst, Vellore 632014, Tamilnadu, India
[2] Taibah Univ, Coll Comp Sci & Engn, Medina 41477, Saudi Arabia
关键词
artificial deep neural network; correlation tool; DDoS; machine learning; network intrusion detection system; RF-score; XGBoost-score; LEARNING-METHODS; SECURITY; IOT;
D O I
10.5614/itbj.ict.res.appl.2023.17.3.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of Internet of Things (IoT) solutions has led to a significant increase in cyber-attacks targeting IoT networks. Securing networks and especially wireless IoT networks against these attacks has become a crucial but challenging task for organizations. Therefore, ensuring the security of wireless IoT networks is of the utmost importance in today's world. Among various solutions for detecting intruders, there is a growing demand for more effective techniques. This paper introduces a network intrusion detection system (NIDS) based on a deep neural network that utilizes network data features selected through the bagging and boosting methods. The presented NIDS implements both binary and multiclass attack detection models and was evaluated using the KDDCUP 99 and CICDDoS datasets. The experimental results demonstrated that the presented NIDS achieved an impressive accuracy rate of 99.4% while using a minimal number of features. This high level of accuracy makes the presented IDS a valuable tool.
引用
收藏
页码:292 / 315
页数:24
相关论文
共 41 条
  • [1] Supervised Machine Learning Techniques for Efficient Network Intrusion Detection
    Aboueata, Nada
    Alrasbi, Sara
    Erbad, Aiman
    Kassler, Andreas
    Bhamare, Deval
    [J]. 2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [2] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [3] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [4] Crime Toolkits: The Productisation of Cybercrime
    Alazab, Ammar
    Abawajy, Jemal
    Hobbs, Michael
    Layton, Robert
    Khraisat, Ansam
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1626 - 1632
  • [5] A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
    Alazzam, Hadeel
    Sharieh, Ahmad
    Sabri, Khair Eddin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2020, 148 (148)
  • [6] Althubiti SA, 2018, 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P293
  • [7] A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU
    Bhattacharya, Sweta
    Krishnan, Siva Rama S.
    Maddikunta, Praveen Kumar Reddy
    Kaluri, Rajesh
    Singh, Saurabh
    Gadekallu, Thippa Reddy
    Alazab, Mamoun
    Tariq, Usman
    [J]. ELECTRONICS, 2020, 9 (02)
  • [8] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [9] Network Intrusion Detection for IoT Security Based on Learning Techniques
    Chaabouni, Nadia
    Mosbah, Mohamed
    Zemmari, Akka
    Sauvignac, Cyrille
    Faruki, Parvez
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03): : 2671 - 2701
  • [10] Choudhary G, 2018, INT WIREL COMMUN, P560, DOI 10.1109/IWCMC.2018.8450305