An Intrusion Detection System Based on Data Analytics and Convolutional Neural Network in NSS-KDD dataset

Dr.D.Kalaivani

Associate Professor and Head, Department of Computer Technology Dr.SNS Rajalakshmi College of Arts and Science,Coimbatore India.

Corresponding Author: dkalaivani77@gmail.com

N.P.G. Bhavani

Department of ECE, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai. India

Corresponding Author: sbreddy@gmail.com

V. Srividhya

Department of Electrical and Electronics Engineering, Meenakshi College of Engineering, Chennai, India

T. Kalpalatha

Department of ECE, S.V. Engineering College for Women, Karakambadi, Tirupati, India

Corresponding Author:drkalpalatha.thokala@gmail.com

B. Latha

Department of Physics, Dr. M.G.R. Educational and Research Institute, Chennai-600095, Tamilnadu, India

U. Jayalatsumi

Department of ECE, Dr. MGR Educational & Research Institute,Chennai, Tamil Nadu, India

T.Kavitha

Department of Civil Engineering, Dr. MGR Educational & Research Institute,Chennai, Tamil Nadu, India

A. Ganesan

Department of ECE, S.V. Engineering College for Women, Karakambadi, Tirupati, India

Corresponding Author:ragmephd@gmail.com

A. Kalaivani

Department of CSE, Saveetha School of Engineering, SIMATS, Chennai, Tamil Nadu, India

Corresponding Author:kalaivanianbarasan@rediffmail.com

Su-Qun Cao

Faculty of Electronic Information Engineering, Huaiyin Institute of Technology, China

Abstract :

Due to the internet's quick growth, intrusion attacks have been growing exponentially, making them a very important worry in the modern era. Cyber-attacks can target any of the millions of users of the internet, as well as international companies and government agencies. The creation of sophisticated algorithms to identify these network breaches is therefore one of the most important tasks in the field of cyber-security research. In order to recognise malicious traffic inputs, intrusion detection systems (IDS) are trained using data from internet traffic logs. Utilizing these techniques, malicious traffic inputs are detected. The most often used database for internet traffic record data is that maintained by the Network Security Laboratory's Knowledge Discovery and Data Mining (NSL-KDD) team. It also acts as the benchmark for present-day internet traffic. This framework seeks to discriminate between normal and abnormal (Denial of Service (DoS), Probe, User to Root (U2R), and Remote to Local (R2L)) categories in the NSL-KDD database with high detection precision and low false alarm rates. Several classifiers, including Naive Bayes (NB), K-Nearest Neighbour (KNN), Support Vector Machine (SVM), linear discriminant analysis (LDA), and Convolution Neural Network, will be used to achieve this (CNN). The unique and cutting-edge supervised detection techniques will be used in this study as the fundamental approaches to address the issue of the need for more labelled data during the IDS training process. The results of the trials show that, in terms of classification performance, the CNN classifier outperforms both recently presented approaches and other methods that are currently in use.

Reference

[1].https://www.businesswire.com/news/home/20190516005700/en/Strategy-Analytics-Internet-of-Things-Now-Numbers-22-Billion-Devices-But-Where-Is-The-Revenue.

[2].A. Wang, "Internet of Things Computer Network Security and Remote Control Technology Application," 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), 2020, pp. 1814-1817.

[3].L. Nie et al., "Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach," in IEEE Transactions on Computational Social Systems, vol. 9, no. 1, pp. 134-145, Feb. 2022.

[4].I. Kotenko, I. Saenko, O. Lauta and M. Karpov, "Situational Control of a Computer Network Security System in Conditions of Cyber Attacks," 2021 14th International Conference on Security of Information and Networks (SIN), 2021, pp. 1-8.

[5].B. Ge and J. Xu, "Analysis of Computer Network Security Technology and Preventive Measures under the Information Environment," 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), 2020, pp. 1978-1981.

[6].U. S. Musa, M. Chhabra, A. Ali and M. Kaur, "Intrusion Detection System using Machine Learning Techniques: A Review," 2020 International Conference on Smart Electronics and Communication (ICOSEC), 2020, pp. 149-155.

[7].B. Xu, S. Chen, H. Zhang and T. Wu, "Incremental k-NN SVM method in intrusion detection," 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2017, pp. 712-717.

[8].Anish Halimaa A, K. Sundarakantham: Machine Learning Based Intrusion Detection System. In: Proceedings of the Third International Conference on Trends in Electronics and Informatics, pp. 916–920. IEEE Xplore, Tirunelveli, India (2019).

[9].E. D. Alalade, "Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach," 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020, pp. 1-2.

[10].R. Doshi, N. Apthorpe and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices," 2018 IEEE Security and Privacy Workshops (SPW), 2018, pp. 29-35.

[11].B. Ingre and A. Yadav, "Performance analysis of NSL-KDD dataset using ANN," 2015 International Conference on Signal Processing and Communication Engineering Systems, 2015, pp. 92-96.

[12].Mubarak Albarka Umar, Chen Zhanfang Effects of Feature Selection and Normalization on NetworkIntrusion Detection, Communication, Networking and Broadcast Technologies, 2020, 10.36227/techrxiv.12480425.v2.

[13].Cremer, F., Sheehan, B., Fortmann, M. et al. Cyber risk and cybersecurity: a systematic review of data availability. Geneva Pap Risk Insur Issues Pract 47, 698–736 (2022).

[14].Y. Gu, K. Li, Z. Guo, and Y. Wang, “Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm,” IEEE Access, vol. 7, pp. 64351–64365, 2019.

[15].I. Abrar, Z. Ayub, F. Masoodi and A. M. Bamhdi, "A Machine Learning Approach for Intrusion Detection System on NSL-KDD Dataset," 2020 International Conference on Smart Electronics and Communication (ICOSEC), 2020, pp. 919-924.

[16].S. Dwibedi, M. Pujari and W. Sun, "A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research," 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 2020, pp. 1-6.

[17].A. Ali et al., "Network Intrusion Detection Leveraging Machine Learning and Feature Selection," 2020 IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), 2020, pp. 49-53.

[18].F. Z. Belgrana, N. Benamrane, M. A. Hamaida, A. Mohamed Chaabani and A. Taleb-Ahmed, "Network Intrusion Detection System Using Neural Network and Condensed Nearest Neighbors with Selection of NSL-KDD Influencing Features," 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), 2021, pp. 23-29.

[19].W. Wang, X. Du, D. Shan, R. Qin and N. Wang, "Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine," in IEEE Transactions on Cloud Computing, 2020.

[20].S. Subbiah, K. S. M. Anbananthen, S. Thangaraj, S. Kannan and D. Chelliah, "Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm," in Journal of Communications and Networks, vol. 24, no. 2, pp. 264-273, April 2022.

[21].X. Zhang, J. Ran and J. Mi, "An Intrusion Detection System Based on Convolutional Neural Network for Imbalanced Network Traffic," 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT), 2019, pp. 456-460.

© The Author(s), under exclusive license to Technoarete Publishers 2022
  • ISBN -
  • Instant PDF download
  • Readable on all devices
doi.org/10.36647/MLAIDA/2022.12.B1.Ch007