Efficient Intrusion Detection Using Deep Learning Approaches

Authors

  • V. Sathyendra Kumar Research Scholar, BIHER, Chennai & Assistant Professor, Department of MCA, Annamacharya Institute of Technology & Sciences (Autonomous), New Boyanapalli, Rajampet, Kadapa(Dt.), Phone: 09985666531,
  • A. Muthukumaravel Dean, Faculty of Arts & Science, Professor & HOD- MCA,BIHER, Chennai,

Keywords:

Intrusion Detection, Deep Learning, Accuracy, Network Attacks, Accuracy

Abstract

The main element in life is privacy, even in usual day-to-day life or in the world of the cloud.  The major idea which is beyond the IDS concepts in a system is to discontinue the unknown events occurring from the surrounding or between the systems. It is suggested that the IDS be sent at two focuses. As there is a firewall securing the host organization or the private organization, it is smarter to put the IDS behind the firewall. The IDS sent can work effectively and search for suspicious events inside the organization. The attacks come from outside the host organization, or from the web that is attempting to send information to the host system.  This research work can help in constructing IDS, using deep learning methods such as XGBoost, and MLP that can watch out for the information entering an organization and all the while sort out the unauthorized events.  Among the two methods, MLP produces a better result in terms of accuracy value of about 89.5% compared to XG Boost algorithm which is 88% respectively.

Downloads

Download data is not yet available.

References

Arnaldo Gouveia1 & Miguel Correia(2019),” Network Intrusion Detection with XGBoost”, IEEE Transaction August 2019.

T. Chandrakala, S. Nirmala Sugirtha Rajini, K. Dharmarajan & K. Selvam(2021), “Implementation Of Data Mining And Machine Learning In The Concept Of Cybersecurity To Overcome Cyber Attack", Turkish Journal of Computer and Mathematics Education Vol.12 No. 12, pp. 4561-4571.

Sukhpreet Singh Dhaliwal, Abdullah-Al Nahid & Robert Abbas(2018), “Effective Intrusion Detection System Using XGBoost”, Information MDPI, Vol. 9, pp. 1024.

K. Anuradha, S. Nirmala SugirthaRajini, T.Bhuvaneswari & Viji Vinod (2020), “TCP /SYN Flood of Denial of Service (DOS) Attack UsingSimulation “, Test Engineering & Management, January - February 2020 ISSN: 0193 - 4120 Page No. 14553 – 14558.

Parag Verma; Shayan Anwar, Shadab Khan & Sunil B Mane(2018), “Network Intrusion Detection Using Clustering and Gradient Boosting “, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-7,

K. Anuradha & S. Nirmala Sugirtha Rajini(2020), Analysis of Machine Learning Algorithm in IoT Security Issues and Challenges", Jour of Adv Research in Dynamical & Control Systems Vol. 11, 09-Special Issue, pp. 1030-1034.

Hui Jiang, Zheng He, Gang Ye & Huyin Zhang(2020), “Network Intrusion Detection Based on PSO-Xgboost Model”, IEEE Access, pp. 58392 – 58401.

Madhuri R. Yadav & Prashant Kumbharkar(2014), “Intrusion Detection System with FGA and MLP Algorithm”, International Journal of Engineering Research & Technology (IJERT) Vol. 3, No. 2, pp. 2431-2435.

K.Pavani & A.Damodaram(2013), “ Intrusion Detection Using Mlp For Manets “, Third International Conference on Computational Intelligence and Information Technology (CIIT 2013). doi:10.1049/cp.2013.2626, pp. 440-444.

Mehdi Moradi & Mohammad Zulkernine, "A Neural Network-Based System for Intrusion Detection and Classification of Attacks", https://citeseerx.ist.psu.edu/, pp. 1-6.

De Almeida Florencio, F., Moreno Ordonez, E. D., Teixeira Macedo, H., Paiva De Britto Salgueiro, R. J., Barreto Do Nascimento, F., & Oliveira Santos, F. A. (2018) “Intrusion Detection via MLP Neural Network Using an Arduino Embedded System” VIII Brazilian Symposium on Computing Systems Engineering (SBESC), PP. 190-195.

Purpose of IDS

Downloads

Published

19.12.2022

How to Cite

V. Sathyendra Kumar, & A. Muthukumaravel. (2022). Efficient Intrusion Detection Using Deep Learning Approaches. International Journal of Intelligent Systems and Applications in Engineering, 10(2s), 180–183. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2381

Issue

Section

Research Article