Intrusion Detection System Using Recurrent Neural Network-Long Short-Term Memory

Authors

  • Kishor P. Jadhav Ph.D. Research Scholar, Department of Computer Science and Engineering, Bhabha University, Bhopal, Madhya Pradesh, India
  • Tripti Arjariya Head, Department of Computer Science and Engineering, Bhabha University, Bhopal, Madhya Pradesh, India
  • Mohit Gangwar Director (Alumni Cell), B. N. College of Engineering and Technology, Lucknow

Keywords:

Intrusion Detection system, Recurrent Neural Network, Long Short Term Memory, Deep Learning

Abstract

To build an Intrusion Detection System (IDS) for identifying and categorising cyber-attacks in a prompt and autonomous manner both on the network and the host level, machine learning approaches are being utilized extensively. On the other hand, due to the fact that malicious attacks are always evolving and taking place in extremely high volumes, it is necessary to develop a solution that can be scaled up. The cyber security community has access to a variety of malware datasets that can be used for further research in the public domain. Furthermore, no study that is currently accessible has given a complete evaluation of the effectiveness of different machine learning techniques on different datasets that are publicly available. A form of hybrid deep learning model, Recurrent Neural Network-Long Short Term Memory (RNN-LSTM) is investigated in this paper with the goal of developing a flexible and effective intrusion detection system that can detect and classify unanticipated and unforeseen cyber-attacks using the datasets KDDCup99 and NSLKDD. The results of this type of study make it easier to select the optimal algorithm that has the potential to effectively work in identifying future cyber attacks. By using the KDDCup and NSLKDD datasets, a thorough analysis of experiments evaluating RNN-LSTM and other traditional machine learning classification models is shown. The abstract as well as high-dimensional feature representation of the intrusion detection system data is used to develop the RNN-LSTM model that was developed by feeding the features into a large number of hidden layers. Two experiments using binary and 5- group classification method has been performed, it is observed from these experiments that the performance of RNN-LSTM method based on binary classification is 83.29% and 68.59% using KDD Cup 99 and NSLKDD dataset which is better as compared to other conventional machine learning classifier and 5-group classification method.

Downloads

Download data is not yet available.

References

H. Yang, Y. Bai, T. Chen, Y. Shi, R. Yang and H. Ma, "Intrusion Detection Model For Power Information Network Based On Multi-layer Attention Mechanism," 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 2022, pp. 825-828, doi: 10.1109/ITAIC54216.2022.9836897.

S. Amutha, K. R, S. R and K. M, "Secure network intrusion detection system using NID-RNN based Deep Learning," 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India, 2022, pp. 1-5, doi: 10.1109/ACCAI53970.2022.9752526.

K. Yu, K. Nguyen and Y. Park, "Flexible and Robust Real-Time Intrusion Detection Systems to Network Dynamics," in IEEE Access, vol. 10, pp. 98959-98969, 2022, doi: 10.1109/ACCESS.2022.3199375.

A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi and R. Ahmad, "CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System," in IEEE Access, vol. 10, pp. 99837-99849, 2022, doi: 10.1109/ACCESS.2022.3206425.

V. Rajasekar, S. Sarika, V. S, I. T. Joseph S and K. K. S, "An Efficient Intrusion Detection Model Based on Recurrent Neural Network," 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), Ballari, India, 2022, pp. 1-6, doi: 10.1109/ICDCECE53908.2022.9793016.

U. Mbasuva and G. -A. L. Zodi, "Designing Ensemble Deep Learning Intrusion Detection System for DDoS attacks in Software Defined Networks," 2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), Seoul, Korea, Republic of, 2022, pp. 1-8, doi: 10.1109/IMCOM53663.2022.9721785.

I. Ullah and Q. H. Mahmoud, "Design and Development of RNN Anomaly Detection Model for IoT Networks," in IEEE Access, vol. 10, pp. 62722-62750, 2022, doi: 10.1109/ACCESS.2022.3176317.

A. Singh, V. Bhandari and R. Srivastava, "Optimization Accuracy of Intrusion Detection of Imbalanced Network using PCA and Conv1D-LSTM Technique," 2022 3rd International Conference for Emerging Technology (INCET), Belgaum, India, 2022, pp. 1-6, doi: 10.1109/INCET54531.2022.9824763.

B. Budler and R. Ajoodha, "Comparative Analysis of Deep Learning Models for Network Intrusion Detection Systems," 2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS), Debrecen, Hungary, 2022, pp. 45-50, doi: 10.1109/CITDS54976.2022.9914128.

H. Babbar, O. Bouachir, S. Rani and M. Aloqaily, "Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection Systems," NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 2022, pp. 1-6, doi: 10.1109/NOMS54207.2022.9789829.

R. Kavitha and S. Amutha, "Performance Analysis of Deep Neural Network and LSTM models for Secure Network Intrusion Detection System," 2022 IEEE 4th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), Goa, India, 2022, pp. 390-396, doi: 10.1109/ICCCMLA56841.2022.9989253.

D. Ding, L. Zhu, J. Xie and J. Lin, "In-Vehicle Network Intrusion Detection System Based on Bi-LSTM," 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), Xi'an, China, 2022, pp. 580-583, doi: 10.1109/ICSP54964.2022.9778620.

G. Ketepalli and P. Bulla, "Feature Extraction using LSTM Autoencoder in Network Intrusion Detection System," 2022 7th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2022, pp. 744-749, doi: 10.1109/ICCES54183.2022.9835788.

B. Deore and S. Bhosale, "Hybrid Optimization Enabled Robust CNN-LSTM Technique for Network Intrusion Detection," in IEEE Access, vol. 10, pp. 65611-65622, 2022, doi: 10.1109/ACCESS.2022.3183213.

Y. Yu, X. Zeng, X. Xue and J. Ma, "LSTM-Based Intrusion Detection System for VANETs: A Time Series Classification Approach to False Message Detection," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 23906-23918, Dec. 2022, doi: 10.1109/TITS.2022.3190432.

J. Li, "Research on Intrusion Detect System of Internet of Things based on Deep Learning," 2022 International Conference on Machine Learning and Knowledge Engineering (MLKE), Guilin, China, 2022, pp. 55-58, doi: 10.1109/MLKE55170.2022.00016.

M. D. Rokade and S. S. Khatal, "Detection of Malicious Activities and Connections for Network Security using Deep Learning," 2022 IEEE Pune Section International Conference (PuneCon), Pune, India, 2022, pp. 1-6, doi: 10.1109/PuneCon55413.2022.10014736.

J. Bi, Z. Guan and H. Yuan, "Hybrid Network Intrusion Detection with Stacked Sparse Contractive Autoencoders and Attention-based Bidirectional LSTM," 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Prague, Czech Republic, 2022, pp. 6-11, doi: 10.1109/SMC53654.2022.9945600.

A. Bhardwaj, S. S. Chandok, A. Bagnawar, S. Mishra and D. Uplaonkar, "Detection of Cyber Attacks: XSS, SQLI, Phishing Attacks and Detecting Intrusion Using Machine Learning Algorithms," 2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT), New Delhi, India, 2022, pp. 1-6, doi: 10.1109/GlobConPT57482.2022.9938367.

M. A. Razib, D. Javeed, M. T. Khan, R. Alkanhel and M. S. A. Muthanna, "Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework," in IEEE Access, vol. 10, pp. 53015-53026, 2022, doi: 10.1109/ACCESS.2022.3172304.

M. Asaduzzaman and M. M. Rahman, "An Adversarial Approach for Intrusion Detection Using Hybrid Deep Learning Model," 2022 International Conference on Information Technology Research and Innovation (ICITRI), Jakarta, Indonesia, 2022, pp. 18-23, doi: 10.1109/ICITRI56423.2022.9970221.

A. F. Almutairi and A. Abdulghani Alshargabi, "Using Deep Learning Technique to Protect Internet Network from Intrusion in IoT Environment," 2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA), Ibb, Yemen, 2022, pp. 1-6, doi: 10.1109/eSmarTA56775.2022.9935467.

H. Chi and C. Lin, "Industrial Intrusion Detection System Based on CNN-Attention -BILSTM Network," 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS), Huaihua City, China, 2022, pp. 32-39, doi: 10.1109/ICBCTIS55569.2022.00019.

Z. Jie, "IoT-Network Attack Detection with Optimized Recurrent Neural Network and Optimal Feature Selection," 2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA), Dalian, China, 2022, pp. 951-957, doi: 10.1109/ICDSCA56264.2022.9987890.

H. Hou, Z. Di, M. Zhang and D. Yuan, "An Intrusion Detection Method for Cyber Monintoring Using Attention based Hierarchical LSTM," 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Jinan, China, 2022, pp. 125-130, doi: 10.1109/BigDataSecurityHPSCIDS54978.2022.00032.

Downloads

Published

16.04.2023

How to Cite

Kishor P. Jadhav, Tripti Arjariya, & Mohit Gangwar. (2023). Intrusion Detection System Using Recurrent Neural Network-Long Short-Term Memory. International Journal of Intelligent Systems and Applications in Engineering, 11(5s), 563–573. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2817

Most read articles by the same author(s)