Intrusion Detection System using Long Short-Term Memory and Fully Connected Neural Network on Kddcup99 and NSL-KDD Dataset

Authors

  • Ankit Chakrawarti Department of Computer Science and Engineering, Rabindranath Tagore University, Raisen(M.P.)
  • Shiv Shakti Shrivastava Department of Computer Science and Engineering, Rabindranath Tagore University, Raisen(M.P.)

Keywords:

Intrusion Detection, LSTM, CNN, KDDCup99

Abstract

Implementing intrusion detection models, which include locating and categorizing unauthorized access to a computer network or information system, often uses machine learning techniques. However, numerous difficulties occur as a result of the fact that cybercriminals constantly alter their attack techniques in response to the discovery of new system vulnerabilities. The number of efforts to harm is quickly increasing, and as a consequence, traditional methods cannot analyses massive amounts of data. Therefore, a comprehensive detection strategy that incorporates scalable solutions is necessary to solve the issue. A deep learning model is offered to solve the intrusion classification challenge properly. , Deep Learning (DL) algorithms have produced very accurate outcomes for handling various problems in practically various area. Deep learning methods such as LSTM (Long Short-Term Memory) and FCNN (Fully Connected Neural Network) categorize benign and malicious connections on intrusion datasets. A more precise categorization of multi-class assault patterns is the goal of this endeavor. When applied to five-class issues, the deep learning model that was suggested produces more accurate classifications. When run on the KDDCup99 dataset, it reaches an accuracy of 99.99%, and when run on the NSL-KDD dataset, it reaches 99.95%.In both data set our model secure maximum output.

Downloads

Download data is not yet available.

References

R. Javed, S. u. Rehman, M. U. Khan, M. Alazab and T. R. G, "CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU," in IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1456-1466, 1 April-June 2021, doi: 10.1109/TNSE.2021.3059881.

Deore and S. Bhosale, "Hybrid Optimization Enabled Robust CNN-LSTM Technique for Network Intrusion Detection," in IEEE Access, vol. 10, pp. 65611-65622, 2022, doi: 10.1109/ACCESS.2022.3183213.

T. Wisanwanichthan and M. Thammawichai, "A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM," in IEEE Access, vol. 9, pp. 138432-138450, 2021, doi: 10.1109/ACCESS.2021.3118573.

S. Ho, S. A. Jufout, K. Dajani and M. Mozumdar, "A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks Using Convolutional Neural Network," in IEEE Open Journal of the Computer Society, vol. 2, pp. 14-25, 2021, doi: 10.1109/OJCS.2021.3050917.

A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi and R. Ahmad, "CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System," in IEEE Access, vol. 10, pp. 99837-99849, 2022, doi: 10.1109/ACCESS.2022.3206425.

Z. Wang, Y. Zeng, Y. Liu and D. Li, "Deep Belief Network Integrating Improved Kernel-Based Extreme Learning Machine for Network Intrusion Detection," in IEEE Access, vol. 9, pp. 16062-16091, 2021, doi: 10.1109/ACCESS.2021.3051074.

J. Yoo, B. Min, S. Kim, D. Shin and D. Shin, "Study on Network Intrusion Detection Method Using Discrete Pre-Processing Method and Convolution Neural Network," in IEEE Access, vol. 9, pp. 142348-142361, 2021, doi: 10.1109/ACCESS.2021.3120839.

J. Alikhanov, R. Jang, M. Abuhamad, D. Mohaisen, D. Nyang and Y. Noh, "Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches," in IEEE Access, vol. 10, pp. 5801-5823, 2022, doi: 10.1109/ACCESS.2021.3137318.

M. E. Aminanto, R. S. H. Wicaksono, A. E. Aminanto, H. C. Tanuwidjaja, L. Yola and K. Kim, "Multi-Class Intrusion Detection Using Two-Channel Color Mapping in IEEE 802.11 Wireless Network," in IEEE Access, vol. 10, pp. 36791-36801, 2022, doi: 10.1109/ACCESS.2022.3164104.

H. Sun, M. Chen, J. Weng, Z. Liu and G. Geng, "Anomaly Detection for In-Vehicle Network Using CNN-LSTM With Attention Mechanism," in IEEE Transactions on Vehicular Technology, vol. 70, no. 10, pp. 10880-10893, Oct. 2021, doi: 10.1109/TVT.2021.3106940.

Liu, Z. Gu and J. Wang, "A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning," in IEEE Access, vol. 9, pp. 75729-75740, 2021, doi: 10.1109/ACCESS.2021.3082147.

S. Lei, C. Xia, Z. Li, X. Li and T. Wang, "HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis," in IEEE Transactions on Network Science and Engineering, vol. 8, no. 4, pp. 3257-3274, 1 Oct.-Dec. 2021, doi: 10.1109/TNSE.2021.3109644.

Z. Hu, L. Wang, L. Qi, Y. Li and W. Yang, "A Novel Wireless Network Intrusion Detection Method Based on Adaptive Synthetic Sampling and an Improved Convolutional Neural Network," in IEEE Access, vol. 8, pp. 195741-195751, 2020, doi: 10.1109/ACCESS.2020.3034015.

Y. Xiao, C. Xing, T. Zhang and Z. Zhao, "An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks," in IEEE Access, vol. 7, pp. 42210-42219, 2019, doi: 10.1109/ACCESS.2019.2904620.

K. Jiang, W. Wang, A. Wang and H. Wu, "Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network," in IEEE Access, vol. 8, pp. 32464-32476, 2020, doi: 10.1109/ACCESS.2020.2973730.

K. Wu, Z. Chen and W. Li, "A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks," in IEEE Access, vol. 6, pp. 50850-50859, 2018, doi: 10.1109/ACCESS.2018.2868993.

Y. Yu and N. Bian, "An Intrusion Detection Method Using Few-Shot Learning," in IEEE Access, vol. 8, pp. 49730-49740, 2020, doi: 10.1109/ACCESS.2020.2980136.

X. Xie, B. Wang, T. Wan and W. Tang, "Multivariate Abnormal Detection for Industrial Control Systems Using 1D CNN and GRU," in IEEE Access, vol. 8, pp. 88348-88359, 2020, doi: 10.1109/ACCESS.2020.2993335.

Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735–1780

Zhengmin Kong, Yande Cui, Zhou Xia, and He Lv. 2019. Convolution and long short-term memory hybrid deep neural networks for remaining useful life prognostics. Applied Sciences 9, 19 (2019), 4156.

Tuan A Tang, Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi, and Mounir Ghogho. 2018. Deep recurrent neural network for intrusion detection in sdn-based networks. In 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE, 202–206.

J. Kolluri, V. K. Kotte, M. S. B. Phridviraj and S. Razia, "Reducing Overfitting Problem in Machine Learning Using Novel L1/4 Regularization Method," 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020, pp. 934-938, doi: 10.1109/ICOEI48184.2020.9142992.

https://kdd.org/kdd-cup

https://www.unb.ca/cic/datasets/nsl.html

R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, "Deep learning approach for intelligent intrusion detection system," IEEE Access, vol. 7, pp. 41525–41550, Apr. 2019.

H. H. Pajouh, R. Javidan, R. Khayami, A. Dehghantanha, and K.-K.-R. Choo, "A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks," IEEE Trans. Emerg. Topics Comput., vol. 7, no. 2, pp. 314–323, Apr. 2019.

Y. Yang, K. Zheng, C. Wu, X. Niu, and Y. Yang, "Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks," Appl. Sci., vol. 9, no. 2, pp. 238–262, Jan. 2019.

P. Bedi, N. Gupta, and V. Jindal, "Siam-IDS: Handling class imbalance problem in intrusion detection systems using siamese neural network," Procedia Comput. Sci., vol. 171, pp. 780–789, Jan. 2020.

H. H. Pajouh, G. Dastghaibyfard, and S. Hashemi, "Two-tier network anomaly detection model: A machine learning approach," J. Intell. Inf. Syst., vol. 48, no. 1, pp. 61–74, Feb. 2017.

Y. N. Kunang, S. Nurmaini, D. Stiawan, and B. Y. Suprapto, "Attack classification of an intrusion detection system using deep learning and hyperparameter optimisation," J. Inf. Secur. Appl., vol. 58, pp. 102804–102818, Mar. 2021.

Bojan Mrazovac, Siniša Ranđić, Dragan Pamučar, and Dušan Vučković. (2020). "Intrusion Detection in IoT Network using LSTM-based Deep Learning Model." Expert Systems with Applications.

Fan Wu, Xinyu Yang, Youwen Yi, Fei Xiao, Xingang Wan, and Xuansong Li. (2019). "An Intelligent Intrusion Detection System Based on Deep Learning with LSTM." IEEE Access.

Hani Alzaid, Basheer Al-Duwairi, and Essam Al-Daoud. (2020). "Deep Learning Approaches for Intrusion Detection Systems: A Survey." Journal of Information Security and Applications.

Shivam Sharma, Samir Garg, Vijay Laxmi, and Manoj Singh Gaur. (2018). "LSTM-Based Botnet Detection Model for Internet of Things." International Journal of Distributed Sensor Networks.

S. Alsulaiman and H. M. Alzaidi. (2018). "Anomaly-based Network Intrusion Detection System using Deep Learning Techniques." International Journal of Advanced Computer Science and Applications.

Li Liu, Xiaoling Huang, Haoyang Lu, and Xingpeng Jiang. (2019). "Intrusion Detection System Based on Deep Learning with LSTM Model." IEEE International Conference on Communication Software and Networks.

Lusia Fitri, Masayu Leylia Khodra, and Husni Thamrin. (2019). "Network Intrusion Detection System Based on Deep Learning with LSTM-RNN." International Journal of Computer Science and Information Security.

Md Rafsan Nahar and Rabindra Kumar Barik. (2019). "Network Intrusion Detection System using Deep Learning Technique." International Journal of Advanced Computer Science and Applications.

Shanmugam, S. P. ., Vadivu, M. S. ., Anitha, D., Varun, M., & Saranya, N. N. . (2023). A Internet of Things Improvng Deep Neural Network Based Particle Swarm Optimization Computation Prediction Approach for Healthcare System. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 92–99. https://doi.org/10.17762/ijritcc.v11i4s.6311

Kshirsagar, P. R., Yadav, R. K., Patil, N. N., & Makarand L, M. (2022). Intrusion Detection System Attack Detection and Classification Model with Feed-Forward LSTM Gate in Conventional Dataset. Machine Learning Applications in Engineering Education and Management, 2(1), 20–29. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/21

Verma, M. K., & Dhabliya, M. D. (2015). Design of Hand Motion Assist Robot for Rehabilitation Physiotherapy. International Journal of New Practices in Management and Engineering, 4(04), 07–11.

Downloads

Published

12.07.2023

How to Cite

Chakrawarti, A. ., & Shrivastava, S. S. . (2023). Intrusion Detection System using Long Short-Term Memory and Fully Connected Neural Network on Kddcup99 and NSL-KDD Dataset. International Journal of Intelligent Systems and Applications in Engineering, 11(9s), 621–635. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3211

Issue

Section

Research Article