Enhancing Cyber security Frameworks: Integrating Pigeon-Inspired Optimization and Dense Neural Networks for Advanced Intrusion Detection Using the CIC-IDS-2017 Dataset.

Authors

  • A. Prashanthi Research Scholar Department of CSE, Osmania University, Hyd.
  • R. Ravinder Reddy Associate Professor, Dept. of CSE Chaitanya Bharathi Institute of Technology, TS, India

Keywords:

Intrusion Detection Systems, zero-day attacks, Convolutional Neural Networks, Pigeon Inspired Optimization(PIO), Deep Neural Networks, Dense Neural Networks, operational efficiency, network security enhancement

Abstract

This paper presents a novel approach to bolster network intrusion detection systems through the synergy of Dense Neural Networks (DNN) and Pigeon-Inspired Optimization (PIO). Leveraging the principles of bio-inspired swarm intelligence, this methodology significantly augments the execution of intrusion recognition on the widely recognized CIC-IDS-2017 dataset. The core of this research revolves around utilizing PIO for the meticulous optimization of hyper parameters and features in a DNN architecture tailored for intrusion detection. The effectiveness of PIO is meticulously analyzed, with a focus on its role in feature selection and hyper parameter adjustment to enhance model efficiency. The optimized DNN structure demonstrates exceptional precision, evidenced by a minimal loss of 0.005 and an impressive accuracy rate of 99.91%. The model's prowess is further assessed through a system of measurement such as recall, accuracy and F1-score across various classes, providing a comprehensive evaluation of its performance. Despite the model's overall efficacy, challenges about memory consumption are acknowledged. A significant outcome of this research is the validation of the impact of biologically influenced optimization and feature selection in enhancing intrusion detection systems. The model's high accuracy with a reduced feature set underscores the value of streamlined models in practical applications. Furthermore, the paper proposes adjustments to the model architecture and other refinement techniques aimed at addressing existing limitations and boosting performance. The findings and methodologies introduced in this research offer cyber security experts innovative tools and strategies in network security, particularly in optimizing intrusion detection systems. This advancement marks a significant contribution to the field, promising more effective and efficient cyber security solutions.

Downloads

Download data is not yet available.

References

T. Wisanwanichthan and M. Thammawichai, "A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM," in IEEE Access, vol. 9, pp. 138432-138450, 2021.

Mausumi Das Nath, TapalinaBhattasali. (2020). Anomaly Detection Using Machine Learning Approaches. Azerbaijan Journal of High-Performance Computing. 3 (2), p196-206.

Ying Zhong, Wenqi Chen, Zhiliang Wang, Yifan Chen, Kai Wang, Yahui Li, Xia Yin, Xingang Shi, Jiahai Yang, Keqin Li, HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning, Computer Networks, Volume 169, 2020, 107049, ISSN 0167-4048, https://doi.org/10.1016/j.comnet.2020.101752.

Z. R. Zeng, W. Peng and D. Zeng, "Improving the Stability of Intrusion Detection with Causal Deep Learning," in IEEE Transactions on Network and Service Management, 2022, doi: 10.1109/TNSM.2022.3193099.

A.Tajbakhsh, M. Rahmati, and A. Mirzaei, “Intrusion detection using fuzzy association rules,” Applied Soft Computing, vol. 9, no. 2, pp. 462–469, 2019.

P. Barnard, N. Marchetti, and L. A. DaSilva, "Robust Network Intrusion Detection Through Explainable Artificial Intelligence (XAI)," in IEEE Networking Letters, vol. 4, no. 3, pp. 167-171, Sept. 2022, doi: 10.1109/LNET.2022.3186589.

H. Benaddi, K. Ibrahimi, A. Benslimane, M. Jouhari and J. Qadir, "Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game," in IEEE Transactions on Vehicular Technology, vol. 71, no. 10, pp. 11089-11102, Oct. 2022, doi: 10.1109/TVT.2022.3186834.

Redhwan Al-amri, Raja Kumar Murugesan, Mustafa Man, Alaa Fareed Abdulateef, Mohammed A. Al-Sharafi and Ammar Ahmed Alkahtani. (2021). A Review of Machine Learning and Deep Learning Techniques for Anomaly Detection in IoT Data. MDPI, p1-23.

Zhu, M., Ye, K., & Xu, C.-Z. (2018). Network Anomaly Detection and Identification Based on Deep Learning Methods. Cloud Computing – CLOUD 2018, 219–234. doi:10.1007/978-3-319-94295-7_15.

Samir Ifzarne, Hiba Tabbaa, ImadHafidi, NidalLamghari. (2021). Anomaly Detection using Machine Learning Techniques in Wireless Sensor Networks. The International Conference on Mathematics & Data Science (ICMDS). 1743, p1-14.

Tama, B.A., Comuzzi, M., & Rhee, K.H. (2019). TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System. IEEE Access, 7, 94497-94507.

A. Tajbakhsh, M. Rahmati, and A. Mirzaei, “Intrusion detection using fuzzy association rules,” Applied Soft Computing, vol. 9, no. 2, pp. 462–469, 2019.

Saranya Kunasekaran1 and ChellammalSuriyanarayanan. (2020). Anomaly detection techniques for streaming data–An overview. Malaya Journal of Matematik. S (1), p703-710.

Xu, Wen & Jang-Jaccard, Julian & Singh, Amardeep & Wei, Yuanyuan & Sabrina, Fariza. (2021). Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset. IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3116612.

Oseni et al., "An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks," in IEEE Transactions on Intelligent Transportation Systems, 2022, doi: 10.109/TITS.2022.3188671.

S. Subbiah, K. S. M. Anbananthen, S. Thangaraj, S. Kannan and D. Chelliah, "Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm," in Journal of Communications and Networks, vol. 24, no. 2, pp. 264-273, April 2022, doi: 10.23919/JCN.2022.000002.

Chiranjit Das, Akhtar Rasool, Aditya Dubey and Nilay Khare, “Analyzing the Performance of Anomaly Detection Algorithms” International Journal of Advanced Computer Science and Applications(IJACSA),12(6), 2021. http://dx.doi.org/10.14569/IJACSA.2021.0120649.

Chiranjit Das1, Akhtar Rasool2, Aditya Dubey3, NilayKhare. (2021). Analyzing the Performance of Anomaly Detection Algorithms. (IJACSA) International Journal of Advanced Computer Science and Applications. 12 (6), p439-445.

Z. A. E. Houda, B. Brik and L. Khoukhi, "“Why Should I Trust Your IDS?”: An Explainable Deep Learning Framework for Intrusion Detection Systems in Internet of Things Networks," in IEEE Open Journal of the Communications Society, vol. 3, pp. 1164-1176, 2022, doi: 10.1109/OJCOMS.2022.3188750.

S. Das et al., "Network Intrusion Detection and Comparative Analysis using Ensemble Machine Learning and Feature Selection," in IEEE Transactions on Network and Service Management.

Dhanush P.M. Naik1, I. Rohit Satya2, Chaitra B.H.3, VishalakshiPrabhu H. (2020). Anomaly Detection: Different Machine Learning Techniques, A Review. International Journal of Advanced Research in Computer and Communication Engineering. 9 (4), p1-5.

J. Yoo, B. Min, S. Kim, D. Shin and D. Shin, "Paper on Network Intrusion Detection Method Using Discrete Pre-Processing Method and Convolution Neural Network," in IEEE Access, vol. 9, pp. 142348-142361, 2021, doi: 10.1109/ACCESS.2021.3120839.

T. Wisanwanichthan and M. Thammawichai, "A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM," in IEEE Access, vol. 9, pp. 138432-138450, 2021.

Chiranjit Das, Akhtar Rasool, Aditya Dubey and Nilay Khare, “Analyzing the Performance of Anomaly Detection Algorithms” International Journal of Advanced Computer Science and Applications(IJACSA),12(6), 2021. http://dx.doi.org/10.14569/IJACSA.2021.0120649.

Elmrabit, Nebrase; Zhou, Feixiang; Li, Fengyin; Zhou, Huiyu. (2022). Evaluation of Machine Learning Algorithms for Anomaly Detection. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), p1-9.

Andrey Kharitonova, AbdulrahmanNahhasa, Matthias Pohla, Klaus Turowskia. (2022). Comparative analysis of machine learning models for anomaly detection in manufacturing. Elsevier. 200, p1288–1297.

Redhwan Al-amri, Raja Kumar Murugesan, Mustafa Man, Alaa Fareed Abdulateef, Mohammed A. Al-Sharafi and Ammar Ahmed Alkahtani. (2021). A Review of Machine Learning and Deep Learning Techniques for Anomaly Detection in IoT Data. MDPI, p1-23.

Chiranjit Das1, Akhtar Rasool2, Aditya Dubey3, NilayKhare. (2021). Analyzing the Performance of Anomaly Detection Algorithms. (IJACSA) International Journal of Advanced Computer Science and Applications. 12 (6), p43-445.

Samir Ifzarne, Hiba Tabbaa, ImadHafidi, NidalLamghari. (2021). Anomaly Detection using Machine Learning Techniques in Wireless Sensor Networks. The International Conference on Mathematics & Data Science (ICMDS). 1743, p1-14.

Manimaran, A.; Chandramohan, D.; Shrinivas, S. G.; Arulkumar, N. (2020). A comprehensive novel model for network speech anomaly detection system using deep learning approach. International Journal of Speech Technology, p1-9.

Mausumi Das Nath, TapalinaBhattasali. (2020). Anomaly Detection Using Machine Learning Approaches. Azerbaijan Journal of High-Performance Computing. 3 (2), p196-206.

Saranya Kunasekaran1 and ChellammalSuriyanarayanan. (2020). Anomaly detection techniques for streaming data–An overview. Malaya Journal of Matematik. S (1), p703-710.

Shane Brady, Damien Magoni, John Murphy, HaythamAssem, A. Omar Omar Portillo-Dominguez. (2020). Analysis of Machine Learning Techniques for Anomaly Detection in the Internet of Things, p1-7.

Chuadhry Mujeeb Ahmed, Gauthama Raman M R, Aditya Mathur. (2020). Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems, p1-6.

Dhanush P.M. Naik1, I. Rohit Satya2, Chaitra B.H.3, VishalakshiPrabhu H. (2020). Anomaly Detection: Different Machine Learning Techniques, A Review. International Journal of Advanced Research in Computer and Communication Engineering. 9 (4), p1-5.

Sydney Mambwe Kasongo, Yanxia Sun, A deep learning method with wrapper based feature extraction for wireless intrusion detection system, Computers & Security, Volume 92, 2020, 101752, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101752.

Ashfaq Khan, Muhammad & Karim, Rezaul & Kim, Yangwoo. (2019). A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network. Symmetry. 11. 583. 10.3390/sym11040583.

Ying Zhong, Wenqi Chen, Zhiliang Wang, Yifan Chen, Kai Wang, Yahui Li, Xia Yin, Xingang Shi, Jiahai Yang, Keqin Li, HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning, Computer Networks, Volume 169, 2020, 107049, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2020.101752.

Tama, B.A., Comuzzi, M., & Rhee, K.H. (2019). TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System. IEEE Access, 7, 94497-94507.

A.Tajbakhsh, M. Rahmati, and A. Mirzaei, “Intrusion detection using fuzzy association rules,” Applied Soft Computing, vol. 9, no. 2, pp. 462–469, 2019.

Zhu, M., Ye, K., & Xu, C.-Z. (2018). Network Anomaly Detection and Identification Based on Deep Learning Methods. Cloud Computing – CLOUD 2018, 219–234. doi:10.1007/978-3-319-94295-7_15.

TusharRakshe and Vishal Gonjari. (2017). Anomaly based Network Intrusion Detection using Machine Learning Techniques. . International Journal of Engineering Research & Technology (IJERT). 6 (5), p1-5.

Downloads

Published

11.01.2024

How to Cite

Prashanthi, A. ., & Reddy, R. R. . (2024). Enhancing Cyber security Frameworks: Integrating Pigeon-Inspired Optimization and Dense Neural Networks for Advanced Intrusion Detection Using the CIC-IDS-2017 Dataset. International Journal of Intelligent Systems and Applications in Engineering, 12(11s), 220–233. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4441

Issue

Section

Research Article