Anomaly based Intrusion Detection System using Hybrid ResNet50 and 3D Convolutional Neural Network

Authors

  • K. B. Teena School of CSE and IS, Presidency University, Bengaluru, India
  • Swati Sharma School of CSE and IS, Presidency University, Bengaluru, India

Keywords:

Black Widow Optimization, Convolutional Neural Network, Deep Learning, Intrusion Detection System, ResNet50

Abstract

An Intrusion Detection System (IDS) is used to monitor and analyze data to identify any intrusions that have been made into a system or network. Because of the large capacity of network data with redundant and irrelevant features, accurate and precise intrusion detection is challenging. To overcome this problem, this research proposed the Deep Learning (DL) approach of ResNet50 and 3D Convolutional Neural Network (CNN) with Black Widow Optimization (BWO) for detecting the network attacks in IDS. Initially, the input data is acquired from three public datasets named CICDDoS2019, NSL-KDD, and UNSW-NB15 datasets. The collected data is then pre-processed to preserve the redundancy using normalization. The pre-processed output is then provided to the feature selection process for compiling the optimum features by using Principal Component Analysis (PCA). The network weights are optimized using BWO to obtain the optimum solution for identifying intruders. According to the findings, the proposed method is more efficient and it achieves accuracy of 0.93, 0.96 and 0.99 on CICDDoS2019, UNSW-NB15 and NSL-KDD datasets when compared to existing methods like Deep Feed Forward Neural Network (DFNN), CNN and Generative Adversarial Network (GAN).

Downloads

Download data is not yet available.

References

G. Logeswari, S. Bose, and T. Anitha, “An intrusion detection system for sdn using machine learning,” Intell. Autom. Soft Comput., vol. 35, no. 1, pp. 867–880, Jan. 2023.

Z. Wu, H. Zhang, P. Wang, and Z. Sun, “RTIDS: A robust transformer-based approach for intrusion detection system,” IEEE Access, vol. 10, pp. 64375–64387, Jun. 2022.

R. Mangayarkarasi, V. Chandrasekaran, V. Ravi, and N. Kumar, “An intrusion detection system using optimized deep neural network architecture,” Trans. Emerging Telecommun. Technol., vol. 32, no. 4, p. e4221, Feb. 2021.

G. Apruzzese, L. Pajola, and M. Conti, “The cross-evaluation of machine learning-based network intrusion detection systems,” IEEE Trans. Netw. Serv. Manage., vol. 19, no. 4, pp. 5152–5169, Dec. 2022.

M. Vishwakarma and N. Kesswani, “DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT,” Decision Analytics Journal, vol. 5, p. 100142, Dec. 2022.

T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj, “Anomaly-based intrusion detection system for IoT networks through deep learning model,” Comput. Electr. Eng., vol. 99, p. 107810, Apr. 2022.

M. Soltani, B. Ousat, M. J. Siavoshani, and A. H. Jahangir, “An adaptable deep learning-based Intrusion Detection System to zero-day attacks,” J. Inf. Secur. Appl., vol. 76, p. 103516, Aug. 2023.

S. A. Hussein, A. A. Mahmood, and E. O. Oraby, “Network intrusion detection system using ensemble learning approaches,” Technology, vol. 18, pp. 962–974, Oct. 2021.

Y. Otoum, D. Liu, and A. Nayak, “DL‐IDS: a deep learning–based intrusion detection framework for securing IoT,” Trans. Emerging Telecommun. Technol., vol. 33, no. 3, p. e3803, Mar. 2022.

M. A. Khan and Y. Kim, “Deep learning-based hybrid intelligent intrusion detection system,” Comput. Mater. Contin, vol. 68, pp. 671–687, Sep. 2023.

G. N. Tikhe, and P. S. Patheja, “A wrapper feature selection based hybrid deep learning model for ddos detection in a network with nfv behaviors,” Wireless Pers. Commun., vol. 133, pp. 481–506, Dec. 2023.

T. Gaber, J. B. Awotunde, M. Torky, S. A. Ajagbe, M. Hammoudeh, and W. Li, “Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks,” Internet Things, vol. 24, p. 100977, Dec. 2023.

V. Ravi, R. Chaganti, and M. Alazab, “Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system,” Computers and Electrical Engineering, vol. 102, p. 108156, Sep. 2022.

V. Hnamte, H. Nhung-Nguyen, J. Hussain, and Y. Hwa-Kim, “A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE,” IEEE Access, vol. 11, pp. 37131–37148, Apr. 2023.

R. Chaganti, W. Suliman, V. Ravi, and A. Dua, “Deep learning approach for SDN-enabled intrusion detection system in IoT networks,” Information, vol. 14, no. 1, p. 41, Jan. 2023.

A. Awajan, “A novel deep learning-based intrusion detection system for IOT networks,” Computers, vol. 12, no. 2, p. 34, Feb. 2023.

H. Wang and W. Li, “DDosTC: A transformer-based network attack detection hybrid mechanism in SDN,” Sensors, vol. 21, no. 15, p. 5047, Jul. 2021

M. Sarhan, S. Layeghy, N. Moustafa, M. Gallagher, and M. Portmann, “Feature extraction for machine learning-based intrusion detection in IoT networks,” Digital Communications and Networks, Sep. 2022.

C. Zhang, X. Costa-Perez, and P. Patras, “Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms,” IEEE/ACM Trans. Networking, vol. 30, no. 3, pp. 1294–1311, Jan. 2022.

A. A. Megantara and T. Ahmad, “A hybrid machine learning method for increasing the performance of network intrusion detection systems,” J. Big Data, vol. 8, no. 1, pp. 1–19, Nov. 2021.

M. Zohre, S. TaghipourEivazi, B. Arasteh, and S. Babai, “An intrusion detection method to detect denial of service attacks using error-correcting output codes and adaptive neuro-fuzzy inference,” Computers and Electrical Engineering, vol. 106, p. 108600, Mar. 2023.

A. Abdullah, I. Aljarah, O. Al-Kadi, and R. Damaševičius, “A modified grey wolf optimization algorithm for an intrusion detection system,” Mathematics, vol. 10, no. 6, p. 999, Mar. 2022.

D. Shubhra, M. Vardhan, and S. Tripathi, “Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection,” Cluster Comput., vol. 24, pp. 1881–1900, Jan. 2021.

S. Rajagopal, P. P. Kundapur, and K. S. Hareesha, “Towards effective network intrusion detection: from concept to creation on Azure cloud,” IEEE Access, vol. 9, pp. 19723–19742, Jan. 2021.

J. F. C. Garcia and G. E. T. Blandon, “A deep learning-based intrusion detection and preventation system for detecting and preventing denial-of-service attacks,” IEEE Access, vol. 10, pp. 83043–83060, Aug. 2022.

A. K. Samha, N. Malik, D. Sharma, and P. Dutta, “Intrusion detection system using hybrid convolutional neural network,” Mobile Networks Appl., pp. 1–13, Aug. 2023.

B. C. Preethi, G. Sugitha, and G. Kavitha, “Cycle‐consistent generative adversarial network optimized with water strider optimization algorithm fostered intrusion detection framework for securing cloud computing environment,” Concurrency Comput. Pract. Exper., vol. 35, no. 5, p. e7552, Feb. 2023.

CICDDoS2019 dataset link: https://www.kaggle.com/datasets/dhoogla/cicddos2019.

NSL-KDD dataset link: https://www.kaggle.com/code/avk256/nsl-kdd-anomaly-detection.

UNSW-NB15 dataset link: https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb15.

V. Hnamte and J. Hussain, “DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system,” Telematics and Informatics Reports, vol. 10, p.100053, Jun. 2023.

S. A. Dheyab, S. M. Abdulameer, and S. Mostafa, “Efficient machine learning model for ddos detection system based on dimensionality reduction,” Acta Informatica Pragensia, vol. 11, no. 3, pp. 348–360, Dec. 2022.

P. Dahiya and Saha A. K., “Frequency regulation of interconnected power system using black widow optimization,” IEEE Access, vol. 10, pp. 25219–25236, Feb. 2022.

M. R. Falahzadeh, E. Z. Farsa, A. Harimi, A. Ahmadi, and A. Abraham, “3D Convolutional Neural network for speech emotion recognition with its realization on intel CPU and NVIDIA GPU,” IEEE Access, vol. 10, pp. 112460–112471, Oct. 2022.

W. Xiang, X. Wu, C. Li, W. Zhang, and F. Li, “Driving fatigue detection based on the combination of multi-branch 3d-cnn and attention mechanism,” Applied Sciences, vol. 12, no. 9, p. 4689, May 2022.

Downloads

Published

24.03.2024

How to Cite

Teena, K. B. ., & Sharma, S. . (2024). Anomaly based Intrusion Detection System using Hybrid ResNet50 and 3D Convolutional Neural Network. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 673–683. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5299

Issue

Section

Research Article