Mitigating Generic Attacks for Intrusion Detetction System Based on CGAN and FIPSO Using UNSW-NB 15 Dataset
Keywords:
Distributed system, Deep Learning, Supervised learning, Network monitors traffic patterns, Intrusion detection systemAbstract
: In recent times, there has been a notable surge in cyberattacks due to the Internet of Things' exponential growth. Because of this, maintaining corporate borders today requires cybersecurity. Intrusion detection systems, or IDSs, are used to notify users of noteworthy events when maintaining a network. The first is the identification of malicious traffic, for which zero-day attack detection research is essential. This research provides an improved intrusion detection model that leverages FIPSO for feature extraction, conditional Generative Adversarial Networks (cGAN) to handle data imbalance, and machine learning techniques for classification tasks. We evaluated the model for binary and multi-classification, focusing on the UNSW-NB15 dataset in particular. The proposed methodology is noteworthy because it employs Random Forest (RF) classification along with FIPSO to enhance feature selection and cGAN to directly address the issue of data imbalance. This hybrid technique yields better results, with 83% accuracy in multi-class classification and 96% accuracy in binary classification.
Downloads
References
Akter, M., Dip, G. Das, Mira, M. S., Abdul Hamid, M., & Mridha, M. F. (2020). Construing Attacks of Internet of Things (IoT) and A Prehensile Intrusion Detection System for Anomaly Detection Using Deep Learning Approach. In A. Khanna, D. Gupta, S. Bhattacharyya, V. Snasel, J. Platos, & A. E. Hassanien (Eds.), International Conference on Innovative Computing and Communications (pp. 427–438). Springer Singapore.
Al-Emadi, S., Al-Mohannadi, A., & Al-Senaid, F. (2020). Using Deep Learning Techniques for Network Intrusion Detection. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 171–176. https://doi.org/10.1109/ICIoT48696.2020.9089524
Aljamal, I., Tekeoğlu, A., Bekiroglu, K., & Sengupta, S. (2019). Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments. 2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA), 84–89. https://doi.org/10.1109/SERA.2019.8886794
Alsoufi, M. A., Razak, S., Siraj, M. M., Ali, A., Nasser, M., & Abdo, S. (2021). Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: A Survey. In F. Saeed, F. Mohammed, & A. Al-Nahari (Eds.), Innovative Systems for Intelligent Health Informatics (pp. 659–675). Springer International Publishing.
Balakrishnan, N., Rajendran, A., Pelusi, D., & Ponnusamy, V. (2021). Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things. Internet of Things, 14, 100112. https://doi.org/https://doi.org/10.1016/j.iot.2019.100112
Bharati, M. P., & Tamane, S. (2020). NIDS-Network Intrusion Detection System Based on Deep and Machine Learning Frameworks with CICIDS2018 using Cloud Computing. 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC), 27–30. https://doi.org/10.1109/ICSIDEMPC49020.2020.9299584
Dong, R., Li, X., Qiu-yu, Z., & Yuan, H. (2020). A Network Intrusion Detection Model Based on Multivariate Correlation Analysis - Long Short Time Memory Network. IET Information Security, 14. https://doi.org/10.1049/iet-ifs.2019.0294
Engelmann, J., & Lessmann, S. (2021). Conditional Wasserstein GAN-based oversampling of tabular data for imbalanced learning. Expert Systems with Applications, 174(Ml). https://doi.org/10.1016/j.eswa.2021.114582
Eunice, A. D., Gao, Q., Zhu, M.-Y., Chen, Z., & LV, N. (2021). Network Anomaly Detection Technology Based on Deep Learning. 2021 IEEE 3rd International Conference on Frontiers Technology of Information and Computer (ICFTIC), 6–9. https://doi.org/10.1109/ICFTIC54370.2021.9647222
Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419. https://doi.org/https://doi.org/10.1016/j.jisa.2019.102419
Gamage, S., & Samarabandu, J. (2020). Deep learning methods in network intrusion detection: A survey and an objective comparison. Journal of Network and Computer Applications, 169, 102767. https://doi.org/https://doi.org/10.1016/j.jnca.2020.102767
Gao, J., Gan, L., Buschendorf, F., Zhang, L., Liu, H., Li, P., Dong, X., & Lu, T. (2021). Omni SCADA Intrusion Detection Using Deep Learning Algorithms. IEEE Internet of Things Journal, 8(2), 951–961. https://doi.org/10.1109/JIOT.2020.3009180
Gulghane, S., Shingate, V., Bondgulwar, S., Awari, G., & Sagar, P. (2020). A Survey on Intrusion Detection System Using Machine Learning Algorithms. In J. S. Raj, A. Bashar, & S. R. J. Ramson (Eds.), Innovative Data Communication Technologies and Application (pp. 670–675). Springer International Publishing.
KASIM, Ö. (2020). An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks. Computer Networks, 180, 107390. https://doi.org/https://doi.org/10.1016/j.comnet.2020.107390
Kasongo, S. M. (2023). A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework. Computer Communications, 199, 113–125. https://doi.org/https://doi.org/10.1016/j.comcom.2022.12.010
Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752. https://doi.org/https://doi.org/10.1016/j.cose.2020.101752
Kim, A., Park, M., & Lee, D. H. (2020). AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection. IEEE Access, 8, 70245–70261. https://doi.org/10.1109/ACCESS.2020.2986882
Kumar, N. M., & Mallick, P. K. (2018). Blockchain technology for security issues and challenges in IoT. Procedia Computer Science, 132, 1815–1823. https://doi.org/https://doi.org/10.1016/j.procs.2018.05.140
Lee, T.-H., Chang, L.-H., & Syu, C.-W. (2020). Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks. 2020 IEEE International Conference on Communications Workshops (ICC Workshops), 1–6. https://doi.org/10.1109/ICCWorkshops49005.2020.9145085
Li, B., Wu, Y., Song, J., Lu, R., Li, T., & Zhao, L. (2021). DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems. IEEE Transactions on Industrial Informatics, 17(8), 5615–5624. https://doi.org/10.1109/TII.2020.3023430
Louati, F., & Ktata, F. B. (2020). A deep learning-based multi-agent system for intrusion detection. SN Applied Sciences, 2(4), 675. https://doi.org/10.1007/s42452-020-2414-z
Majeed, A., & Hwang, S. O. (2023). CTGAN-MOS: Conditional Generative Adversarial Network Based Minority-Class-Augmented Oversampling Scheme for Imbalanced Problems. IEEE Access, 11(June), 85878–85899. https://doi.org/10.1109/ACCESS.2023.3303509
Manhas, J., & Kotwal, S. (2021). Implementation of Intrusion Detection System for Internet of Things Using Machine Learning Techniques. In K. J. Giri, S. A. Parah, R. Bashir, & K. Muhammad (Eds.), Multimedia Security: Algorithm Development, Analysis and Applications (pp. 217–237). Springer Singapore. https://doi.org/10.1007/978-981-15-8711-5_11
Mosaiyebzadeh, F., Araujo Rodriguez, L. G., Macêdo Batista, D., & Hirata, R. (2021). A Network Intrusion Detection System using Deep Learning against MQTT Attacks in IoT. 2021 IEEE Latin-American Conference on Communications (LATINCOM), 1–6. https://doi.org/10.1109/LATINCOM53176.2021.9647850
Musa, U. S., Chakraborty, S., Abdullahi, M. M., & Maini, T. (2021). A Review on Intrusion Detection System using Machine Learning Techniques. 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 541–549. https://doi.org/10.1109/ICCCIS51004.2021.9397121
Musa, U. S., Chhabra, M., Ali, A., & Kaur, M. (2020). Intrusion Detection System using Machine Learning Techniques: A Review. 2020 International Conference on Smart Electronics and Communication (ICOSEC), 149–155. https://doi.org/10.1109/ICOSEC49089.2020.9215333
Rafi, H., Ahmad, F., Anis, J., Khan, R., Rafiq, H., & Farhan, M. (2020). Comparative effectiveness of agmatine and choline treatment in rats with cognitive impairment induced by AlCl3 and forced swim stress. Current Clinical Pharmacology, 15(3), 251-264.
Rahman, M. A., Asyhari, T., Leong, L. S., Satrya, G., Tao, M., & Zolkipli, M. (2020). Scalable Machine Learning-Based Intrusion Detection System for IoT-Enabled Smart Cities. Sustainable Cities and Society, 61, 102324. https://doi.org/10.1016/j.scs.2020.102324
Rai, A. (2020). Optimizing a New Intrusion Detection System Using Ensemble Methods and Deep Neural Network. 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 527–532. https://doi.org/10.1109/ICOEI48184.2020.9143028
Rani, D., & Kaushal, N. C. (2020). Supervised Machine Learning Based Network Intrusion Detection System for Internet of Things. 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 1–7. https://doi.org/10.1109/ICCCNT49239.2020.9225340
Rincy N, T., & Gupta, R. (2021). Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques. Wireless Communications and Mobile Computing, 2021, 9974270. https://doi.org/10.1155/2021/9974270
Sallam, Y. F., El-Nabi, S. A., El-Shafai, W., Ahmed, H. E. H., Saleeb, A., El-Bahnasawy, N. A., & El-Samie, F. E. A. (2023). Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset. Security and Privacy, 6(5), e300. https://doi.org/10.1002/SPY2.300
Sallam, Y. F., El-Nabi, S. A., El-Shafai, W., Ahmed, H. E. H., Saleeb, A., El-Bahnasawy, N. A., & El-Samie, F. E. A. (2023). Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset. Security and Privacy, 6(5), e300. https://doi.org/10.1002/SPY2.300
Sampath, V., Maurtua, I., Aguilar Martín, J. J., & Gutierrez, A. (2021). A survey on generative adversarial networks for imbalance problems in computer vision tasks. In Journal of Big Data (Vol. 8, Issue 1). Springer International Publishing. https://doi.org/10.1186/s40537-021-00414-0
Shu, J., Zhou, L., Zhang, W., Du, X., & Guizani, M. (2021). Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4519–4530. https://doi.org/10.1109/TITS.2020.3027390
Yu, Y., Li, Y., Tian, J., & Liu, J. (2018). Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. IEEE Wireless Communications, 25(6), 12–18. https://doi.org/10.1109/MWC.2017.1800116
Zhong, W., Yu, N., & Ai, C. (2020). Applying big data based deep learning system to intrusion detection. Big Data Mining and Analytics, 3(3), 181–195. https://doi.org/10.26599/BDMA.2020.9020003
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.