Intrusion Detection System using Osprey Optimization Algorithm with Bidirectional Gated Recurrent Unit Technique

Authors

  • Anitha Parabathina, Madhavi Dabbiru, Venkata Rao Kasukurthi

Keywords:

Bidirectional Gated Recurrent Unit, Label Encoding, Intrusion Detection System, Min-max Normalization, Osprey Optimization Algorithm, SMOTE

Abstract

Nowadays, the Intrusion Detection System (IDS) is one of the most important application of security in mobile networks, and it is considered a significant method for exposing attacks and applying security measures to networks. For this reason, various types of IDS approaches have been established in conventional research that focus on recognizing intrusions from datasets with the help of a classification issue. However, conventional techniques are limited in identifying malicious attacks due to the issue of overfitting. To overcome this issue, the Osprey Optimization Algorithm with Bidirectional Gated Recurrent Unit (OOA-BiGRU) is proposed in this research for IDS classification. The OOA selects the set of best features by updating positions based on the chasing and attack behavior. The weights are assigned by a self-attention mechanism which enables the BiGRU to adopt attack patterns and enhance the classification accuracy. Various datasets such as CICIDS-2018, CICIDS-2017, UNSW-NB15 and NSL-KDD are preprocessed by label encoding and min-max normalization to convert categorical feature into integer format and normalize the features. The Synthetic Minority Over-sampling Technique (SMOTE) is the oversampling technique employed for balancing the dataset. The accuracy, precision, recall and f1-score are taken as parameters to estimate the model’s performance. The OOA-BIGRU achieves the accuracies of 99.86%, 98.64%, 99.72% and 99.83% respectively on NSL-KDD, UNSW-NB15, CICIDS-2017 and CICIDS-2018 datasets, which is superior when compared to existing methods.

Downloads

Download data is not yet available.

References

V. Hnamte and J. Hussain, “DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system,” Telematics and Informatics Reports, vol. 10, p. 100053, Jun. 2023, https://doi.org/10.1016/j.teler.2023.100053.

B. Deore and S. Bhosale, “Hybrid optimization enabled robust CNN-LSTM technique for network intrusion detection,” IEEE Access, vol. 10, pp. 65611-65622, Jun. 2022, doi: 10.1109/ACCESS.2022.3183213.

O. Elnakib, E. Shaaban, M. Mahmoud, and K. Emara, “EIDM: Deep learning model for IoT intrusion detection systems,” The Journal of Supercomputing, vol. 79, no. 12, pp. 13241-13261, Aug. 2023, https://doi.org/10.1007/s11227-023-05197-0.

A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, “CNN-LSTM: hybrid deep neural network for network intrusion detection system,” IEEE Access, vol. 10, pp. 99837-99849, Sep. 2022, doi: 10.1109/ACCESS.2022.3206425.

S. Yaras and M. Dener, “IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm,” Electronics, vol. 13, no. 6, p. 1053, Mar. 2024, https://doi.org/10.3390/electronics13061053.

V. Hnamte, H. Nhung-Nguyen, J. Hussain, and Y. Hwa-Kim, “A novel two-stage deep learning model for network intrusion detection: LSTM-AE,” IEEE Access, vol. 11, pp. 37131-37148, Apr. 2023, doi: 10.1109/ACCESS.2023.3266979.

A. Paya, S. Arroni, V. García-Díaz, and A. Gómez, “Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems,” Comput. Secur., vol. 136, p. 103546, Jan. 2024, https://doi.org/10.1016/j.cose.2023.103546.

D. Musleh, M. Alotaibi, F. Alhaidari, A. Rahman, and R. M. Mohammad, “Intrusion detection system using feature extraction with machine learning algorithms in IoT,” Journal of Sensor and Actuator Networks, vol. 12, no. 2, p. 29, Mar. 2023, https://doi.org/10.3390/jsan12020029.

A. Alsarhan, M. Alauthman, E. Alshdaifat, A. R. Al-Ghuwairi, and A. Al-Dubai, “Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks,” J. Ambient Intell. Hum. Comput., vol. 14, no. 5, pp. 6113-6122, May 2023, https://doi.org/10.1007/s12652-021-02963-x.

R. B. Said, Z. Sabir, and I. Askerzade, “CNN-BiLSTM: A Hybrid Deep Learning Approach for Network Intrusion Detection System in Software Defined Networking with Hybrid Feature Selection,” IEEE Access, vol. 11, pp. 138732-138747, Dec. 2023, doi: 10.1109/ACCESS.2023.3340142.

J. F. C. Garcia and G. E. T. Blandon, “A deep learning-based intrusion detection and preventation system for detecting and preventing denial-of-service attacks,” IEEE Access, vol. 10, pp. 83043-83060, Aug. 2022, doi: 10.1109/ACCESS.2022.3196642.

M. A. Hossain and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning,” Array, vol. 19, p. 100306, Sep. 2023, https://doi.org/10.1016/j.array.2023.100306.

V. Gowdhaman and R. Dhanapal, “An intrusion detection system for wireless sensor networks using deep neural network,” Soft Comput., vol. 26, no. 23, pp. 13059-13067, Dec. 2022, https://doi.org/10.1007/s00500-021-06473-y.

S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Comput. Commun., vol. 199, pp. 113-125, Feb. 2023, https://doi.org/10.1016/j.comcom.2022.12.010.

N. Yadav, S. Pande, A. Khamparia, and D. Gupta, “Intrusion detection system on IoT with 5G network using deep learning,” Wireless Communications and Mobile Computing, vol. 2022, p. 9304689, 2022, DOI: 10.1155/2022/9304689.

S. P. Thirimanne, L. Jayawardana, L. Yasakethu, P. Liyanaarachchi, and C. Hewage, “Deep neural network based real-time intrusion detection system,” SN Comput. Sci., vol. 3, no. 2, p. 145, Jan. 2022, https://doi.org/10.1007/s42979-022-01031-1.

N. O. Aljehane, H. A. Mengash, M. M. Eltahir, F. A. Alotaibi, S. S. Aljameel, A. Yafoz, R. Alsini, and M. Assiri, “Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security,” Alexandria Eng. J., vol. 86, pp. 415-424, Jan. 2024, https://doi.org/10.1016/j.aej.2023.11.078.

A. E. M. Eljialy, M. Y. Uddin, and S. Ahmad, “Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning,” Tsinghua Sci. Technol., vol. 29, no. 4, pp. 948-958, Aug. 2024, doi: 10.26599/TST.2023.9010032.

R. Devendiran and A.V. Turukmane, “Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy,” Expert Syst. Appl., vol. 245, p. 123027, Jul. 2024, https://doi.org/10.1016/j.eswa.2023.123027.

M. Bakro, R. R. Kumar, A. Alabrah, Z. Ashraf, M. N. Ahmed, M. Shameem, and A. Abdelsalam, “An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach with ML Classifier,” IEEE Access, vol. 11, pp. 64228-64247, Jun. 2023, doi: 10.1109/ACCESS.2023.3289405.

H. S. Sharma and K. J. Singh, “A feed forward deep neural network model using feature selection for cloud intrusion detection system,” Concurrency Comput. Pract. Exper., vol. 36, no. 9, p. e8001, Apr. 2024, DOI: 10.1002/cpe.8001.

CICIDS-2018 dataset link: https://registry.opendata.aws/cse-cic-ids2018/.

CICIDS-2017 dataset link: https://www.kaggle.com/datasets/chethuhn/network-intrusion-dataset.

UNSW-NB15 dataset link: https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb15.

NSL-KDD dataset link: https://www.kaggle.com/datasets/hassan06/nslkdd.

Y. K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, and R. Colomo-Palacios, “A machine learning-based intrusion detection for detecting internet of things network attacks,” Alexandria Eng. J., vol. 61, no. 12, pp. 9395-9409, Dec. 2022, https://doi.org/10.1016/j.aej.2022.02.063.

T. Wu, H. Fan, H. Zhu, C. You, H. Zhou, and X. Huang, “Intrusion detection system combined enhanced random forest with SMOTE algorithm,” EURASIP J. Adv. Signal Process., vol. 2022, p. 39, May 2022, https://doi.org/10.1186/s13634-022-00871-6.

Downloads

Published

03.07.2024

How to Cite

Anitha Parabathina. (2024). Intrusion Detection System using Osprey Optimization Algorithm with Bidirectional Gated Recurrent Unit Technique. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 1184–1192. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6365

Issue

Section

Research Article