Enhancing Intrusion Detection Systems with Ai: Examine the Integration of Ai into Traditional Ids to Improve Detection Rates and Reduce False Positives
Keywords:
Intrusion Detection System, Artificial Intelligence, Machine Learning, Cybersecurity, False Positives, Deep Learning, Network SecurityAbstract
These days, when cyber risks are more frequent and powerful, traditional intrusion detection systems (IDS) are lacking in stopping new and sophisticated attacks. Although signature-based and anomaly-based IDS have strong basics, they usually generate many misleading alarms and do not react quickly to new threats. Integrating AI, specifically Machine Learning (ML) and Deep Learning (DL), in IDS is valuable in improving threat detection and the system’s response. This paper aims to explore how AI is helping IDS systems achieve better results and fewer fake signals. A comparison of Support Vector Machines (SVM), Random Forest (RF), and Convolutional Neural Networks (CNN) reveals that using AI can make IDS more effective than non-AI-based IDS when tested using benchmark datasets NSL-KDD and CICIDS2017 (Shone et al., 2018; Ring et al., 2019). By blending anomaly identification with intelligent classification and adaptive learning, the new architecture can identify zero-day attacks more accurately. Models are evaluated using precision, recall, F1-score, and detection latency. The latest results show that our approach could reduce false positives by 35% and lead to more true positives. It additionally demonstrates events with bar graphs, pie charts, and system diagrams that evidence the changes in performance and architecture. It adds helpful knowledge to intelligent cybersecurity and offers valuable advice for using AI-driven IDS within enterprises. Future research will investigate federated learning and reinforcement learning to help improve the scalability and privacy of IDS algorithms.
Downloads
References
Abeshu, A., &Chilamkurti, N. (2018). Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine, 56(2), 169–175. https://doi.org/10.1109/MCOM.2018.1700391
Ahmad, Z., Shahid Khan, A., WaiShiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). https://doi.org/10.1002/ett.4150
Buczak, A. L., &Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502
Drewek-Ossowicka, A., Pietrołaj, M., &Rumiński, J. (2021). A survey of neural networks usage for intrusion detection systems. Journal of Ambient Intelligence and Humanized Computing, 12(1), 497–514. https://doi.org/10.1007/s12652-020-02014-x
Doshi-Velez, F., & Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608.https://doi.org/10.48550/arXiv.1702.08608
Islam, M. T., Alrashed, B., Hussain, M. S., &Alshamrani, A. (2020). Intrusion detection system using machine learning techniques: A review. Security and Privacy, 3(1), e99. https://doi.org/10.1002/spy2.99
Javaid, A., Niyaz, Q., Sun, W., &Alam, M. (2016). A deep learning approach for network intrusion detection system. Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 21–26. https://doi.org/10.4108/eai.3-12-2015.2262516
Kim, G., Lee, S., & Kim, S. (2016). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700. https://doi.org/10.1016/j.eswa.2013.08.066
Khraisat, A., Gondal, I., Vamplew, P., &Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1). https://doi.org/10.1186/s42400-019-0038-7
Laghrissi, F. E., Douzi, S., Douzi, K., &Hssina, B. (2021). Intrusion detection systems using long short-term memory (LSTM). Journal of Big Data, 8(1). https://doi.org/10.1186/s40537-021-00448-4
Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., &Lloret, J. (2017). Conditional variationalautoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors, 17(9), 1967. https://doi.org/10.3390/s17091967
Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS), 1–6. https://doi.org/10.1109/MilCIS.2015.7348942
Patil, S., Varadarajan, V., Mazhar, S. M., Sahibzada, A., Ahmed, N., Sinha, O., … Kotecha, K. (2022). Explainable Artificial Intelligence for Intrusion Detection System. Electronics (Switzerland), 11(19). https://doi.org/10.3390/electronics11193079
Ring, M., Wunderlich, S., Scheuring, D., Landes, D., &Hotho, A. (2019). A survey of network-based intrusion detection data sets. Computers & Security, 86, 147–167. https://doi.org/10.1016/j.cose.2019.06.005
Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. https://doi.org/10.1109/TETCI.2017.2772792
Stiawan, D., Idris, M. Y. I., Budiarto, R., &Zamzami, E. M. (2019). Performance evaluation of random forest algorithm for anomaly detection. Journal of Theoretical and Applied Information Technology, 97(11), 3176–3186.
Satilmis, H., Akleylek, S., &Tok, Z. Y. (2024). A Systematic Literature Review on Host-Based Intrusion Detection Systems. IEEE Access, 12, 27237–27266. https://doi.org/10.1109/ACCESS.2024.3367004
Wilson, B. M., Harris, C. R., &Wixted, J. T. (2022, October 1). Theoretical false positive psychology. Psychonomic Bulletin and Review. Springer. https://doi.org/10.3758/s13423-022-02098-w
Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418
Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), 10(2), 12. https://doi.org/10.1145/3298981
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.