Enhancing Intrusion Detection Systems with Ai: Examine the Integration of Ai into Traditional Ids to Improve Detection Rates and Reduce False Positives

Authors

  • Shekh Tareq Ali, MohammadMajharul Islam Jabed, Mahabub Alam Khan, Sheikh Md Kamrul Islam Rasel, Md Abdullah Al Nahid, Touhid Bhuiyan

Keywords:

Intrusion Detection System, Artificial Intelligence, Machine Learning, Cybersecurity, False Positives, Deep Learning, Network Security

Abstract

These days, when cyber risks are more frequent and powerful, traditional intrusion detection systems (IDS) are lacking in stopping new and sophisticated attacks. Although signature-based and anomaly-based IDS have strong basics, they usually generate many misleading alarms and do not react quickly to new threats. Integrating AI, specifically Machine Learning (ML) and Deep Learning (DL), in IDS is valuable in improving threat detection and the system’s response. This paper aims to explore how AI is helping IDS systems achieve better results and fewer fake signals. A comparison of Support Vector Machines (SVM), Random Forest (RF), and Convolutional Neural Networks (CNN) reveals that using AI can make IDS more effective than non-AI-based IDS when tested using benchmark datasets NSL-KDD and CICIDS2017 (Shone et al., 2018; Ring et al., 2019). By blending anomaly identification with intelligent classification and adaptive learning, the new architecture can identify zero-day attacks more accurately. Models are evaluated using precision, recall, F1-score, and detection latency. The latest results show that our approach could reduce false positives by 35% and lead to more true positives. It additionally demonstrates events with bar graphs, pie charts, and system diagrams that evidence the changes in performance and architecture. It adds helpful knowledge to intelligent cybersecurity and offers valuable advice for using AI-driven IDS within enterprises. Future research will investigate federated learning and reinforcement learning to help improve the scalability and privacy of IDS algorithms.

DOI: https://doi.org/10.17762/ijisae.v12i22s.7555

Downloads

Download data is not yet available.

References

Abeshu, A., &Chilamkurti, N. (2018). Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine, 56(2), 169–175. https://doi.org/10.1109/MCOM.2018.1700391

Ahmad, Z., Shahid Khan, A., WaiShiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). https://doi.org/10.1002/ett.4150

Buczak, A. L., &Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502

Drewek-Ossowicka, A., Pietrołaj, M., &Rumiński, J. (2021). A survey of neural networks usage for intrusion detection systems. Journal of Ambient Intelligence and Humanized Computing, 12(1), 497–514. https://doi.org/10.1007/s12652-020-02014-x

Doshi-Velez, F., & Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608.https://doi.org/10.48550/arXiv.1702.08608

Islam, M. T., Alrashed, B., Hussain, M. S., &Alshamrani, A. (2020). Intrusion detection system using machine learning techniques: A review. Security and Privacy, 3(1), e99. https://doi.org/10.1002/spy2.99

Javaid, A., Niyaz, Q., Sun, W., &Alam, M. (2016). A deep learning approach for network intrusion detection system. Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 21–26. https://doi.org/10.4108/eai.3-12-2015.2262516

Kim, G., Lee, S., & Kim, S. (2016). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700. https://doi.org/10.1016/j.eswa.2013.08.066

Khraisat, A., Gondal, I., Vamplew, P., &Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1). https://doi.org/10.1186/s42400-019-0038-7

Laghrissi, F. E., Douzi, S., Douzi, K., &Hssina, B. (2021). Intrusion detection systems using long short-term memory (LSTM). Journal of Big Data, 8(1). https://doi.org/10.1186/s40537-021-00448-4

Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., &Lloret, J. (2017). Conditional variationalautoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors, 17(9), 1967. https://doi.org/10.3390/s17091967

Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS), 1–6. https://doi.org/10.1109/MilCIS.2015.7348942

Patil, S., Varadarajan, V., Mazhar, S. M., Sahibzada, A., Ahmed, N., Sinha, O., … Kotecha, K. (2022). Explainable Artificial Intelligence for Intrusion Detection System. Electronics (Switzerland), 11(19). https://doi.org/10.3390/electronics11193079

Ring, M., Wunderlich, S., Scheuring, D., Landes, D., &Hotho, A. (2019). A survey of network-based intrusion detection data sets. Computers & Security, 86, 147–167. https://doi.org/10.1016/j.cose.2019.06.005

Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. https://doi.org/10.1109/TETCI.2017.2772792

Stiawan, D., Idris, M. Y. I., Budiarto, R., &Zamzami, E. M. (2019). Performance evaluation of random forest algorithm for anomaly detection. Journal of Theoretical and Applied Information Technology, 97(11), 3176–3186.

Satilmis, H., Akleylek, S., &Tok, Z. Y. (2024). A Systematic Literature Review on Host-Based Intrusion Detection Systems. IEEE Access, 12, 27237–27266. https://doi.org/10.1109/ACCESS.2024.3367004

Wilson, B. M., Harris, C. R., &Wixted, J. T. (2022, October 1). Theoretical false positive psychology. Psychonomic Bulletin and Review. Springer. https://doi.org/10.3758/s13423-022-02098-w

Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418

Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), 10(2), 12. https://doi.org/10.1145/3298981

Downloads

Published

30.09.2024

How to Cite

Shekh Tareq Ali. (2024). Enhancing Intrusion Detection Systems with Ai: Examine the Integration of Ai into Traditional Ids to Improve Detection Rates and Reduce False Positives. International Journal of Intelligent Systems and Applications in Engineering, 12(22s), 2081 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7555

Issue

Section

Research Article