A Study On Anomaly-Based Intrusion Detection Systems Employing Supervised Deep Learning Techniques
A Study On Anomaly-Based Intrusion Detection Systems Employing Supervised Deep Learning Techniques
2024 8th International Conference on Inventive Systems and Control (ICISC) | 979-8-3503-8657-8/24/$31.00 ©2024 IEEE | DOI: 10.1109/ICISC62624.2024.00069
367
Authorized licensed use limited to: BRAC UNIVERSITY. Downloaded on October 28,2024 at 16:09:43 UTC from IEEE Xplore. Restrictions apply.
B. Recurrent Neural Networks(RNN)
RNN is a form of ANN that can analyze linear or time-
series data. RNNs are known as deep neural networks because
of how they manage data over many different levels. It isn't
restricted to the processing of information in one particular
direction. RNNs can loop over many different layers and
temporarily retain data for later use. Figure 4 depicts the
generation of a standard RNN (sRNN) or Simple RNN with
the input and output. NN stands for a conventional neural
network, hp is the input, and Xp is the output.
hp
xp
368
Authorized licensed use limited to: BRAC UNIVERSITY. Downloaded on October 28,2024 at 16:09:43 UTC from IEEE Xplore. Restrictions apply.
which implies that the outcome of previous layer is TABLE-1 PERFORMANCE M ET RICS –DAT ASET -1
transmitted back into the layer above it in the network. DL Detection Precisio F1-
RNNs preserve context by referring to values from a Technique accuracy n Score
previous time step in the prsent time step [14]. Figure 6 CNN 78% 76% 86%
depicts the RNN for IDS.
RNN 82% 79% 88%
369
Authorized licensed use limited to: BRAC UNIVERSITY. Downloaded on October 28,2024 at 16:09:43 UTC from IEEE Xplore. Restrictions apply.
epochs. Underfitting can occur when the number of epochs is [13] Kasongo, Sydney Mambwe. "A deep learning technique for intrusion
set too low, which prevents the model from having enough detection system using a Recurrent Neural Networks based framework."
Computer Communications 199 (2023): 113-125.
training time to identify the intricate patterns in the data.
[14] Ibrahim, Mariam, and Ruba Elhafiz. "Modeling an intrusion detection
Moreover, the efficiency of the IDS is enhanced using correct using recurrent neural networks." Journal of Engineering Research 11,
attribute selection techniques from dataset, as well as by no. 1 (2023): 100013.
adjusting the IDS placement. To give better visibility, it [15] Kethineni, Keerthi, and G. Pradeepini. "Intrusion detection in internet of
should ideally be positioned behind the firewall on the things-based smart farming using hybrid deep learning framework."
network's edge. Cluster Computing 27, no. 2 (2024): 1719-1732.
[16] Shanthi, K. & R., Maruthi. (2023). Machine Learning Approach for
V. CONCLUSION Anomaly-Based Intrusion Detection Systems Using Isolation Forest
Model and Support Vector Machine. 136-139.
Anomaly-based ML algorithms are more efficient at 10.1109/ICIRCA57980.2023.10220620.
identifying anomalies than traditional approaches. The two DL
based approaches CNN and RNN were studied in and the
efficacy of those methods are analysed using the performance
metrics. The studies found in the literature shows the RNN-
LSTM performs better than the RNN. The performance of
RNN- LSTM and CNN-LSTM can be studied further. Based
on the increasing frequency of anomalies of all kinds in the
cyber domain, a combination of methodologies is always the
best option when developing any IDS.
REFERENCES
[1] Liu, Hongyu, and Bo Lang. 2019. "Machine Learning and Deep
Learning Methods for Intrusion Detection Systems: A Survey" Applied
Sciences 9, no. 20: 4396. https://doi.org/10.3390/app9204396
[2] Kocher, Geeta, and Gulshan Kumar. "Machine learning and deep
learning methods for intrusion detection systems: recent developments
and challenges." Soft Computing 25, no. 15 (2021): 9731 -9763.
[3] Mohammad, Rasheed, Faisal Saeed, Abdulwahab Ali Almazroi, Faisal
S. Alsubaei, and Abdulaleem Ali Almazroi. "Enhancing Intrusion
Detection Systems Using a Deep Learning and Data Augmentation
Approach." Systems 12, no. 3 (2024): 79.
[4] Kimanzi, Richard, Peter Kimanga, Dedan Cherori, and Patrick K.
Gikunda. "Deep Learning Algorithms Used in Intrusion Detection
Systems--A Review." arXiv preprint arXiv:2402.17020 (2024).
[5] Psychogyios, Konstantinos, Andreas Papadakis, Stavroula Bourou,
Nikolaos Nikolaou, Apostolos Maniatis, and T heodore Zahariadis.
"Deep Learning for Intrusion Detection Systems (IDSs) in T ime Series
Data." Future Internet 16, no. 3 (2024): 73.
[6] Sharma, Bhawana, Lokesh Sharma, Chhagan Lal, and Satyabrata Roy.
"Explainable artificial intelligence for intrusion detection in IoT
networks: A deep learning based approach." Expert Systems with
Applications 238 (2024): 121751.
[7] Aljehane, Nojood O., Hanan Abdullah Mengash, Majdy M. Eltahir, Faiz
Abdullah Alotaibi, Sumayh S. Aljameel, Ayman Yafoz, Raed Alsini,
and Mohammed Assiri. "Golden jackal optimization algorithm with
deep learning assisted intrusion detection system for network security."
Alexandria Engineering Journal 86 (2024): 415 -424.
[8] Osa, Edosa, Patience E. Orukpe, and Usiholo Iruansi. "Design and
implementation of a deep neural network approach for intrusion
detection systems." e-Prime-Advances in Electrical Engineering,
Electronics and Energy 7 (2024): 100434.
[9] Devendiran, Ramkumar, and Anil V. T urukmane. "Dugat -LST M: Deep
learning based network intrusion detection system using chaotic
optimization strategy." Expert Systems with Applications 245 (2024):
123027.
[10] Yuan, Xinwei, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong,
and Fan Zhang. "A simple framework to enhance the adversarial
robustness of deep learning-based intrusion detection system."
Computers & Security 137 (2024): 103644.
[11] Al-T uraiki, Isra, and Najwa Altwaijry. "A convolutional neural network
for improved anomaly-based network intrusion detection." Big Data 9,
no. 3 (2021): 233-252.
[12] Kim, Jiyeon, Yulim Shin, and Eunjung Choi. "An intrusion detection
model based on a convolutional neural network." Journal of Multimedia
Information System 6, no. 4 (2019): 165 -172.
370
Authorized licensed use limited to: BRAC UNIVERSITY. Downloaded on October 28,2024 at 16:09:43 UTC from IEEE Xplore. Restrictions apply.