Intrusion Detection Systems Based On Machine Learning Algorithms
Intrusion Detection Systems Based On Machine Learning Algorithms
net/publication/353906529
CITATIONS READS
0 501
4 authors:
Some of the authors of this publication are also working on these related projects:
SALIVARY MATRIX METALLOPROTEINASE-8 INDICATE THE SEVERITY OF DIABETIC FOOT ULCER View project
All content following this page was uploaded by Diyar Zeebaree on 14 August 2021.
Sandy Victor Amanoul Adnan Mohsin Abdulazeez Diyar Qader Zeebare Falah Y. H. Ahmed
Information Technology Dept. Research Center of Duhok Research Center Faculty of Information Sciences
Duhok polytechnic University Polytechnic University Duhok Polytechnic University & Engineering, Management &
Duhok, Iraq Duhok polytechnic University Duhok, Kurdistan Region, Iraq Science University, Shah Alam,
Duhok,Iriq Selangor, Malaysia
[email protected] [email protected] [email protected] [email protected]
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on July 31,2021 at 20:39:21 UTC from IEEE Xplore. Restrictions apply.
2021 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS 2021), 26 June 2021, Shah Alam, Malaysia.
(DBN) in terms of accuracy rate and decreased training time. Random Forest
However, it was ineffective at detecting R2L and U2R attacks. [18] DL Model based on
Fully Connected
KDD Cup’99
NSL-KDD
ACC \ PRE\
REC\ F-M
Networks (FCNs), Kyoto 2006+
Khan et al.[15] Suggested two method depended on solid Variational UNSW-NB15
Autoencoder CICIDS2017
and efficient stacked auto-encoder AE. The proposed model's (VAE), and
output evaluated. Down sampling was used for the KDD Sequence-to-
Sequence (Seq2Seq)
Cup'99 to eliminate duplicate data. Up sampling of the dataset structures
using SMOTE. The performance of attack classes with fewer [19] DL Multistage Auto
Encoder and CNN
KDD Cup’99
UNSW-NB15
ACC\ F-M
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on July 31,2021 at 20:39:21 UTC from IEEE Xplore. Restrictions apply.
2021 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS 2021), 26 June 2021, Shah Alam, Malaysia.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on July 31,2021 at 20:39:21 UTC from IEEE Xplore. Restrictions apply.
2021 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS 2021), 26 June 2021, Shah Alam, Malaysia.
345+ 6+7(0/1+
Accuracy of True Rate = 34/+ 6+7(0/1+2'()*+ -.*0/1+ (4)
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on July 31,2021 at 20:39:21 UTC from IEEE Xplore. Restrictions apply.
2021 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS 2021), 26 June 2021, Shah Alam, Malaysia.
TABLE III. RESULT OF ALL EVALUATION METRICS BY USING RANDOM VII. CONCLUSION
FOREST
Intrusion Detection System plays a very important and
Class
TP
FP Rate Precision Recall F-Measure
vital role in the field of network security. The performance of
Rate the classifier is degrading by using intrusive patterns, accuracy
Normal 1.000 0.000 0.999 1.000 1.000 and also, it's time-consuming. Bayes Net, Random Forest,
U2R 0.615 0.000 0.889 0.615 0.727 Neural Network, RNN, and LSTM are among the ML and DL
Dos 1.000 0.000 1.000 1.000 1.000 algorithms considered for IDS. The KDDcup99 dataset used to
R2L 0.981 0.000 0.992 0.981 0.987 value these accounts. With the KDD cup 99 dataset's aid, we
Probe 0.993 0.000 0.999 0.993 0.996 proposed a DL and ML approach. By looking at the results that
depend on accuracy, the powerful classifier can be identified. It
seems reasonable that the random forest classifier outperforms
TABLE IV. COMPARISON OF ACCURACY USING DIFFERENT DL better with accuracy of 99.98% based on the results.
ALGORITHMS ON KDD CUP 99 DATASET
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on July 31,2021 at 20:39:21 UTC from IEEE Xplore. Restrictions apply.
2021 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS 2021), 26 June 2021, Shah Alam, Malaysia.
IEEE Access, vol. 7, pp. 30373–30385, 2019, doi: [34] H. Liu and B. Lang, “Machine Learning and Deep Learning Methods for
10.1109/ACCESS.2019.2899721. Intrusion Detection Systems: A Survey,” Applied Sciences, vol. 9, no. 20,
[16] Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, “An Intrusion Detection Model p. 4396, Oct. 2019, doi: 10.3390/app9204396.
Based on Feature Reduction and Convolutional Neural Networks,” IEEE [35] Y. Xin et al., “Machine Learning and Deep Learning Methods for
Access, vol. 7, pp. 42210–42219, 2019, doi: Cybersecurity,” IEEE Access, vol. 6, pp. 35365–35381, 2018, doi:
10.1109/ACCESS.2019.2904620. 10.1109/ACCESS.2018.2836950.
[17] H. Yao, D. Fu, P. Zhang, M. Li, and Y. Liu, “MSML: A Novel Multilevel [36] Y. Jia, M. Wang, and Y. Wang, “Network intrusion detection algorithm
Semi-Supervised Machine Learning Framework for Intrusion Detection based on deep neural network,” IET Information Security, vol. 13, no. 1,
System,” IEEE Internet Things J., vol. 6, no. 2, pp. 1949–1959, Apr. pp. 48–53, Jan. 2019, doi: 10.1049/iet-ifs.2018.5258.
2019, doi: 10.1109/JIOT.2018.2873125. [37] J. Li, Y. Qu, F. Chao, H. P. H. Shum, E. S. L. Ho, and L. Yang, “Machine
[18] R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al- Learning Algorithms for Network Intrusion Detection,” in AI in
Nemrat, and S. Venkatraman, “Deep Learning Approach for Intelligent Cybersecurity, vol. 151, L. F. Sikos, Ed. Cham: Springer International
Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525–41550, Publishing, 2019, pp. 151–179. doi: 10.1007/978-3-319-98842-9_6.
2019, doi: 10.1109/ACCESS.2019.2895334. [38] Y. Pacheco and W. Sun, “Adversarial Machine Learning: A Comparative
[19] G. Andresini, A. Appice, N. D. Mauro, C. Loglisci, and D. Malerba, Study on Contemporary Intrusion Detection Datasets:,” in Proceedings of
“Multi-Channel Deep Feature Learning for Intrusion Detection,” IEEE the 7th International Conference on Information Systems Security and
Access, vol. 8, pp. 53346–53359, 2020, doi: Privacy, Online Streaming, --- Select a Country ---, 2021, pp. 160–171.
10.1109/ACCESS.2020.2980937. doi: 10.5220/0010253501600171.
[20] J. Gu and S. Lu, “An effective intrusion detection approach using SVM [39] B. Charbuty and A. Abdulazeez, “Classification Based on Decision Tree
with naïve Bayes feature embedding,” Computers & Security, vol. 103, p. Algorithm for Machine Learning,” JASTT, vol. 2, no. 01, pp. 20–28, Mar.
102158, Apr. 2021, doi: 10.1016/j.cose.2020.102158. 2021, doi: 10.38094/jastt20165.
[21] A. M. Abdulazeez and F. S. Khamo, “A Proposed Data Security [40] G. Meena and R. R. Choudhary, “A review paper on IDS classification
Algorithm Based on Cipher Feedback Mode and its Simulink using KDD 99 and NSL KDD dataset in WEKA,” in 2017 International
Implementation,” vol. 4, no. 9, p. 10, 2013. Conference on Computer, Communications and Electronics (Comptelix),
[22] H. Wang, J. Gu, and S. Wang, “An effective intrusion detection Jaipur, India, Jul. 2017, pp. 553–558. doi:
framework based on SVM with feature augmentation,” Knowledge-Based 10.1109/COMPTELIX.2017.8004032.
Systems, vol. 136, pp. 130–139, Nov. 2017, doi: [41] P. S. Bayerl, R. Karlović, B. Akhgar, and G. Markarian, Eds., Community
10.1016/j.knosys.2017.09.014. Policing - A European Perspective: Strategies, Best Practices and
[23] N. Gao, L. Gao, Q. Gao, and H. Wang, “An Intrusion Detection Model Guidelines. Cham: Springer International Publishing, 2017. doi:
Based on Deep Belief Networks,” p. 6. 10.1007/978-3-319-53396-4.
[24] A. Pal Singh and M. Deep Singh, “Analysis of Host-Based and Network- [42] A. Özgür and H. Erdem, “A review of KDD99 dataset usage in intrusion
Based Intrusion Detection System,” IJCNIS, vol. 6, no. 8, pp. 41–47, Jul. detection and machine learning between 2010 and 2015,” PeerJ Preprints,
2014, doi: 10.5815/ijcnis.2014.08.06. preprint, Apr. 2016. doi: 10.7287/peerj.preprints.1954v1.
[25] R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al- [43] R. Prasad and V. Rohokale, Cyber Security: The Lifeline of Information
Nemrat, and S. Venkatraman, “Deep Learning Approach for Intelligent and Communication Technology. Cham: Springer International
Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525–41550, Publishing, 2020. doi: 10.1007/978-3-030-31703-4.
2019, doi: 10.1109/ACCESS.2019.2895334. [44] O. Ahmed and A. Brifcani, “Gene Expression Classification Based on
[26] M. E. Aminanto and K. Kim, “Deep Learning in Intrusion Detection Deep Learning,” in 2019 4th Scientific International Conference Najaf
System: An Overview,” p. 12. (SICN), Al-Najef, Iraq, Apr. 2019, pp. 145–149. doi:
10.1109/SICN47020.2019.9019357.
[27] K. Alrawashdeh and C. Purdy, “Toward an Online Anomaly Intrusion
Detection System Based on Deep Learning,” in 2016 15th IEEE [45] N. Asaad Zebari, D. Asaad Zebari, D. Qader Zeebaree, and J. Najeeb
International Conference on Machine Learning and Applications Saeed, “Significant features for steganography techniques using
(ICMLA), Anaheim, CA, USA, Dec. 2016, pp. 195–200. doi: deoxyribonucleic acid: a review,” IJEECS, vol. 21, no. 1, p. 338, Jan.
10.1109/ICMLA.2016.0040. 2021, doi: 10.11591/ijeecs.v21.i1.pp338-347.
[28] S. KishorWagh, V. K. Pachghare, and S. R. Kolhe, “Survey on Intrusion [46] Zajmi, L., Ahmed, F. Y., & Jaharadak, A. A. (2018). Concepts, methods,
Detection System using Machine Learning Techniques,” IJCA, vol. 78, and performances of particle swarm optimization, backpropagation, and
no. 16, pp. 30–37, Sep. 2013, doi: 10.5120/13608-1412. neural networks. Applied Computational Intelligence and Soft
Computing, 2018.
[29] D. Q. Zeebaree, A. M. Abdulazeez, D. A. Zebari, H. Haron, and H. N. A.
Hamed, “Multi-Level Fusion in Ultrasound for Cancer Detection Based [47] Ahmed, F. Y., al Thiruchelvam, M., & Fong, S. L. (2019, June).
on Uniform LBP Features,” p. 21, 2021. Improvement of Vehicle Management System (IVMS). In 2019 IEEE
International Conference on Automatic Control and Intelligent Systems
[30] K. A. Taher, B. Mohammed Yasin Jisan, and Md. M. Rahman, “Network
(I2CACIS) (pp. 44-49). IEEE.
Intrusion Detection using Supervised Machine Learning Technique with
[48] Ahmed, F. Y., Sreejith, R., & Abdullah, M. I. (2021, April). Enhancement
Feature Selection,” in 2019 International Conference on
Robotics,Electrical and Signal Processing Techniques (ICREST), Dhaka, of E-Commerce Database System During the COVID-19 Pandemic.
Bangladesh, Jan. 2019, pp. 643–646. doi: In 2021 IEEE 11th IEEE Symposium on Computer Applications &
10.1109/ICREST.2019.8644161. Industrial Electronics (ISCAIE) (pp. 174-179). IEEE.
[49] Alkawaz, M. H., Segar, S. D., & Ali, I. R. (2020). A Research on the
[31] S. M. Sohi, J.-P. Seifert, and F. Ganji, “RNNIDS: Enhancing network Perception and use of Electronic Books Among it Students in
intrusion detection systems through deep learning,” Computers & Management & Science University. In 2020 16th IEEE International
Security, vol. 102, p. 102151, Mar. 2021, doi: Colloquium on Signal Processing & Its Applications (CSPA) (pp. 52-
10.1016/j.cose.2020.102151. 56). IEEE.
[32] C. Kalimuthan and J. Arokia Renjit, “Review on intrusion detection using [50] Alkawaz, M. H., Rajandran, H., & Abdullah, M. I. (2020). The Impact
feature selection with machine learning techniques,” Materials Today: of Current Relation between Facebook Utilization and E-Stalking
Proceedings, vol. 33, pp. 3794–3802, 2020, doi: towards Users Privacy. In 2020 IEEE International Conference on
10.1016/j.matpr.2020.06.218. Automatic Control and Intelligent Systems (I2CACIS) (pp. 141-147).
[33] C. A. M. and R. K., “Performance evaluation of data clustering techniques IEEE.
using KDD Cup-99 Intrusion detection data set,” IJINS, vol. 1, no. 4, pp.
294–305, Sep. 2012, doi: 10.11591/ijins.v1i4.821.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on July 31,2021 at 20:39:21 UTC from IEEE Xplore. Restrictions apply.
View publication stats