Document Type
Research Article
Abstract
Computer systems and network infrastructures are still exposed to many security risks and cyber-attack vulnerabilities despite advancements of information security. Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully protecting computer networks against novel attacks. For this purpose, Anomaly-based Network Intrusion Detection System (A-NIDS) as cyber security tool is considered for identifying and detecting anomalous behavior in the flow-based network traffic alongside with firewalls and other security measures.The main objective of the research is to improve the detection rate and reduce false-positive rates of the classifier using anomaly-based technique.
Keywords
Intrusion Detection System, Anomaly detection, Intelligent Technique, Cyber-Attack, Deep Learning, Machine Learning
How to Cite This Article
Hassan, Sardar KH. and Daneshwar, Muhammadamin A.
(2023)
"Anomaly-based Network Intrusion Detection System using Deep Intelligent Technique,"
Polytechnic Journal: Vol. 12:
Iss.
2, Article 11.
DOI: https://doi.org/10.25156/ptj.v12n2y2022.pp100-113
References
Al-Daweri, M. S., Abdullah, S. and Zainol Ariffin, K. A. (2021) ‘An adaptive method and a new dataset, UKMIDS20, for the network intrusion detection system’, Computer Communications, 180(February), pp. 57–76. doi: 10.1016/j.comcom.2021.09.007.
Ambusaidi, M. A. et al. (2016) ‘Building an intrusion detection system using a filter-based feature selection algorithm’, IEEE Transactions on Computers, 65(10), pp. 2986– 2998. doi: 10.1109/TC.2016.2519914.
Debasish Kalita (2022) An Overview on Long Short Term Memory (LSTM), March 11, 2022. Available at: https://www.analyticsvidhya.com/blog/2022/03/anoverview-on-long-short-term-memory-lstm/.
Govindarajan, M. and Chandrasekaran, R. (2011) ‘Intrusion detection using neural based hybrid classification methods’, Computer Networks, 55(8), pp. 1662–1671. doi: 10.1016/j.comnet.2010.12.008.
Kanimozhi, V. and Jacob, T. P. (2020) ‘Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing’, ICT Express, (xxxx). doi: 10.1016/j.icte.2020.12.004.
De la Hoz, E. et al. (2015) ‘PCA filtering and probabilistic SOM for network intrusion detection’, Neurocomputing, 164, pp. 71–81. doi: 10.1016/j.neucom.2014.09.083.
Moualla, S., Khorzom, K. and Jafar, A. (2021) ‘Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset’, Computational Intelligence and Neuroscience, 2021. doi: 10.1155/2021/5557577.
Oliveira, N. et al. (2021) ‘Intelligent cyber attack detection and classification for network-based intrusion detection systems’, Applied Sciences (Switzerland), 11(4), pp. 1– 21. doi: 10.3390/app11041674.
Peddabachigari, S. et al. (2007) ‘Modeling intrusion detection system using hybrid intelligent systems’, Journal of Network and Computer Applications, 30(1), pp. 114– 132. doi: 10.1016/j.jnca.2005.06.003.
Ravikumar, D. (2021) ‘Towards Enhancement of Machine Learning Techniques Using CSE-CIC-IDS2018 Cybersecurity Dataset’. Available at: https://search.proquest.com/openview/6223ef80659ae1 48bd418cd6fb01b2fd/1?pqorigsite=gscholar&cbl=18750&diss=y.
Rosay, A. et al. (2021) ‘Multi-layer perceptron for network intrusion detection: From a study on two recent data sets to deployment on automotive processor’, Annales des Telecommunications/Annals of Telecommunications. doi: 10.1007/s12243-021-00852-0.
Vinayakumar, R. et al. (2019) ‘Deep Learning Approach for Intelligent Intrusion Detection System’, IEEE Access, 7, pp. 41525–41550. doi: 10.1109/ACCESS.2019.2895334
Yin, C. et al. (2017) ‘A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks’, IEEE Access, 5, pp. 21954–21961. doi: 10.1109/ACCESS.2017.2762418.
Zhou, Y. et al. (2020) ‘Building an efficient intrusion detection system based on feature selection and ensemble classifier’, Computer Networks, 174(April). doi: 10.1016/j.comnet.2020.107247.
Zoghi, Z. and Serpen, G. (2021) ‘UNSW-NB15 Computer Security Dataset: Analysis through Visualization’. Available at: http://arxiv.org/abs/2101.05067.
Publication Date
2-1-2023
Follow us: