•  
  •  
 

Corresponding Author

Sardar KH. Hassan

Authors ORCID

0000-0002-6620-8627

Document Type

Research Article

Abstract

Computer systems and network infrastructures are still exposed to many security risks and cyber-attack vulnerabilities despite advancements of information security. Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully protecting computer networks against novel attacks. For this purpose, Anomaly-based Network Intrusion Detection System (A-NIDS) as cyber security tool is considered for identifying and detecting anomalous behavior in the flow-based network traffic alongside with firewalls and other security measures.The main objective of the research is to improve the detection rate and reduce false-positive rates of the classifier using anomaly-based technique.

Keywords

Intrusion Detection System, Anomaly detection, Intelligent Technique, Cyber-Attack, Deep Learning, Machine Learning

References

Al-Daweri, M. S., Abdullah, S. and Zainol Ariffin, K. A. (2021) ‘An adaptive method and a new dataset, UKMIDS20, for the network intrusion detection system’, Computer Communications, 180(February), pp. 57–76. doi: 10.1016/j.comcom.2021.09.007.

Ambusaidi, M. A. et al. (2016) ‘Building an intrusion detection system using a filter-based feature selection algorithm’, IEEE Transactions on Computers, 65(10), pp. 2986– 2998. doi: 10.1109/TC.2016.2519914.

Debasish Kalita (2022) An Overview on Long Short Term Memory (LSTM), March 11, 2022. Available at: https://www.analyticsvidhya.com/blog/2022/03/anoverview-on-long-short-term-memory-lstm/.

Govindarajan, M. and Chandrasekaran, R. (2011) ‘Intrusion detection using neural based hybrid classification methods’, Computer Networks, 55(8), pp. 1662–1671. doi: 10.1016/j.comnet.2010.12.008.

Kanimozhi, V. and Jacob, T. P. (2020) ‘Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing’, ICT Express, (xxxx). doi: 10.1016/j.icte.2020.12.004.

De la Hoz, E. et al. (2015) ‘PCA filtering and probabilistic SOM for network intrusion detection’, Neurocomputing, 164, pp. 71–81. doi: 10.1016/j.neucom.2014.09.083.

Moualla, S., Khorzom, K. and Jafar, A. (2021) ‘Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset’, Computational Intelligence and Neuroscience, 2021. doi: 10.1155/2021/5557577.

Oliveira, N. et al. (2021) ‘Intelligent cyber attack detection and classification for network-based intrusion detection systems’, Applied Sciences (Switzerland), 11(4), pp. 1– 21. doi: 10.3390/app11041674.

Peddabachigari, S. et al. (2007) ‘Modeling intrusion detection system using hybrid intelligent systems’, Journal of Network and Computer Applications, 30(1), pp. 114– 132. doi: 10.1016/j.jnca.2005.06.003.

Ravikumar, D. (2021) ‘Towards Enhancement of Machine Learning Techniques Using CSE-CIC-IDS2018 Cybersecurity Dataset’. Available at: https://search.proquest.com/openview/6223ef80659ae1 48bd418cd6fb01b2fd/1?pqorigsite=gscholar&cbl=18750&diss=y.

Rosay, A. et al. (2021) ‘Multi-layer perceptron for network intrusion detection: From a study on two recent data sets to deployment on automotive processor’, Annales des Telecommunications/Annals of Telecommunications. doi: 10.1007/s12243-021-00852-0.

Vinayakumar, R. et al. (2019) ‘Deep Learning Approach for Intelligent Intrusion Detection System’, IEEE Access, 7, pp. 41525–41550. doi: 10.1109/ACCESS.2019.2895334

Yin, C. et al. (2017) ‘A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks’, IEEE Access, 5, pp. 21954–21961. doi: 10.1109/ACCESS.2017.2762418.

Zhou, Y. et al. (2020) ‘Building an efficient intrusion detection system based on feature selection and ensemble classifier’, Computer Networks, 174(April). doi: 10.1016/j.comnet.2020.107247.

Zoghi, Z. and Serpen, G. (2021) ‘UNSW-NB15 Computer Security Dataset: Analysis through Visualization’. Available at: http://arxiv.org/abs/2101.05067.

Publication Date

2-1-2023

Included in

Life Sciences Commons

Share

COinS