Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks

Main Article Content

Mohammed Abdulhammed Al-Shabi

Abstract

Recent years have witnessed a tremendous development in various scientific and industrial fields. As a result, different types of networks are widely introduced which are vulnerable to intrusion. In view of the same, numerous studies have been devoted to detecting all types of intrusion and protect the networks from these penetrations. In this paper, a novel network intrusion detection system has been designed to detect cyber-attacks using complex deep neuronal networks. The developed system is trained and tested on the standard dataset KDDCUP99 via pycharm program. Relevant to existing intrusion detection methods with similar deep neuronal networks and traditional machine learning algorithms, the proposed detection system achieves better results in terms of detection accuracy.

Article Details

How to Cite
Al-Shabi, M. A. (2022). Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks. International Journal of Communication Networks and Information Security (IJCNIS), 13(3). https://doi.org/10.17762/ijcnis.v13i3.5148 (Original work published December 25, 2021)
Section
Research Articles
Author Biography

Mohammed Abdulhammed Al-Shabi, Department of Management Information System, College of Business Administration, Taibah University, Saudi Arabia

Mohammed Al-Shabi received his bachelor’s degree (B.Sc. Computer Science) from Technology University at Iraq (1997), Postgraduate Master (M. Sc. Computer Science from Putra Malaysia University at 2002), and Ph.D. (Computer Science) from Putra Malaysia University, Malaysia (2006). He is currently an associate professor in the Department of Management Information System, College of Business Administration at Taibah University, Kingdom of Saudi Arabia. Prior to joining Taibah University, he worked in the Faculty of a computer at Qassim University, Saudi Arabia. His research interests include wireless security, cryptography, UML, Stenography Multistage interconnection network, Vehicular Ad-hoc Network-Cloud, Smart and Intelligent computing and Apply Mathematically.

References

R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, Deep learning approach for intelligent intrusion detection system, IEEE Access, vol. 7, pp. 41525–41550, 2019.

A. Aldweesh, A. Derhab, and A. Z. Emam, Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues, Knowledge-Based Syst., vol. 189, p. 105124, 2020.

S. Dua and X. Du, Data mining and machine learning in cybersecurity. CRC press, 2016.

H. Liu and B. Lang, Machine learning and deep learning methods for intrusion detection systems: A survey, Appl. Sci., vol. 9, no. 20, p. 4396, 2019.

G. Karatas, O. Demir, and O. K. Sahingoz, Deep learning in intrusion detection systems, in 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018, pp. 113–116.

P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, A detailed investigation and analysis of using machine learning techniques for intrusion detection, IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 686–728, 2018.

A. Azab, M. Alazab, and M. Aiash, Machine learning based botnet identification traffic, in 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, pp. 1788–1794.

G. E. Hinton, A practical guide to training restricted Boltzmann machines, in Neural networks: Tricks of the trade, Springer, 2012, pp. 599–619.

A. Graves, A. Mohamed, and G. Hinton, Speech recognition with deep recurrent neural networks, in 2013 IEEE international conference on acoustics, speech and signal processing, 2013, pp. 6645–6649.

A. Graves and N. Jaitly, Towards end-to-end speech recognition with recurrent neural networks, in international conference on machine learning, 2014, pp. 1764–1772.

I. Sutskever, O. Vinyals, and Q. V Le, Sequence to sequence learning with neural networks, in Advances in neural information processing systems, 2014, pp. 3104–3112.

R. I. Dr. Hassan Alahmad, Using Neural Networks to Build an Intrusion Detection System based on Standard Dataset (KDD99), Tishreen Univ. J. Res. Sci. Stud. - Eng. Sci. Ser., vol. 39, no. 5, pp. 287–310, 2017.

V. N. Tiwari, S. Rathore, and K. Patidar, Enhanced Method for Intrusion Detection over KDD Cup 99 Dataset.

W. Lee, S. J. Stolfo, and K. W. Mok, Adaptive intrusion detection: A data mining approach, Artif. Intell. Rev., vol. 14, no. 6, pp. 533–567, 2000.

KDD99 Dataset., 1999. [Online]. Available: https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [Accessed: 16-Oct-2019].

Eastmount, Intrusion detection and attack recognition based on machine learning KDD CUP99 dataset as an example, 2019. [Online]. Available: https://www.arabicprogrammer.com/article/7432839791/. [Accessed: 23-Nov-2019].

A. Özgür and H. Erdem, A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015, PeerJ Prepr., vol. 4, p. e1954v1, 2016.

M. A. Al-Shabi, Credit card fraud detection using autoencoder model in unbalanced datasets, J. Adv. Math. Comput. Sci., pp. 1–16, 2019.

C. Yin, Y. Zhu, J. Fei, and X. He, A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, vol. 5, pp. 21954–21961, 2017.

W.-H. Lin, H.-C. Lin, P. Wang, B.-H. Wu, and J.-Y. Tsai, Using convolutional neural networks to network intrusion detection for cyber threats, in 2018 IEEE International Conference on Applied System Invention (ICASI), 2018, pp. 1107–1110.

R. K. Vigneswaran, R. Vinayakumar, K. P. Soman, and P. Poornachandran, Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security, in 2018 9th International conference on computing, communication and networking technologies (ICCCNT), 2018, pp. 1–6.

B. Alsughayyir, A. M. Qamar, and R. Khan, developing a network attack detection system using deep learning, in 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1–5.