International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

Archives

TuEngr+Logo
:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

http://TuEngr.com



ISSN 2228-9860
eISSN 1906-9642
CODEN: ITJEA8


FEATURE PEER-REVIEWED ARTICLE

Vol.13(7)(2022)

  • An Efficient Autoencoder Based Deep Learning Technique to Detect Network Intrusions

    C. Haripriya, M.P. Prabhudev Jagadeesh ( JSS Academy of Technical Education, VTU, INDIA).

    Disciplinary: Cyber Security and Machine Learning (Deep Learning, Network Security)

    ➤ FullText

    doi: 10.14456/ITJEMAST.2022.142

    Keywords: Intrusion Detection; Deep learning; Autoencoder, CSE_CIC-IDS 2018; Class Imbalance; SMOTE; Cybersecurity;

    Abstract
    With the tremendous advancements in internet technology, the amount of data generated over the network is very large. In a network connected with millions of computers, Terabytes/Zettabytes of data are generated every second. It is almost impossible to analyze this enormous data generated in the network manually. Companies have to incur huge losses if their network is compromised, hence timely detection of intrusions is very important to help the organizations prevent further attacks. Deep learning algorithms proved to be more effective when compared to Machine Learning algorithms. Earlier research works focused on old sets like KDDCup99 which do not reflect current-day attacks. All the Intrusion Detection Datasets are imbalanced and have severely skewed class distribution. Many researchers do not focus on class imbalance and their classification models tend to overfit. The major motivation of our research work is to focus on data pre-processing techniques and address the class imbalance problem using SMOTE (Synthetic Minority Oversampling Technique). We implement a deep autoencoder on the latest dataset which is the latest benchmark dataset that reflects current attacks. The average accuracy considering all the CSV (Comma Separated Values) files of the "CSE-CIC-IDS 2018" is 97.79 %. The proposed model achieved promising results and is more accurate since we considered all the records and attack types of the dataset.

    Paper ID: 13A7P

    Cite this article:

    Haripriya, C., Jagadeesh, M. P. P. (2022). An Efficient Autoencoder Based Deep Learning Technique to Detect Network Intrusions. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 13(7), 13A7P, 1-9. http://TUENGR.COM/V13/13A7P.pdf DOI: 10.14456/ITJEMAST.2022.142

References

  1. Abusitta A, Bellaiche M, Dagenais M, Halabi T. A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems. 2019 Sep 1;98:308-18.
  2. Al-amri R, Murugesan RK, Man M, Abdulateef AF, Al-Sharafi MA, Alkahtani AA. A review of machine learning and deep learning techniques for anomaly detection in IoT data. Applied Sciences. 2021 Jan;11(12):5320.
  3. Bank D, Koenigstein N, Giryes R. Autoencoders. arXiv preprint arXiv:2003.05991. 2020 Mar 12.
  4. Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP. SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research. 2002 Jun 1;16:321-57.
  5. Farahnakian F, Heikkonen J. A deep auto-encoder based approach for intrusion detection system. In 2018 20th International Conference on Advanced Communication Technology (ICACT) 2018 Feb 11 (pp. 178-183). IEEE.
  6. Fathima N, Pramod A, Srivastava Y, Thomas AM. Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System. arXiv preprint arXiv:2112.03704. 2021.
  7. Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications. 2020;50:102419.
  8. Gu Z, Wang L, Liu C, Wang Z. Network Intrusion Detection with Nonsymmetric Deep Autoencoding Feature Extraction. Security and Communication Networks. 2021;2021.
  9. Kanimozhi V, Jacob TP. Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. In2019 international conference on communication and signal processing (ICCSP) 2019 Apr 4 (pp. 0033-0036). IEEE.
  10. Khan FA, Gumaei A, Derhab A, Hussain A. A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access. 2019;7:30373-85.
  11. Kunang YN, Nurmaini S, Stiawan D, Zarkasi A. Automatic features extraction using autoencoder in intrusion detection system. In 2018 International Conference on Electrical Engineering and Computer Science (ICECOS) 2018 Oct 2 (pp. 219-224). IEEE.
  12. Moraboena, S., Ketepalli, G., Ragam, P. A deep learning approach to network intrusion detection using deep autoencoder. Revue d'Intelligence Artificielle, 2020;34(4):457-463. DOI: 10.18280/ria.340410
  13. Papamartzivanos D, Marmol FG, Kambourakis G. Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access. 2019;7:13546-60.
  14. Rao KN, Rao KV, PVGD PR. A hybrid intrusion detection system based on sparse autoencoder and deep neural network. Computer Communications. 2021;180:77-88.
  15. Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp. 2018 Jan 22;1:108-16.
  16. Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security. 2012 May 1;31(3):357-74.
  17. Shone N, Ngoc TN, Phai VD, Shi Q. A deep learning approach to network intrusion detection. IEEE transactions on emerging topics in computational intelligence. 2018 Jan 22;2(1):41-50.
  18. Tavallaee M, Bagheri E, Lu W, Ghorbani AA. A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications 2009 Jul 8 (pp. 1-6). Ieee.
  19. Wang Y, Cai WD, Wei PC. A deep learning approach for detecting malicious JavaScript code. Security and Communication Networks. 2016 Jul 25;9(11):1520-34.
  20. Xu W, Fan Y, Li C. I2DS: interpretable intrusion detection system using autoencoder and additive tree. Security and Communication Networks. 2021 Mar 12;2021.
  21. Yang Y, Zheng K, Wu C, Yang Y. Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network. Sensors. 2019 Jun 2;19(11):2528.


Other issues:
Vol.13(4)(2022)
Vol.13(3)(2022)
Vol.13(2)(2022)
Archives




Call-for-Papers

Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/cross-disciplinary/multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ TuEngr.com (please see all detail from Instructions for Authors)



Publication and peer-reviewed process:
After the peer-review process, articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.