Intrusion Detection Using Machine Learning and Deep Learning Models on Cyber Security Attacks
DOI:
https://doi.org/10.21015/vtse.v12i2.1817Abstract
To detect and stop harmful activity in computer networks, network intrusion detection is an essential part of cybersecurity defensive systems. It is becoming more difficult for traditional rule-based techniques to identify new attack vectors in the face of the increasing complexity and diversity of cyber threats. Machine learning (ML) and deep learning (DL) models can analyze vast amounts of network traffic data and automatically identify patterns and anomalies, there has been a surge in interest in using these models for network intrusion detection. This paper examines the approaches, algorithms, and real-world applications of machine learning and deep learning techniques for network intrusion detection in order to present a thorough review of the state-of-the-art in countering cyber threats. We assess ML and DL-based intrusion detection systems' effectiveness, strengths, and weaknesses in a range of attack scenarios and network environments by synthesizing current literature and empirical research. Additionally, we talk about new developments, obstacles, and paths forward in the areas of transfer learning, adversarial robustness, and ensemble learning. The understanding gained from this investigation clarifies the potential of ML and DL models in strengthening defenses against changing cyber threats, reducing risks, and protecting vital assets. In deep learning autoencode accuracy 68\% less than other models. The performance of the CNN and LSTM algorithm is impressive and outperformed with 100\% accuracy on cyber security attacks datasets. Machine learning algorithm accuracy rate of SVM and KNN 100\% while logistic regression accuracy is 99\% GNB accuracy 80\% with training data of the models. The overall models perforamance deep learning increadible accuracy with 100\% on the training and testing data.
References
I. Ullah, M. Yasir, I. H. Haq, G. Husnain, S. U. Islam, W. Ahmad, and S. Rizwan, "Performance Evaluation of Secured Virtual Private Network based on Dynamic Multipoint Virtual Private Network," in *Proceedings of 1st International Conference on Computing Technologies, Tools and Applications*, 2023, pp. 26-35.
T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep learning approach for network intrusion detection in software defined networking," in *2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)*, 2016, pp. 258-263.
Z. Wang, Y. Liu, D. He, and S. Chan, "Intrusion detection methods based on integrated deep learning model," *Computers & Security*, vol. 103, pp. 102177, 2021.
G. Kocher and G. Kumar, "Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges," *Soft Computing*, vol. 25, pp. 9731-9763, 2021.
N. Awad, "Computers, Materials & Continua," *Medicine*, vol. 67, 2021.
L. Abualigah and A. J. Dulaimi, "A novel feature selection method for data mining tasks using hybrid sine cosine algorithm and genetic algorithm," *Cluster Computing*, vol. 24, pp. 2161-2176, 2021.
N. Tiwari, N. K. Singh, R. Singh, and R. Rameshwar, "Identifying potential churners through predictive analysis: evaluation using pro-active-attrition management logistic regression," *International Journal of Technology Transfer and Commercialisation*, vol. 18, pp. 439-461, 2021.
P. Edastama, A. Dudhat, and G. Maulani, "Use of Data Warehouse and Data Mining for Academic Data: A Case Study at a National University," *International Journal of Cyber and IT Service Management*, vol. 1, pp. 206-215, 2021.
R. Hou, X. Ye, H. B. Zaki, and N. A. Omar, "Marketing decision support system based on data mining technology," *Applied Sciences*, vol. 13, pp. 4315, 2023.
Y. Fu, Y. Du, Z. Cao, Q. Li, and W. Xiang, "A deep learning model for network intrusion detection with imbalanced data," *Electronics*, vol. 1, pp. 898, 2022.
H. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, "BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset," *IEEE Access*, 2020.
F. Ateş et al., "Determination of vehicle type by image classification methods for a sample traffic intersection in Isparta province," in *Proceedings of the International Conference on Artificial Intelligence and Applied Mathematics in Engineering*, 2021.
S. Rawat et al., "Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network," *Internet Technology*, vol. 5, 2022.
P. L. S. Jayalaxmi et al., "Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey," *IEEE Access*, vol. 10, pp. 121173-121192, 2022.
Y. K. Saheed et al., "A machine learning-based intrusion detection for detecting internet of things network attacks," *Alexandria Engineering Journal*, vol. 12, pp. 9395-9409, 2022.
V. Dutta et al., "A deep learning ensemble for network anomaly and cyber-attack detection," *Journal of Sensor*, vol. 20, pp. 4583, 2020.
H. Yang, L. Cheng, and M. C. Chuah, "Deep-learning-based network intrusion detection for SCADA systems," in *IEEE Conference on Communications and Network Security*, 2019.
W. Ahmad, S. Ahmed, N. Sheeraz, A. Khan, A. Ishtiaq, and M. Saba, "Localization error computation for RSSI based positioning system in VANETs," in 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), pp. 1-6, 2020.
D. Akgun, S. Hizal, and U. Cavusoglu, "A new DDoS attacks intrusion detection model based on deep learning for cybersecurity," Computers & Security, vol. 118, p. 102748, 2022.
T. Ullah, E. G. Hussnain, W. Ahmad, G. Sikander, and M. Ashfaq, "An efficient machine learning based multiclass cyber attacks classification and prediction," The Sciencetech, vol. 4, 2023.
R. Khan, L. Jan, S. Khan, M. H. Zafar, W. Ahmad, and G. Husnain, "An effective algorithm in uplink massive MIMO systems for pilot decontamination," Results in Engineering, p. 101873, 2024.
T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj, "Anomaly-based intrusion detection system for IoT networks through deep learning model," Computers and Electrical Engineering, pp. 99, 107810, 2022.
M. S. Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, "Ddosnet: A deep-learning model for detecting network attacks," in 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), pp. 391-396, 2020.
I. Ullah, M. Yasir, I. U. Haq, G. Husnain, S. U. Islam, W. Ahmad, and S. Rizwan, "Performance evaluation of secured virtual private network based on dynamic multipoint virtual private network," in Proceedings of 1st International Conference on Computing Technologies, Tools and Applications, pp. 26-35, 2023.
T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep learning approach for network intrusion detection in software defined networking," in 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258-263, 2016.
Z. Wang, Y. Liu, D. He, and S. Chan, "Intrusion detection methods based on integrated deep learning model," Computers & Security, vol. 103, p. 102177, 2021.
G. Kocher and G. Kumar, "Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges," Soft Computing, vol. 25, pp. 9731-9763, 2021.
N. A. Awad, "Computers, materials & continua," Medicine, vol. 67, 2021.
L. Abualigah and A. J. Dulaimi, "A novel feature selection method for data mining tasks using hybrid sine cosine algorithm and genetic algorithm," Cluster Computing, vol. 24, pp. 2161-2176, 2021.
N. Tiwari, N. K. Singh, R. Singh, and R. Rameshwar, "Identifying potential churners through predictive analysis: evaluation using pro-active-attrition management logistic regression," International Journal of Technology Transfer and Commercialisation, vol. 18, pp. 439-461, 2021.
P. Edastama, A. Dudhat, and G. Maulani, "Use of data warehouse and data mining for academic data: A case study at a national university," International Journal of Cyber and IT Service Management, vol. 1, pp. 206-215, 2021.
R. Hou, X. Ye, H. B. O. Zaki, and N. A. B. Omar, "Marketing decision support system based on data mining technology," Applied Sciences, vol. 13, p. 4315, 2023.
Y. Fu, Y. Du, Z. Cao, Q. Li, and W. Xiang, "A deep learning model for network intrusion detection with imbalanced data," Electronics, vol. 1, p. 898, 2022.
H. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, "BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset," IEEE Access, 2020.
F. Ateş et al., "Determination of vehicle type by image classification methods for a sample traffic intersection in Isparta province," in Proceedings of the International Conference on Artificial Intelligence and Applied Mathematics in Engineering, 2021.
S. Rawat et al., "Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network," Internet Technology, vol. 5, 2022.
P. L. S. Jayalaxmi et al., "Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey," IEEE Access, vol. 10, pp. 121173-121192, 2022.
Y. K. Saheed et al., "A machine learning-based intrusion detection for detecting Internet of Things network attacks," Alexandria Engineering Journal, vol. 12, pp. 9395-9409, 2022.
V. Dutta et al., "A deep learning ensemble for network anomaly and cyber-attack detection," Journal of Sensor, vol. 20, p. 4583, 2020.
H. Yang, L. Cheng, and M. C. Chuah, "Deep-learning-based network intrusion detection for SCADA systems," in IEEE Conference on Communications and Network Security, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY