Cargando…

Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System

Recently, with the massive growth of IoT devices, the attack surfaces have also intensified. Thus, cybersecurity has become a critical component to protect organizational boundaries. In networks, Intrusion Detection Systems (IDSs) are employed to raise critical flags during network management. One a...

Descripción completa

Detalles Bibliográficos
Autores principales: Henry, Azriel, Gautam, Sunil, Khanna, Samrat, Rabie, Khaled, Shongwe, Thokozani, Bhattacharya, Pronaya, Sharma, Bhisham, Chowdhury, Subrata
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9866711/
https://www.ncbi.nlm.nih.gov/pubmed/36679684
http://dx.doi.org/10.3390/s23020890
_version_ 1784876159616417792
author Henry, Azriel
Gautam, Sunil
Khanna, Samrat
Rabie, Khaled
Shongwe, Thokozani
Bhattacharya, Pronaya
Sharma, Bhisham
Chowdhury, Subrata
author_facet Henry, Azriel
Gautam, Sunil
Khanna, Samrat
Rabie, Khaled
Shongwe, Thokozani
Bhattacharya, Pronaya
Sharma, Bhisham
Chowdhury, Subrata
author_sort Henry, Azriel
collection PubMed
description Recently, with the massive growth of IoT devices, the attack surfaces have also intensified. Thus, cybersecurity has become a critical component to protect organizational boundaries. In networks, Intrusion Detection Systems (IDSs) are employed to raise critical flags during network management. One aspect is malicious traffic identification, where zero-day attack detection is a critical problem of study. Current approaches are aligned towards deep learning (DL) methods for IDSs, but the success of the DL mechanism depends on the feature learning process, which is an open challenge. Thus, in this paper, the authors propose a technique which combines both CNN, and GRU, where different CNN–GRU combination sequences are presented to optimize the network parameters. In the simulation, the authors used the CICIDS-2017 benchmark dataset and used metrics such as precision, recall, False Positive Rate (FPR), True Positive Rate (TRP), and other aligned metrics. The results suggest a significant improvement, where many network attacks are detected with an accuracy of 98.73%, and an FPR rate of 0.075. We also performed a comparative analysis with other existing techniques, and the obtained results indicate the efficacy of the proposed IDS scheme in real cybersecurity setups.
format Online
Article
Text
id pubmed-9866711
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-98667112023-01-22 Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System Henry, Azriel Gautam, Sunil Khanna, Samrat Rabie, Khaled Shongwe, Thokozani Bhattacharya, Pronaya Sharma, Bhisham Chowdhury, Subrata Sensors (Basel) Article Recently, with the massive growth of IoT devices, the attack surfaces have also intensified. Thus, cybersecurity has become a critical component to protect organizational boundaries. In networks, Intrusion Detection Systems (IDSs) are employed to raise critical flags during network management. One aspect is malicious traffic identification, where zero-day attack detection is a critical problem of study. Current approaches are aligned towards deep learning (DL) methods for IDSs, but the success of the DL mechanism depends on the feature learning process, which is an open challenge. Thus, in this paper, the authors propose a technique which combines both CNN, and GRU, where different CNN–GRU combination sequences are presented to optimize the network parameters. In the simulation, the authors used the CICIDS-2017 benchmark dataset and used metrics such as precision, recall, False Positive Rate (FPR), True Positive Rate (TRP), and other aligned metrics. The results suggest a significant improvement, where many network attacks are detected with an accuracy of 98.73%, and an FPR rate of 0.075. We also performed a comparative analysis with other existing techniques, and the obtained results indicate the efficacy of the proposed IDS scheme in real cybersecurity setups. MDPI 2023-01-12 /pmc/articles/PMC9866711/ /pubmed/36679684 http://dx.doi.org/10.3390/s23020890 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Henry, Azriel
Gautam, Sunil
Khanna, Samrat
Rabie, Khaled
Shongwe, Thokozani
Bhattacharya, Pronaya
Sharma, Bhisham
Chowdhury, Subrata
Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System
title Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System
title_full Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System
title_fullStr Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System
title_full_unstemmed Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System
title_short Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System
title_sort composition of hybrid deep learning model and feature optimization for intrusion detection system
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9866711/
https://www.ncbi.nlm.nih.gov/pubmed/36679684
http://dx.doi.org/10.3390/s23020890
work_keys_str_mv AT henryazriel compositionofhybriddeeplearningmodelandfeatureoptimizationforintrusiondetectionsystem
AT gautamsunil compositionofhybriddeeplearningmodelandfeatureoptimizationforintrusiondetectionsystem
AT khannasamrat compositionofhybriddeeplearningmodelandfeatureoptimizationforintrusiondetectionsystem
AT rabiekhaled compositionofhybriddeeplearningmodelandfeatureoptimizationforintrusiondetectionsystem
AT shongwethokozani compositionofhybriddeeplearningmodelandfeatureoptimizationforintrusiondetectionsystem
AT bhattacharyapronaya compositionofhybriddeeplearningmodelandfeatureoptimizationforintrusiondetectionsystem
AT sharmabhisham compositionofhybriddeeplearningmodelandfeatureoptimizationforintrusiondetectionsystem
AT chowdhurysubrata compositionofhybriddeeplearningmodelandfeatureoptimizationforintrusiondetectionsystem