Integrated Spatial and Temporal Features Based Network Intrusion Detection System Using SMOTE Sampling

PDF (1338KB), PP.14-27

Views: 0 Downloads: 0

Author(s)

Shrinivas A. Khedkar 1,* Madhav Chandane 1 Rasika Gawande 1

1. Veermata Jijabai Technological Institute, Mumbai, 400019, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2024.02.02

Received: 2 Sep. 2022 / Revised: 1 Nov. 2022 / Accepted: 29 Dec. 2022 / Published: 8 Apr. 2024

Index Terms

Network Intrusion Detection, CNN, BIDLSTM, SMOTE, CICIDS2017, Deep Learning

Abstract

With attackers discovering more inventive ways to take advantage of network weaknesses, the pace of attacks has drastically increased in recent years. As a result, network security has never been more important, and many network intrusion detection systems (NIDS) rely on old, out-of-date attack signatures. This necessitates the deployment of reliable and modern Network Intrusion Detection Systems that are educated on the most recent data and employ deep learning techniques to detect malicious activities. However, it has been found that the most recent datasets readily available contain a large quantity of benign data, enabling conventional deep learning systems to train on the imbalance data. A high false detection rate result from this. To overcome the aforementioned issues, we suggest a Synthetic Minority Over-Sampling Technique (SMOTE) integrated convolution neural network and bi-directional long short-term memory SCNN-BIDLSTM solution for creating intrusion detection systems. By employing the SMOTE, which integrates a convolution neural network to extract spatial features and a bi-directional long short-term memory to extract temporal information; difficulties are reduced by increasing the minority samples in our dataset. In order to train and evaluate our model, we used open benchmark datasets as CIC-IDS2017, NSL-KDD, and UNSW-NB15 and compared the results with other state of the art models.

Cite This Paper

Shrinivas A. Khedkar, Madhav Chandane, Rasika Gawande, "Integrated Spatial and Temporal Features Based Network Intrusion Detection System Using SMOTE Sampling", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.2, pp.14-27, 2024. DOI:10.5815/ijcnis.2024.02.02

Reference

[1]Aleesa, Ahmed, M. O. H. A. M. M. E. D. Younis, AHMED A. Mohammed, and N. Sahar. "Deep-intrusion detection system with enhanced UNSW-NB15 dataset based on deep learning techniques." Journal of Engineering Science and Technology 16, no. 1 (2021): 711-727.
[2]Shende, Supriya, and Samrat Thorat. "Long Short-Term Memory (LSTM) Deep Learning Method for Intrusion Detection in Network Security." International Journal of Engineering Research and 9 (2020).
[3]Yin, Chuanlong, Yuefei Zhu, Jinlong Fei, and Xinzheng He. "A deep learning approach for intrusion detection using recurrent neural networks." Ieee Access 5 (2017): 21954-21961.
[4]You, Wei, Changqing Shen, Dong Wang, Liang Chen, Xingxing Jiang, and Zhongkui Zhu. "An intelligent deep feature learning method with improved activation functions for machine fault diagnosis." IEEE Access 8 (2019): 1975-1985.
[5]Ahsan, Mostofa, and Kendall E. Nygard. "Convolutional Neural Networks with LSTM for Intrusion Detection." In CATA, vol. 69, pp. 69-79. 2020.
[6]Sun, Pengfei, Pengju Liu, Qi Li, Chenxi Liu, Xiangling Lu, Ruochen Hao, and Jinpeng Chen. "DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system." Security and communication networks 2020 (2020).
[7]Su, Tongtong, Huazhi Sun, Jinqi Zhu, Sheng Wang, and Yabo Li. "BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset." IEEE Access 8 (2020): 29575-29585.
[8]Imrana, Yakubu, Yanping Xiang, Liaqat Ali, and Zaharawu Abdul-Rauf. "A bidirectional LSTM deep learning approach for intrusion detection." Expert Systems with Applications 185 (2021): 115524.
[9]Yang, S. U. "Research on network behavior anomaly analysis based on bidirectional LSTM." In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 798-802. IEEE, 2019.
[10]Li, Aichuan, and Shujuan Yi. "Intelligent Intrusion Detection Method of Industrial Internet of Things Based on CNN-BiLSTM." Security and Communication Networks 2022 (2022).
[11]Praanna, K., S. Sruthi, K. Kalyani, and A. Sai Tejaswi. "A CNN-LSTM model for intrusion detection system from high dimensional data." J. Inf. Comput. Sci 10 (2020): 1362-1370.
[12]Hindy, Hanan, David Brosset, Ethan Bayne, Amar Kumar Seeam, Christos Tachtatzis, Robert C. Atkinson and Xavier J. A. Bellekens. “A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.” ArXiv abs/1806.03517 (2018).
[13]Liu, Hongyu, and Bo Lang. "Machine learning and deep learning methods for intrusion detection systems: A survey." applied sciences 9, no. 20 (2019): 4396.
[14]Ferrag, Mohamed Amine, Leandros Maglaras, Helge Janicke, and Richard Smith. "Deep learning techniques for cyber security intrusion detection: A detailed analysis." 6th International Symposium for ICS & SCADA Cyber Security Research (2019), pp. 126-136.
[15]Hindy, Hanan, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, and Xavier Bellekens. "Utilising deep learning techniques for effective zero-day attack detection." Electronics 9, no. 10 (2020): 1684.
[16]Ieracitano, Cosimo, Ahsan Adeel, Francesco Carlo Morabito, and Amir Hussain. "A novel statistical analysis and autoencoder driven intelligent intrusion detection approach." Neurocomputing 387 (2020): 51-62.
[17]Kim, Jin-Young, Seok-Jun Bu, and Sung-Bae Cho. "Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders." Information Sciences 460 (2018): 83-102.
[18]Tavallaee, Mahbod, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani. "A detailed analysis of the KDD CUP 99 data set." IEEE symposium on computational intelligence for security and defense applications, pp. 1-6. IEEE, 2009.
[19]Sharafaldin, Iman, Arash Habibi Lashkari and Ali A. Ghorbani. “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.” International Conference on Information System Security and Privacy, ICISSP, (2018): 108-116.
[20]Kumar, Vikash, Ayan Kumar Das, and Ditipriya Sinha. “Statistical Analysis of the UNSW-NB15 Dataset for Intrusion Detection.” Advances in Intelligent Systems and Computing, (2019), 279–94.
[21]Kumar, Vikash, Ditipriya Sinha, Ayan Kumar Das, Subhash Chandra Pandey, and Radha Tamal Goswami. "An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset." Cluster Computing 23, no. 2 (2020): 1397-1418.