Optimization of Intrusion Detection Using Likely Point PSO and Enhanced LSTM-RNN Hybrid Technique in Communication Networks

The intrusion detection system (IDS) is considered an essential sector in maintaining communication network security and has been desirably adopted by all network administrators. Several existing methods have been proposed for early intrusion detection systems. However, they experience drawbacks that make them subsequently inefficient against new/distinct attacks. To overcome these drawbacks, this paper proposes the enhanced long-short term memory (ELSTM) technique with recurrent neural network (RNN) (ELSTM-RNN) to enhance security in IDS. Intrusion detection technology has been associated with various problems, such as gradient vanishing, generalization, and overfitting issues. The proposed system solves the gradient-clipping issue using the likely point particle swarm optimization (LPPSO) and enhanced LSTM classification. The proposed method was evaluated using the NSL-KDD dataset (KDD TEST PLUS and KDD TEST21) for validation and testing. Many efficient features were selected using an enhanced technique, namely, the particle swarm optimization. The selected features serve for effective classification using an enhanced LSTM framework, where it is used to efficiently classify and detect the attack data from the normal data. The proposed system has been applied to the UNSW-NB15, CICIDS2017, CSE-CIC-IDS2018, and BOT _DATASET datasets for further verification. Results show that the training time of the proposed system is much less than that of other methods for different classes. Finally, the performance of the proposed ELSTM-RNN framework is analyzed using various metrics, such as accuracy, precision, recall, and error rate. Our proposed method outperformed LPBoost and DNNs methods.

[1]  S. Bali,et al.  Optimization of Intrusion Detection Systems Determined by Ameliorated HNADAM-SGD Algorithm , 2021, Electronics.

[2]  Giuseppe Aceto,et al.  XAI Meets Mobile Traffic Classification: Understanding and Improving Multimodal Deep Learning Architectures , 2021, IEEE Transactions on Network and Service Management.

[3]  Ammar Alazab,et al.  A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges , 2021, Cybersecurity.

[4]  A. Pescapé,et al.  A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.

[5]  Kumar Abhishek,et al.  An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network , 2020, Trans. Emerg. Telecommun. Technol..

[6]  Giancarlo Fortino,et al.  A hybrid deep learning model for efficient intrusion detection in big data environment , 2020, Inf. Sci..

[7]  Akhan Akbulut,et al.  Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic , 2020, Comput. Networks.

[8]  Mohamed Amine Ferrag,et al.  Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..

[9]  Intrusion Detection using Machine Learning and Deep Learning , 2019, International Journal of Recent Technology and Engineering.

[10]  Marwan Ali Albahar,et al.  Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments , 2019, Secur. Commun. Networks.

[11]  Mounir Ghogho,et al.  Intrusion Detection in SDN-Based Networks: Deep Recurrent Neural Network Approach , 2019, Deep Learning Applications for Cyber Security.

[12]  Iqbal Gondal,et al.  Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.

[13]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[14]  Nima Jafari Navimipour,et al.  Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm , 2019, ICT Express.

[15]  Georgios Kambourakis,et al.  Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems , 2019, IEEE Access.

[16]  I. Sumaiya Thaseen,et al.  Intrusion detection model using feature extraction and LPBoost technique , 2018 .

[17]  Amina Adadi,et al.  Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI) , 2018, IEEE Access.

[18]  Paul Jacob,et al.  Host Based Intrusion Detection System with Combined CNN/RNN Model , 2018, Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML.

[19]  Songge Xiao,et al.  Constructing an Intrusion Detection Model based on Long Short-term Neural Networks , 2018, 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS).

[20]  Jim A. Simpson,et al.  Network Traffic Anomaly Detection Using Recurrent Neural Networks , 2018, ArXiv.

[21]  Cherukuri Aswani Kumar,et al.  Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..

[22]  Jés de Jesus Fiais Cerqueira,et al.  Using artificial neural network in intrusion detection systems to computer networks , 2017, 2017 9th Computer Science and Electronic Engineering (CEEC).

[23]  Howon Kim,et al.  An Effective Intrusion Detection Classifier Using Long Short-Term Memory with Gradient Descent Optimization , 2017, 2017 International Conference on Platform Technology and Service (PlatCon).

[24]  P. Venkata Krishna,et al.  A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection , 2017, ICMC.

[25]  Ralf C. Staudemeyer,et al.  Applying long short-term memory recurrent neural networks to intrusion detection , 2015 .

[26]  Anamika Yadav,et al.  Performance analysis of NSL-KDD dataset using ANN , 2015, 2015 International Conference on Signal Processing and Communication Engineering Systems.

[27]  Yoshua Bengio,et al.  Gated Feedback Recurrent Neural Networks , 2015, ICML.

[28]  Yue Wu,et al.  A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..

[29]  Andrew W. Senior,et al.  Long Short-Term Memory Based Recurrent Neural Network Architectures for Large Vocabulary Speech Recognition , 2014, ArXiv.

[30]  David M. W. Powers,et al.  Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation , 2011, ArXiv.

[31]  Bo Hong,et al.  A network intrusion detection system based on convolutional neural network , 2020, J. Intell. Fuzzy Syst..

[32]  Huyin Zhang,et al.  Network Intrusion Detection Based on PSO-Xgboost Model , 2020, IEEE Access.

[33]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[34]  Hongyu Yang,et al.  Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network , 2019, IEEE Access.

[35]  Norbert Ádám,et al.  Artificial neural network based IDS , 2017, 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI).

[36]  M. A. Jabbar,et al.  Random Forest Modeling for Network Intrusion Detection System , 2016 .

[37]  D. Powers Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation , 2008 .