Evaluating Neural Networks using Bi-Directional LSTM for Network IDS (Intrusion Detection Systems) in Cyber Security

Abstract An Intrusion detection system is a fundamental layer incorporated in the network system. Due to enormous amount of traffic in the Network, the attacker waits for the chance to cause massive damage to the network and the network users. Even by using IDs the network admin face difficulties in identifying threats, attacks, and vulnerabilities in existing methods. This paper focuses on applying the deep learning method and an IDs model based on Bi-directional LSTM. KDDCUP-99 and UNSW-NB15 datasets are used in experiments to test the designed system. The model using Bi-directional LSTM gave outstanding results with 99% accuracy for both KDDCUP-99 and UNSW-NB15 datasets. The work was repeated by varying the activation functions used in the network. For both the datasets, softmax and relu gave impressive results with an average of 99.5% accuracy. The results were compared with the state-of-the-art methods. From the comparison we can conclude that Bi-directional LSTM performs better compared other related works in the literature.

[1]  A.H. Sung,et al.  Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..

[2]  Adnan Shahid Khan,et al.  Network intrusion detection system: A systematic study of machine learning and deep learning approaches , 2020, Trans. Emerg. Telecommun. Technol..

[3]  Salvatore J. Stolfo,et al.  Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.

[4]  Bernabé Dorronsoro,et al.  Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches , 2020, Applied Sciences.

[5]  Anand Nayyar,et al.  Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation , 2021, Computers, Materials & Continua.

[6]  Keping Yu,et al.  Robust Spammer Detection Using Collaborative Neural Network in Internet-of-Things Applications , 2021, IEEE Internet of Things Journal.

[7]  Charles Elkan,et al.  Results of the KDD'99 classifier learning , 2000, SKDD.

[8]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[9]  B. G. Premasudha,et al.  Electroencephalogram for epileptic seizure detection using stacked bidirectional LSTM_GAP neural network , 2020, Evolutionary Intelligence.

[10]  Kiran,et al.  Analysis and Computation of Encryption Technique to Enhance Security of Medical Images , 2020, IOP Conference Series: Materials Science and Engineering.

[11]  Akbar Siami Namin,et al.  The Performance of LSTM and BiLSTM in Forecasting Time Series , 2019, 2019 IEEE International Conference on Big Data (Big Data).

[12]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[13]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[15]  K. A. Taher,et al.  Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).

[16]  Dinh-Thuan Do,et al.  Enabling Multiple Power Beacons for Uplink of NOMA-Enabled Mobile Edge Computing in Wirelessly Powered IoT , 2020, IEEE Access.

[17]  Jin-Wook Chung,et al.  Network Intrusion Detection Through Genetic Feature Selection , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[18]  Ajith Abraham,et al.  Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..

[19]  Kwangjo Kim,et al.  Deep learning in intrusion detection perspective: Overview and further challenges , 2017, 2017 International Workshop on Big Data and Information Security (IWBIS).

[20]  John McHugh,et al.  Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.

[21]  Abdallah Shami,et al.  Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection , 2020, IEEE Transactions on Network and Service Management.

[22]  Paul J. Werbos,et al.  Backpropagation Through Time: What It Does and How to Do It , 1990, Proc. IEEE.

[23]  Tu N. Nguyen,et al.  On Virtual Id Assignment in Networks for High Resilience Routing: A Theoretical Framework , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.

[24]  Fan Xiong,et al.  Epileptic seizure detection and prediction using stacked bidirectional long short term memory , 2019, Pattern Recognit. Lett..

[25]  Giovanni Soda,et al.  Exploiting the past and the future in protein secondary structure prediction , 1999, Bioinform..

[26]  Yoshua Bengio,et al.  Quadratic Features and Deep Architectures for Chunking , 2009, NAACL.

[27]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[28]  Ramesh C. Agarwal,et al.  PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection) , 2001, SDM.

[29]  Yuan Yu,et al.  TensorFlow: A system for large-scale machine learning , 2016, OSDI.

[30]  Malcolm I. Heywood,et al.  Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.

[31]  Yuehui Chen,et al.  Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree , 2005, ISNN.

[32]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[33]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[34]  Andrzej Stateczny,et al.  Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible Light Communication Network , 2021, Electronics.

[35]  Prabaharan Poornachandran,et al.  Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[36]  Dinh-Thuan Do,et al.  WRSNs: Toward an Efficient Scheduling for Mobile Chargers , 2020, IEEE Sensors Journal.

[37]  Bernhard Pfahringer,et al.  Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.

[38]  Salvatore J. Stolfo,et al.  Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[39]  L. Girish,et al.  Anomaly detection in cloud environment using artificial intelligence techniques , 2021, Computing.

[40]  Heidar A. Malki,et al.  Network Intrusion Detection System Using Neural Networks , 2008, 2008 Fourth International Conference on Natural Computation.

[41]  Miheev Vladimir,et al.  The MP13 approach to the KDD'99 classifier learning contest , 2000 .

[42]  Peter Tino,et al.  IEEE Transactions on Neural Networks , 2009 .

[43]  Sara Matzner,et al.  An application of machine learning to network intrusion detection , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[44]  Miad Faezipour,et al.  Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.

[45]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[46]  Sugata Sanyal,et al.  Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[47]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .