Mitigating Generic Attacks for Intrusion Detetction System Based on CGAN and FIPSO Using UNSW-NB 15 Dataset

Authors

  • Vineeta Srivastava, Anoop Kumar Caturvedi

Keywords:

Distributed system, Deep Learning, Supervised learning, Network monitors traffic patterns, Intrusion detection system

Abstract

: In recent times, there has been a notable surge in cyberattacks due to the Internet of Things' exponential growth. Because of this, maintaining corporate borders today requires cybersecurity. Intrusion detection systems, or IDSs, are used to notify users of noteworthy events when maintaining a network. The first is the identification of malicious traffic, for which zero-day attack detection research is essential. This research provides an improved intrusion detection model that leverages FIPSO for feature extraction, conditional Generative Adversarial Networks (cGAN) to handle data imbalance, and machine learning techniques for classification tasks. We evaluated the model for binary and multi-classification, focusing on the UNSW-NB15 dataset in particular. The proposed methodology is noteworthy because it employs Random Forest (RF) classification along with FIPSO to enhance feature selection and cGAN to directly address the issue of data imbalance. This hybrid technique yields better results, with 83% accuracy in multi-class classification and 96% accuracy in binary classification.

Downloads

Download data is not yet available.

References

Akter, M., Dip, G. Das, Mira, M. S., Abdul Hamid, M., & Mridha, M. F. (2020). Construing Attacks of Internet of Things (IoT) and A Prehensile Intrusion Detection System for Anomaly Detection Using Deep Learning Approach. In A. Khanna, D. Gupta, S. Bhattacharyya, V. Snasel, J. Platos, & A. E. Hassanien (Eds.), International Conference on Innovative Computing and Communications (pp. 427–438). Springer Singapore.

Al-Emadi, S., Al-Mohannadi, A., & Al-Senaid, F. (2020). Using Deep Learning Techniques for Network Intrusion Detection. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 171–176. https://doi.org/10.1109/ICIoT48696.2020.9089524

Aljamal, I., Tekeoğlu, A., Bekiroglu, K., & Sengupta, S. (2019). Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments. 2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA), 84–89. https://doi.org/10.1109/SERA.2019.8886794

Alsoufi, M. A., Razak, S., Siraj, M. M., Ali, A., Nasser, M., & Abdo, S. (2021). Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: A Survey. In F. Saeed, F. Mohammed, & A. Al-Nahari (Eds.), Innovative Systems for Intelligent Health Informatics (pp. 659–675). Springer International Publishing.

Balakrishnan, N., Rajendran, A., Pelusi, D., & Ponnusamy, V. (2021). Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things. Internet of Things, 14, 100112. https://doi.org/https://doi.org/10.1016/j.iot.2019.100112

Bharati, M. P., & Tamane, S. (2020). NIDS-Network Intrusion Detection System Based on Deep and Machine Learning Frameworks with CICIDS2018 using Cloud Computing. 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC), 27–30. https://doi.org/10.1109/ICSIDEMPC49020.2020.9299584

Dong, R., Li, X., Qiu-yu, Z., & Yuan, H. (2020). A Network Intrusion Detection Model Based on Multivariate Correlation Analysis - Long Short Time Memory Network. IET Information Security, 14. https://doi.org/10.1049/iet-ifs.2019.0294

Engelmann, J., & Lessmann, S. (2021). Conditional Wasserstein GAN-based oversampling of tabular data for imbalanced learning. Expert Systems with Applications, 174(Ml). https://doi.org/10.1016/j.eswa.2021.114582

Eunice, A. D., Gao, Q., Zhu, M.-Y., Chen, Z., & LV, N. (2021). Network Anomaly Detection Technology Based on Deep Learning. 2021 IEEE 3rd International Conference on Frontiers Technology of Information and Computer (ICFTIC), 6–9. https://doi.org/10.1109/ICFTIC54370.2021.9647222

Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419. https://doi.org/https://doi.org/10.1016/j.jisa.2019.102419

Gamage, S., & Samarabandu, J. (2020). Deep learning methods in network intrusion detection: A survey and an objective comparison. Journal of Network and Computer Applications, 169, 102767. https://doi.org/https://doi.org/10.1016/j.jnca.2020.102767

Gao, J., Gan, L., Buschendorf, F., Zhang, L., Liu, H., Li, P., Dong, X., & Lu, T. (2021). Omni SCADA Intrusion Detection Using Deep Learning Algorithms. IEEE Internet of Things Journal, 8(2), 951–961. https://doi.org/10.1109/JIOT.2020.3009180

Gulghane, S., Shingate, V., Bondgulwar, S., Awari, G., & Sagar, P. (2020). A Survey on Intrusion Detection System Using Machine Learning Algorithms. In J. S. Raj, A. Bashar, & S. R. J. Ramson (Eds.), Innovative Data Communication Technologies and Application (pp. 670–675). Springer International Publishing.

KASIM, Ö. (2020). An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks. Computer Networks, 180, 107390. https://doi.org/https://doi.org/10.1016/j.comnet.2020.107390

Kasongo, S. M. (2023). A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework. Computer Communications, 199, 113–125. https://doi.org/https://doi.org/10.1016/j.comcom.2022.12.010

Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752. https://doi.org/https://doi.org/10.1016/j.cose.2020.101752

Kim, A., Park, M., & Lee, D. H. (2020). AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection. IEEE Access, 8, 70245–70261. https://doi.org/10.1109/ACCESS.2020.2986882

Kumar, N. M., & Mallick, P. K. (2018). Blockchain technology for security issues and challenges in IoT. Procedia Computer Science, 132, 1815–1823. https://doi.org/https://doi.org/10.1016/j.procs.2018.05.140

Lee, T.-H., Chang, L.-H., & Syu, C.-W. (2020). Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks. 2020 IEEE International Conference on Communications Workshops (ICC Workshops), 1–6. https://doi.org/10.1109/ICCWorkshops49005.2020.9145085

Li, B., Wu, Y., Song, J., Lu, R., Li, T., & Zhao, L. (2021). DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems. IEEE Transactions on Industrial Informatics, 17(8), 5615–5624. https://doi.org/10.1109/TII.2020.3023430

Louati, F., & Ktata, F. B. (2020). A deep learning-based multi-agent system for intrusion detection. SN Applied Sciences, 2(4), 675. https://doi.org/10.1007/s42452-020-2414-z

Majeed, A., & Hwang, S. O. (2023). CTGAN-MOS: Conditional Generative Adversarial Network Based Minority-Class-Augmented Oversampling Scheme for Imbalanced Problems. IEEE Access, 11(June), 85878–85899. https://doi.org/10.1109/ACCESS.2023.3303509

Manhas, J., & Kotwal, S. (2021). Implementation of Intrusion Detection System for Internet of Things Using Machine Learning Techniques. In K. J. Giri, S. A. Parah, R. Bashir, & K. Muhammad (Eds.), Multimedia Security: Algorithm Development, Analysis and Applications (pp. 217–237). Springer Singapore. https://doi.org/10.1007/978-981-15-8711-5_11

Mosaiyebzadeh, F., Araujo Rodriguez, L. G., Macêdo Batista, D., & Hirata, R. (2021). A Network Intrusion Detection System using Deep Learning against MQTT Attacks in IoT. 2021 IEEE Latin-American Conference on Communications (LATINCOM), 1–6. https://doi.org/10.1109/LATINCOM53176.2021.9647850

Musa, U. S., Chakraborty, S., Abdullahi, M. M., & Maini, T. (2021). A Review on Intrusion Detection System using Machine Learning Techniques. 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 541–549. https://doi.org/10.1109/ICCCIS51004.2021.9397121

Musa, U. S., Chhabra, M., Ali, A., & Kaur, M. (2020). Intrusion Detection System using Machine Learning Techniques: A Review. 2020 International Conference on Smart Electronics and Communication (ICOSEC), 149–155. https://doi.org/10.1109/ICOSEC49089.2020.9215333

Rafi, H., Ahmad, F., Anis, J., Khan, R., Rafiq, H., & Farhan, M. (2020). Comparative effectiveness of agmatine and choline treatment in rats with cognitive impairment induced by AlCl3 and forced swim stress. Current Clinical Pharmacology, 15(3), 251-264.

Rahman, M. A., Asyhari, T., Leong, L. S., Satrya, G., Tao, M., & Zolkipli, M. (2020). Scalable Machine Learning-Based Intrusion Detection System for IoT-Enabled Smart Cities. Sustainable Cities and Society, 61, 102324. https://doi.org/10.1016/j.scs.2020.102324

Rai, A. (2020). Optimizing a New Intrusion Detection System Using Ensemble Methods and Deep Neural Network. 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 527–532. https://doi.org/10.1109/ICOEI48184.2020.9143028

Rani, D., & Kaushal, N. C. (2020). Supervised Machine Learning Based Network Intrusion Detection System for Internet of Things. 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 1–7. https://doi.org/10.1109/ICCCNT49239.2020.9225340

Rincy N, T., & Gupta, R. (2021). Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques. Wireless Communications and Mobile Computing, 2021, 9974270. https://doi.org/10.1155/2021/9974270

Sallam, Y. F., El-Nabi, S. A., El-Shafai, W., Ahmed, H. E. H., Saleeb, A., El-Bahnasawy, N. A., & El-Samie, F. E. A. (2023). Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset. Security and Privacy, 6(5), e300. https://doi.org/10.1002/SPY2.300

Sallam, Y. F., El-Nabi, S. A., El-Shafai, W., Ahmed, H. E. H., Saleeb, A., El-Bahnasawy, N. A., & El-Samie, F. E. A. (2023). Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset. Security and Privacy, 6(5), e300. https://doi.org/10.1002/SPY2.300

Sampath, V., Maurtua, I., Aguilar Martín, J. J., & Gutierrez, A. (2021). A survey on generative adversarial networks for imbalance problems in computer vision tasks. In Journal of Big Data (Vol. 8, Issue 1). Springer International Publishing. https://doi.org/10.1186/s40537-021-00414-0

Shu, J., Zhou, L., Zhang, W., Du, X., & Guizani, M. (2021). Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4519–4530. https://doi.org/10.1109/TITS.2020.3027390

Yu, Y., Li, Y., Tian, J., & Liu, J. (2018). Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. IEEE Wireless Communications, 25(6), 12–18. https://doi.org/10.1109/MWC.2017.1800116

Zhong, W., Yu, N., & Ai, C. (2020). Applying big data based deep learning system to intrusion detection. Big Data Mining and Analytics, 3(3), 181–195. https://doi.org/10.26599/BDMA.2020.9020003

Downloads

Published

26.03.2024

How to Cite

Vineeta Srivastava,. (2024). Mitigating Generic Attacks for Intrusion Detetction System Based on CGAN and FIPSO Using UNSW-NB 15 Dataset. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1917–1928. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/5761

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.