Developing an Intrusion Detection System (IDS) For Network Security Using Machine Learning

Authors

  • Ghousun Ayed Alsharari, Ayman Mohamed Mostafa

Keywords:

Internet of Things (IoT); Intrusion Detection System (IDS); Machine Learning (ML); Deep Learning (DL); and Minimum Redundancy Maximum Relevance (mRMR).

Abstract

The Internet of Things (IoT) technologies have become so widespread that they are now the main cause of network security management problems. With the ever-growing integration of IoT into both consumer and industrial applications, security plays a very important role. The research in this paper is about the creation of a modern Intrusion Detection System (IDS) that can be applied to IoT network security using Machine Learning (ML) and Deep Learning (DL). The very heart of this system is the use of ML to discover and deal with possible threats in a quick and efficient way, though the focus here is on feature engineering that enhances detection accuracy. Through the use of mRMR for feature selection and PCA for feature reduction, our system is able to optimize the processing and analysis of network behaviors so that it can differentiate between normal operations and different types of attacks efficiently. This paper is about the comparison of effectiveness between ML and DL models in detecting threats inside IoT environments, which are tested on the ToN-IOT dataset. The findings show that our ML and DL-driven IDS not only have a high level of accuracy in threat detection but also significantly reduces the computational demands, therefore enabling more efficient real-time applications in IoT security.

Downloads

Download data is not yet available.

References

Alotaibi, B. (2023). A survey on Industrial Internet of Things security: Requirements, attacks, AI based solutions, and edge computing opportunities. Sensors, 23(17), 7470. https://doi.org/10.3390/s23177470

Mirani, A. A., Velasco-Hernandez, G., Awasthi, A., & Walsh, J. (2022). Key challenges and emerging technologies in Industrial IoT architectures: A review. Sensors, 22(15), 5836. https://doi.org/10.3390/s22041586

X. Gming, S. Xiaorui, Z. Zhihua, and X. Bertino, “Advances in Artificial Intelligence and Security,” in Proceedings of the 27th International Conference, ICAIS 2021, Dublin, Ireland, July 2021.

Suzen, “Developing a multi-level intrusion detection system using hybrid-DBN,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 2, pp. 1913–1923, 2021.

Ayodeji, Y.-k. Liu, N. Chao, and L. Q. Yang, “A new perspective towards the development of robust data-driven intrusion detection for industrial control systems,” Nuclear Engineering and Technology, vol. 52, no. 12, pp. 2687–2698, 2020.

Eid, A., Nassif, A., Soudan, B., & Injadat, M. (2023). IIoT Network Intrusion Detection Using Machine Learning. 2023 6th International Conference on Intelligent Robotics and Control Engineering (IRCE), 196-201. https://doi.org/10.1109/IRCE59430.2023.10255088.

S.M. Bridges and R.B. Vaughn, Fuzzy data mining and genetic algorithms applied to intrusion detection, USA, in in Proceedings of 12th Annual Canadian Information Technology Security Symposium, 2000. https://www.csee.umbc.edu/csee/research/cadip/readings/DMID/005slide.pdf

Raghav, S. Chhikara, and N. Hasteer, Intrusion detection and prevention in cloud environment: a systematic review, Int. J. Comput. Appl., Vol. 68, 2013, pp. 7-11.

R. Singh, H. Kumar, and R.K. Singla, An intrusion detection system using network traffic profiling and online sequential extreme learning machine, Expert Syst. Appl., Vol. 42, 2015, pp. 8609-8624.

K. Peng, V.C.M. Leung, L. Zheng, S. Wang, C. Huang, and T. Lin, Intrusion detection system based on decision tree over big data in fog environment, Wireless Commun. Mob. Comput., Vol. 2018, 2018, pp. 1-10.

V. Chandola, A. Banerjee, V. Kumar, Anomaly detection, ACM Comput. Surv. 41 (2009), 1–58.

Y. Xue, W. Jia, X. Zhao, W. Pang, ”An evolutionary computation based feature selection method for intrusion detection,” Security and Communication Networks, 2018, (2018).

Akashdeep, I. Manzoor, N. Kumar, A feature reduced intrusion detection system using ANN classifier, Expert Syst. Appl. 88 (2017), 249–257.

Simone .A. Ludwig, Applying a neural network ensemble to intrusion detection, J. Artif. Intell. Soft Comput. Res. 9 (2019), 177–188.

Chaopeng. Li, J. Wang, X. Ye, Using a recurrent neural network and restricted Boltzmann machines for malicious traffic detection, NeuroQuantology. 16 (2018), 823–831.

Chuanlong. Yin, Y. Zhu, J. Fei, X. He, A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access. 5 (2017), 21954–21961.

Yihan Xiao, C. Xing, T. Zhang, Z. Zhao, An intrusion detection model based on feature reduction and convolutional neural networks, IEEE Access, , 7 (2019), pp. 42210–42219.

Dimitrios. Papamartzivanos, F.G. Mármol, G. Kambourakis, Dendron: Genetic trees driven rule induction for network intrusion detection systems, Future Generation Computer Systems, 79 (2018),

pp. 558–574.

Kai. Peng, V.C.M. Leung, L. Zheng, S. Wang, C. Huang, T. Lin, Intrusion detection system based on decision tree over big data in fog environment, Wireless Commun. Mob. Comput. 2018 (2018),

–10.

G. Kim, S. Lee, S. Kim, A novel hybrid intrusion detection method integrating anomaly detection with misuse detection, Expert Syst. Appl. 41 (2014), 1690–1700.

H.I. Ahmed, N.A. Elfeshawy, S.F. Elzoghdy, H.S. El-Sayed, O.S. Faragallah, A neural network-based learning algorithm for intrusion detection systems, Wireless Personal Communications, 97 (2017), pp. 3097–3112.

W, Alhakami, A. ALharbi, S. Bourouis, R. Alroobaea, N. Bouguila, Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection, IEEE Access, 7 (2019), pp. 52181–52190.

R. Abdulhammed, H. Musafer, A. Alessa, M. Faezipour, A. Abuzneid, Features dimensionality reduction approaches for machine learning based network intrusion detection, Electronics.

(2019), 322.

L. Xiao, Y. Chen, C. K. Chang, Bayesian model averaging of Bayesian network classifiers for intrusion detection, in IEEE 38th International Computer Software and Applications Conference

Workshops, Vasteras, Sweden, 2014.

W. Feng, Q. Zhang, G. Hu, J.X. Huang, Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Gener. Comput. Syst. 37 (2014), 127–140.

E. Kabir, J. Hu, H. Wang, G. Zhuo, A novel statistical technique for intrusion detection systems, Future Gener. Comput. Syst. 79 (2018), 303–318.

R. Vijayanand, D. Devaraj, B. Kannapiran, Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection, Comput. Secur. 77 (2018), 304–314.

F. Kuang, S. Zhang, Z. Jin, W. Xu, A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection, Soft Comput. 19 (2015), 1187–1199.

S.M.H. Bamakan, H. Wang, T. Yingjie, Y. Shi, An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization, Neurocomputing. 199 (2016), 90–102.

Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A.N. TON-IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 2024, 1, 165130–165150.

Abiri, N., Linse, B., Edén, P., & Ohlsson, M. (2019). Establishing strong imputation performance of a denoising autoencoder in a wide range of missing data problems. ArXiv, abs/2004.02584. https://doi.org/10.1016/j.neucom.2019.07.065.

Lopez-Arevalo, I., Aldana-Bobadilla, E., Molina-Villegas, A., Galeana-Zapién, H., Muñiz-Sánchez, V., & Gausin-Valle, S. (2020). A Memory-Efficient Encoding Method for Processing Mixed-Type Data on Machine Learning. Entropy, 22. https://doi.org/10.3390/e22121391.

Abdulhammed, R., Faezipour, M., Musafer, H., & Abuzneid, A. (2019). Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features. 2019 International Symposium on Networks, Computers and Communications (ISNCC), 1-6. https://doi.org/10.1109/ISNCC.2019.8909140.

Wang, C., Ye, X., He, X., Tian, Y., & Gong, L. (2019). Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. https://doi.org/10.1007/978-3-030-21373-2_58.

Tsiapoki, S., Bahrami, O., Häckell, M., Lynch, J., & Rolfes, R. (2020). Combination of damage feature decisions with adaptive boosting for improving the detection performance of a structural health monitoring framework: Validation on an operating wind turbine. Structural Health Monitoring, 20, 637 - 660. https://doi.org/10.1177/1475921720909379.

Yu, H., Xu, C., Geng, G., & Jiang, Q. (2024). Multi-Time-Scale Shapelet-Based Feature Extraction for Non-Intrusive Load Monitoring. IEEE Transactions on Smart Grid, 15, 1116-1128. https://doi.org/10.1109/TSG.2023.3285117.

Chen, L., Dong, X., Wang, B., Shang, L., & Liu, C. (2024). An Edge Computing-Oriented Islanding Detection Using Differential Entropy and Multi-Support Vector Machines. IEEE Transactions on Smart Grid, 15, 191-202. https://doi.org/10.1109/TSG.2023.3288361.

Pujar, P., Kumar, A., & Kumar, V. (2024). Efficient plant leaf detection through machine learning approach based on corn leaf image classification. IAES International Journal of Artificial Intelligence (IJ-AI). https://doi.org/10.11591/ijai.v13.i1.pp1139-1148.

Wang, Y., Yan, Z., Sang, L., Hong, L., Hu, Q., Shahidehpour, M., & Xu, Q. (2024). Acceleration Framework and Solution Algorithm for Distribution System Restoration Based on End-to-End Optimization Strategy. IEEE Transactions on Power Systems, 39, 429-441. https://doi.org/10.1109/TPWRS.2023.3262189.

Nordin, S., Wah, Y., Haur, N., Hashim, A., Rambeli, N., & Jalil, N. (2024). Predicting automobile insurance fraud using classical and machine learning models. International Journal of Electrical and Computer Engineering (IJECE). https://doi.org/10.11591/ijece.v14i1.pp911-921.

Vaiyapuri, T., & Binbusayyis, A. (2024). Deep self-taught learning framework for intrusion detection in cloud computing environment. IAES International Journal of Artificial Intelligence (IJ-AI). https://doi.org/10.11591/ijai.v13.i1.pp747-755.

Alrahhal, M., & Supreethi K.P. (2020). Multimedia Image Retrieval System by Combining CNN With Handcraft Features in Three Different Similarity Measures. International Journal Of Computer Vision And Image Processing, 10(1), 1-23. DOI: 10.4018/ijcvip.2020010101.

Alrahhal, M., & K.P, S. (2021). Full Direction Local Neighbors Pattern (FDLNP). International Journal Of Advanced Computer Science And Applications, 12(1). DOI: 10.14569/ijacsa.2021.0120116.

Alrahhal, M., & K P, S. (2021). COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis. The Computer Journal. DOI: 10.1093/comjnl/bxab051.

Downloads

Published

23.07.2024

How to Cite

Ghousun Ayed Alsharari. (2024). Developing an Intrusion Detection System (IDS) For Network Security Using Machine Learning. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 2005–2026. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6519

Issue

Section

Research Article