Intrusion Detection System to Secure a Network using ACNN Model and Machine Learning

Main Article Content

Ruchika Dungarani
Dr. Satish Narayan Gujjar

Abstract

As cyber threats continue to evolve in sophistication and diversity, the need for robust Intrusion Detection Systems (IDS) becomes paramount to safeguarding network integrity. This research explores the application of an innovative approach by integrating an Attention-based Convolutional Neural Network (ACNN) model with machine learning techniques to enhance the accuracy and efficiency of intrusion detection. The proposed system leverages the ACNN's ability to capture contextual dependencies in network traffic data, enabling the extraction of intricate patterns indicative of potential intrusions. The ACNN's attention mechanism focuses on relevant features within the data, improving the model's discriminative power and adaptability to dynamic cyber threats. To achieve optimal performance, the ACNN is complemented with a machine learning framework that includes feature engineering, dimensionality reduction, and classification algorithms. This integrated approach allows the system to adapt and learn from evolving attack vectors, providing a proactive defense mechanism against both known and unknown threats. The research evaluates the proposed ACNN-based IDS using benchmark datasets and real-world network traffic scenarios. Comparative analysis against traditional IDS models showcases the superiority of the ACNN in terms of detection accuracy, false positive rates, and computational efficiency. Furthermore, the system's adaptability to emerging threats is demonstrated through continuous learning and retraining mechanisms. Results indicate that the ACNN-based IDS not only exhibits superior performance but also demonstrates resilience against evasion techniques employed by malicious actors. The research findings contribute to the advancement of network security by presenting a cutting-edge solution that combines deep learning and machine learning for effective and adaptive intrusion detection.

Downloads

Download data is not yet available.

Article Details

How to Cite
Intrusion Detection System to Secure a Network using ACNN Model and Machine Learning. (2024). International Journal of Innovative Science and Modern Engineering (IJISME), 12(6), 1-5. https://doi.org/10.35940/ijisme.G1319.12060624
Section
Articles

How to Cite

Intrusion Detection System to Secure a Network using ACNN Model and Machine Learning. (2024). International Journal of Innovative Science and Modern Engineering (IJISME), 12(6), 1-5. https://doi.org/10.35940/ijisme.G1319.12060624

References

L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, “A Novel Network Intrusion Detection System Based on CNN,” 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), pp. 243–247, Dec. 2020, doi:. https://doi.org/10.1109/CBD51900.2020.00051

R. Vinayakumar, K. P. Soman, and P. Poornachandrany, “Applying convolutional neural network for network intrusion detection,” 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), vol. 2017-January, pp. 1222–1228, Nov. 2017, doi: 10.1109/ICACCI.2017.8126009. https://doi.org/10.1109/ICACCI.2017.8126009

Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017, September). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222-1228). IEEE. https://doi.org/10.1109/ICACCI.2017.8126009

Liang, J., Jing, T., Niu, H., & Wang, J. (2020). Two-terminal fault location method of distribution network based on adaptive convolution neural network. IEEE Access, 8, 54035-54043. https://doi.org/10.1109/ACCESS.2020.2980573

J. Liang, T. Jing, H. Niu, and J. Wang, “Two-Terminal Fault Location Method of Distribution Network Based on Adaptive Convolution Neural Network,” IEEE Access, vol. 8, pp. 54035–54043, 2020, doi: https://doi.org/10.1109/ACCESS.2020.2980573

L. Ashiku and C. Dagli, “Network Intrusion Detection System using Deep Learning,” Procedia Comput Sci, vol. 185, pp. 239–247, Jan. 2021, doi: 10.1016/J.PROCS.2021.05.025. https://doi.org/10.1016/j.procs.2021.05.025

J. Kim, Y. Shin, and E. Choi, “An Intrusion Detection Model based on a Convolutional Neural Network,” J. Multim. Inf. Syst., vol. 6, no. 4, pp. 165–172, Dec. 2019, doi: https://doi.org/10.33851/JMIS.2019.6.4.165

S. Mahadik, P. M. Pawar, and R. Muthalagu, “Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT),” Journal of Network and Systems Management, vol. 31, no. 1, pp. 1–27, Mar. 2023, doi:https://doi.org/10.1007/s10922-022-09697-x

L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, “A Survey of CNN-Based Network Intrusion Detection,” Applied Sciences (Switzerland), vol. 12, no. 16, Aug. 2022, doi: https://doi.org/10.3390/app12168162

Mohammadpour, L., Ling, T. C., Liew, C. S., &Aryanfar, A. (2022). A Survey of CNN-Based Network Intrusion Detection. Applied Sciences, 12(16), 8162. https://doi.org/10.3390/app12168162

Vigneswaran, R. K., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, July). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication, and networking technologies (ICCCNT) (pp. 1-6). IEEE. https://doi.org/10.1109/ICCCNT.2018.8494096

L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, “A Novel Network Intrusion Detection System Based on CNN,” 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), pp. 243–247, Dec. 2020, doi: https://doi.org/10.1109/CBD51900.2020.00051

R. Vinayakumar, K. P. Soman, and P. Poornachandrany, “Applying convolutional neural network for network intrusion detection,” 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), vol. 2017-January, pp. 1222–1228, Nov. 2017, doi: 10.1109/ICACCI.2017.8126009. https://doi.org/10.1109/ICACCI.2017.8126009

Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017, September). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222-1228). IEEE. https://doi.org/10.1109/ICACCI.2017.8126009

Liang, J., Jing, T., Niu, H., & Wang, J. (2020). Two-terminal fault location method of distribution network based on adaptive convolution neural network. IEEE Access, 8, 54035-54043. https://doi.org/10.1109/ACCESS.2020.2980573

J. Liang, T. Jing, H. Niu, and J. Wang, “Two-Terminal Fault Location Method of Distribution Network Based on Adaptive Convolution Neural Network,” IEEE Access, vol. 8, pp. 54035–54043, 2020, doi: 10.1109/ACCESS.2020.2980573. https://doi.org/10.1109/ACCESS.2020.2980573

L. Ashiku and C. Dagli, “Network Intrusion Detection System using Deep Learning,” Procedia Comput Sci, vol. 185, pp. 239–247, Jan. 2021, doi: https://doi.org/10.1016/j.procs.2021.05.025

J. Kim, Y. Shin, and E. Choi, “An Intrusion Detection Model based on a Convolutional Neural Network,” J. Multim. Inf. Syst., vol. 6, no. 4, pp. 165–172, Dec. 2019, doi: 10.33851/JMIS.2019.6.4.165. https://doi.org/10.33851/JMIS.2019.6.4.165

S. Mahadik, P. M. Pawar, and R. Muthalagu, “Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT),” Journal of Network and Systems Management, vol. 31, no. 1, pp. 1–27, Mar. 2023, doi: 10.1007/S10922-022-09697-X/TABLES/14. https://doi.org/10.1007/s10922-022-09697-x

L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, “A Survey of CNN-Based Network Intrusion Detection,” Applied Sciences (Switzerland), vol. 12, no. 16, Aug. 2022, doi: 10.3390/APP12168162. https://doi.org/10.3390/app12168162

Reddy, M. V. K., & Pradeep, Dr. S. (2021). Envision Foundational of Convolution Neural Network. In International Journal of Innovative Technology and Exploring Engineering (Vol. 10, Issue 6, pp. 54–60). https://doi.org/10.35940/ijitee.f8804.0410621

Kumar, P., & Rawat, S. (2019). Implementing Convolutional Neural Networks for Simple Image Classification. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 3616–3619). https://doi.org/10.35940/ijeat.b3279.129219

Mandhare, V. V., Pede, D. R., & Vikhe, P. S. (2020). Network Intrusion Detection using a Deep Learning Approach. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 9, Issue 3, pp. 59–64). https://doi.org/10.35940/ijrte.b4086.099320

Dubey, S. K., Sinha, Dr. S., & Jain, Dr. A. (2023). Heart Disease Prediction Classification using Machine Learning. In International Journal of Inventive Engineering and Sciences (Vol. 10, Issue 11, pp. 1–6). https://doi.org/10.35940/ijies.b4321.11101123

Mukherjee*, P., Palan, P., & Bonde, M. V. (2021). Using Machine Learning and Artificial Intelligence Principles to Implement a Wealth Management System. In International Journal of Soft Computing and Engineering (Vol. 10, Issue 5, pp. 26–31). https://doi.org/10.35940/ijsce.f3500.0510521

Most read articles by the same author(s)

1 2 > >>