Intrusion Detection System to Secure a Network using ACNN Model and Machine Learning
Main Article Content
Abstract
As cyber threats continue to evolve in sophistication and diversity, the need for robust Intrusion Detection Systems (IDS) becomes paramount to safeguarding network integrity. This research explores the application of an innovative approach by integrating an Attention-based Convolutional Neural Network (ACNN) model with machine learning techniques to enhance the accuracy and efficiency of intrusion detection. The proposed system leverages the ACNN's ability to capture contextual dependencies in network traffic data, enabling the extraction of intricate patterns indicative of potential intrusions. The ACNN's attention mechanism focuses on relevant features within the data, improving the model's discriminative power and adaptability to dynamic cyber threats. To achieve optimal performance, the ACNN is complemented with a machine learning framework that includes feature engineering, dimensionality reduction, and classification algorithms. This integrated approach allows the system to adapt and learn from evolving attack vectors, providing a proactive defense mechanism against both known and unknown threats. The research evaluates the proposed ACNN-based IDS using benchmark datasets and real-world network traffic scenarios. Comparative analysis against traditional IDS models showcases the superiority of the ACNN in terms of detection accuracy, false positive rates, and computational efficiency. Furthermore, the system's adaptability to emerging threats is demonstrated through continuous learning and retraining mechanisms. Results indicate that the ACNN-based IDS not only exhibits superior performance but also demonstrates resilience against evasion techniques employed by malicious actors. The research findings contribute to the advancement of network security by presenting a cutting-edge solution that combines deep learning and machine learning for effective and adaptive intrusion detection.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, “A Novel Network Intrusion Detection System Based on CNN,” 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), pp. 243–247, Dec. 2020, doi:. https://doi.org/10.1109/CBD51900.2020.00051
R. Vinayakumar, K. P. Soman, and P. Poornachandrany, “Applying convolutional neural network for network intrusion detection,” 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), vol. 2017-January, pp. 1222–1228, Nov. 2017, doi: 10.1109/ICACCI.2017.8126009. https://doi.org/10.1109/ICACCI.2017.8126009
Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017, September). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222-1228). IEEE. https://doi.org/10.1109/ICACCI.2017.8126009
Liang, J., Jing, T., Niu, H., & Wang, J. (2020). Two-terminal fault location method of distribution network based on adaptive convolution neural network. IEEE Access, 8, 54035-54043. https://doi.org/10.1109/ACCESS.2020.2980573
J. Liang, T. Jing, H. Niu, and J. Wang, “Two-Terminal Fault Location Method of Distribution Network Based on Adaptive Convolution Neural Network,” IEEE Access, vol. 8, pp. 54035–54043, 2020, doi: https://doi.org/10.1109/ACCESS.2020.2980573
L. Ashiku and C. Dagli, “Network Intrusion Detection System using Deep Learning,” Procedia Comput Sci, vol. 185, pp. 239–247, Jan. 2021, doi: 10.1016/J.PROCS.2021.05.025. https://doi.org/10.1016/j.procs.2021.05.025
J. Kim, Y. Shin, and E. Choi, “An Intrusion Detection Model based on a Convolutional Neural Network,” J. Multim. Inf. Syst., vol. 6, no. 4, pp. 165–172, Dec. 2019, doi: https://doi.org/10.33851/JMIS.2019.6.4.165
S. Mahadik, P. M. Pawar, and R. Muthalagu, “Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT),” Journal of Network and Systems Management, vol. 31, no. 1, pp. 1–27, Mar. 2023, doi:https://doi.org/10.1007/s10922-022-09697-x
L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, “A Survey of CNN-Based Network Intrusion Detection,” Applied Sciences (Switzerland), vol. 12, no. 16, Aug. 2022, doi: https://doi.org/10.3390/app12168162
Mohammadpour, L., Ling, T. C., Liew, C. S., &Aryanfar, A. (2022). A Survey of CNN-Based Network Intrusion Detection. Applied Sciences, 12(16), 8162. https://doi.org/10.3390/app12168162
Vigneswaran, R. K., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, July). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication, and networking technologies (ICCCNT) (pp. 1-6). IEEE. https://doi.org/10.1109/ICCCNT.2018.8494096
L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, “A Novel Network Intrusion Detection System Based on CNN,” 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), pp. 243–247, Dec. 2020, doi: https://doi.org/10.1109/CBD51900.2020.00051
R. Vinayakumar, K. P. Soman, and P. Poornachandrany, “Applying convolutional neural network for network intrusion detection,” 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), vol. 2017-January, pp. 1222–1228, Nov. 2017, doi: 10.1109/ICACCI.2017.8126009. https://doi.org/10.1109/ICACCI.2017.8126009
Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017, September). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222-1228). IEEE. https://doi.org/10.1109/ICACCI.2017.8126009
Liang, J., Jing, T., Niu, H., & Wang, J. (2020). Two-terminal fault location method of distribution network based on adaptive convolution neural network. IEEE Access, 8, 54035-54043. https://doi.org/10.1109/ACCESS.2020.2980573
J. Liang, T. Jing, H. Niu, and J. Wang, “Two-Terminal Fault Location Method of Distribution Network Based on Adaptive Convolution Neural Network,” IEEE Access, vol. 8, pp. 54035–54043, 2020, doi: 10.1109/ACCESS.2020.2980573. https://doi.org/10.1109/ACCESS.2020.2980573
L. Ashiku and C. Dagli, “Network Intrusion Detection System using Deep Learning,” Procedia Comput Sci, vol. 185, pp. 239–247, Jan. 2021, doi: https://doi.org/10.1016/j.procs.2021.05.025
J. Kim, Y. Shin, and E. Choi, “An Intrusion Detection Model based on a Convolutional Neural Network,” J. Multim. Inf. Syst., vol. 6, no. 4, pp. 165–172, Dec. 2019, doi: 10.33851/JMIS.2019.6.4.165. https://doi.org/10.33851/JMIS.2019.6.4.165
S. Mahadik, P. M. Pawar, and R. Muthalagu, “Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT),” Journal of Network and Systems Management, vol. 31, no. 1, pp. 1–27, Mar. 2023, doi: 10.1007/S10922-022-09697-X/TABLES/14. https://doi.org/10.1007/s10922-022-09697-x
L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, “A Survey of CNN-Based Network Intrusion Detection,” Applied Sciences (Switzerland), vol. 12, no. 16, Aug. 2022, doi: 10.3390/APP12168162. https://doi.org/10.3390/app12168162
Reddy, M. V. K., & Pradeep, Dr. S. (2021). Envision Foundational of Convolution Neural Network. In International Journal of Innovative Technology and Exploring Engineering (Vol. 10, Issue 6, pp. 54–60). https://doi.org/10.35940/ijitee.f8804.0410621
Kumar, P., & Rawat, S. (2019). Implementing Convolutional Neural Networks for Simple Image Classification. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 3616–3619). https://doi.org/10.35940/ijeat.b3279.129219
Mandhare, V. V., Pede, D. R., & Vikhe, P. S. (2020). Network Intrusion Detection using a Deep Learning Approach. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 9, Issue 3, pp. 59–64). https://doi.org/10.35940/ijrte.b4086.099320
Dubey, S. K., Sinha, Dr. S., & Jain, Dr. A. (2023). Heart Disease Prediction Classification using Machine Learning. In International Journal of Inventive Engineering and Sciences (Vol. 10, Issue 11, pp. 1–6). https://doi.org/10.35940/ijies.b4321.11101123
Mukherjee*, P., Palan, P., & Bonde, M. V. (2021). Using Machine Learning and Artificial Intelligence Principles to Implement a Wealth Management System. In International Journal of Soft Computing and Engineering (Vol. 10, Issue 5, pp. 26–31). https://doi.org/10.35940/ijsce.f3500.0510521