Yıl: 2021 Cilt: 29 Sayı: 4 Sayfa Aralığı: 1929 - 1943 Metin Dili: İngilizce DOI: 10.3906/elk-2005-1 İndeks Tarihi: 23-06-2022

A novel approach for intrusion detection systems: V-IDS

Öz:
An intrusion detection system (IDS) is a security mechanism that detects abnormal activities in a network. An ideal IDS must detect intrusion attempts and maybe categorize them for further research and keep false-positive analysis at a very low level. IDSs are used in the analysis of network traffic data at all sizes. Studies on this subject focused on machine learning techniques. Even though the performance rates are high, it is seen that processes such as data understanding, preprocessing, and consistency tests are time-consuming and laborious. For this reason, the use of deep learning (DL) models that automatically perform the mentioned steps has become very popular. In this study, a high-performance approach that can be applied in real-time systems is proposed: visual IDS (V-IDS). NSLKDD dataset, one of the large-scale datasets, is used. Data visualization techniques were applied in order to determine geometric relationships between records, and the data were classified by using the DL model. The model achieved 98% accuracy in total and even higher in some intrusion categories.
Anahtar Kelime:

Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • [1] Anjana Tk. Discussion on Ransomware, Wannacry Ransomware and Cloud Storage Services against Ransom Malware attacks. International Journal for Research Trends and Innovation 2017; 2(6): 310.
  • [2] Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A et al. Deep learning approach for intelligent intrusion detection system. IEEE Access 2019; 7: 41525-41550.
  • [3] Okhravi H, Meiners C, Streilein WW, Hobson T. A Study of Gaps in Attack Analysis. Technical report, Massachusetts Institute of Technology, Massachusetts, 2016.
  • [4] Aldweesh A, Derhab A, Emam AZ. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems 2020; 189: 105124.
  • [5] Mukkamala S, Janoski G, Sung A. Intrusion detection using neural networks and support vector machines. In: 2002 International Joint Conference on Neural Networks. IJCNN’02 (Cat. No.02CH37290); Hawaii, USA; 2002. pp. 1702-1707.
  • [6] Li W. Using genetic algorithm for network intrusion detection. In United States Department of Energy Cyber Security Group Training Conference 2004; Kansas City, Kansas; 2004. 24-27.
  • [7] Altwaijry H, Algarny S. Bayesian based intrusion detection system. Journal of King Saud University - Computer and Information Sciences 2012; 24(1): 1-6.
  • [8] Rai K, Devi MS, Guleria A. Decision tree based Algorithm for Intrusion Detection. International Journal of Advanced Networking and Applications 2016; 07(04):2828-2834.
  • [9] Devi TR, Badugu S. A review on network intrusion detection system using machine learning. Advances in Decision Sciences. Image Processing, Security and Computer Vision 2020;1: 598-607.
  • [10] Liao HJ, Lin CHR, Lin YC, Tung KY. Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 2013; 36(1):16-24.
  • [11] Hansen C, Johnson C. The Visualization Handbook, USA: Elsevier, 2004.
  • [12] Keim DA. Information visualization and visual data mining. IEEE Transactions on Visualization and Computer Graphics 2002; 8(1):1-8.
  • [13] Chen W, Guo F, Wang F. A survey of traffic data visualization. IEEE Transactions on Intelligent Transportation Systems 2015; 16(6):2970-2984.
  • [14] Reynoso M, Diván M. Applying data visualization guideline on forest fires in argentina, 2020.
  • [15] Christopher Bishop. Pattern Recognition and Machine Learning, volume 27. Springer New York LLC, New York, 1 edition, 2006.
  • [16] Liu S, Wang X, Liu M, Zhu J. Towards better analysis of machine learning models: A visual analytics perspective. Vis. Informatics 2017; 1: 48-56.
  • [17] Rauber PE, Fadel SG, Falcão AX, Telea AC. Visualizing the hidden activity of artificial neural networks. IEEE Transactions on Visualization and Computer Graphics, 2017; 23(1):101-110.
  • [18] Fiore U, Palmieri F, Castiglione A, De Santis A. Network anomaly detection with the restricted boltzmann machine. Neurocomputing, 2013; 122: 13-23.
  • [19] Gao L, Li F, Xu X, Liu Y. Intrusion detection system using soeks and deep learning for in-vehicle security. Cluster Computing, 2018; 1: 1-9.
  • [20] Chakravarthi SS, Kannan RJ. Non-linear dimensionality reduction-based intrusion detection using deep autoencoder. International Journal of Advanced Computer Science and Applications, 2019; 10(8): 1-25.
  • [21] Liu H, Lang B. Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences (Switzerland) 2019; 9(20): 1-25.
  • [22] Aleesa AM, Zaidan BB, Zaidan AA, Sahar NM. Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions. Neural Computing and Applications 2019; 3: 20-44.
  • [23] Lee JH, Park KH. AE-CGAN model based high performance network intrusion detection system. Applied Sciences (Switzerland) 2019; 9(20): 1-20.
  • [24] Wang L, Jones R. Big data analytics of network traffic and attacks. NAECON 2018 - IEEE National Aerospace and Electronics Conference; Dayton, USA 2018. pp. 117-123.
  • [25] Lopez-Martin M, Carro B, Sanchez-Esguevillas A. Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Systems with Applications 2020; 141:112963.
  • [26] Russakovsky O, Deng J, Su H, Krause J, Satheesh S et al ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV) 2015; 115(3):211-252.
  • [27] Krizhevsky A, Sutskever I, Hinton GE. Imagenet classification with deep convolutional neural networks. Communication ACM 2017; 60(6):84–90.
  • [28] Gatys LA, Ecker AS, Bethge M. Texture and art with deep neural networks. Current Opinion in Neurobiology, Computational Neuroscience 2017; 46: 178-186.
  • [29] Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. CoRR 2015; 1: 1-20. abs/1409.1556.
  • [30] Dhanabal L, Shantharajah SP. A study on nsl-kdd dataset for intrusion detection system based on classification algorithms. 2015.
  • [31] Krizhevsky A, Sutskever I, Hinton G. Imagenet classification with deep convolutional neural networks. Neural Information Processing Systems 2012; 25: 01.
  • [32] Almisreb AA, Jamil N, Din NM. Utilizing alexnet deep transfer learning for ear recognition. Fourth International Conference on Information Retrieval and Knowledge Management (CAMP); Kota Kinabalu, Malaysia; 2018. pp. 1-5.
  • [33] Shin H, Roth HR, Gao M, Lu L, Xu Z et al. Deep convolutional neural networks for computer-aided detection: Cnn architectures, dataset characteristics and transfer learning. IEEE Transactions on Medical Imaging 2016; 35(5): 1285-1298.
  • [34] Ahsan M, Mashuri M, Lee MH, Kuswanto H, Prastyo DD. Robust adaptive multivariate hotelling’s t2 control chart based on kernel density estimation for intrusion detection system. Expert Systems with Applications 2020; 145: 113105.
  • [35] Ieracitano C, Adeel A, Morabito FC, Hussain A. A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing, 2020; 387: 51-62.
  • [36] Garg S, Singh R, Obaidat MS, Bhalla VK, Sharma B. Statistical vertical reduction-based data abridging technique for big network traffic dataset. International Journal of Communication Systems 2020; 33(4): e4249.
  • [37] Dong R, Li X, Zhang Q, Yuan H. Network intrusion detection model based on multivariate correlation analysis – long short-time memory network. IET Information Security 2020; 14(2): 166-174.
  • [38] Dey SK, Rahman MM. Effects of machine learning approach in flow-based anomaly detection on software-defined networking. Symmetry 2020; 12(1): 1.
  • [39] Li L, Yu Y, Bai S, Cheng J, Chen X. Towards effective network intrusion detection: A hybrid model integrating gini index and GBDT with PSO. Journal of Sensors 2018; 1: 1-20. doi: 10.1155/2018/1578314.
  • [40] Wu K, Chen Z, Li W. A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 2018; 6: 50850-50859.
  • [41] Le TTH, Kim Y, Kim H. Network intrusion detection based on novel feature selection model and various recurrent neural networks. Applied Sciences (Switzerland) 2019; 9(7): 4.
  • [42] Gogoi P, Bhuyan MH, Bhattacharyya DK, Kalita JK. Packet and Flow Based Network Intrusion Dataset. Contemporary Computing, Berlin, Heidelberg: Springer, 2012.
  • [43] Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M. Deep learning approach for network intrusion detection in software defined networking. International Conference on Wireless Networks and Mobile Communications (WINCOM); Morocco; 2016. pp.258-263.
  • [44] Yin C, Zhu Y, Fei J, He X. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 2017; 5: 21954-21961.
  • [45] Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M. Deep recurrent neural network for intrusion detection in sdn-based networks. 4th IEEE Conference on Network Softwarization and Workshops (NetSoft); Montreal, Canada; 2018. pp. 202-206.
APA İNCE K (2021). A novel approach for intrusion detection systems: V-IDS . , 1929 - 1943. 10.3906/elk-2005-1
Chicago İNCE Kenan A novel approach for intrusion detection systems: V-IDS . (2021): 1929 - 1943. 10.3906/elk-2005-1
MLA İNCE Kenan A novel approach for intrusion detection systems: V-IDS . , 2021, ss.1929 - 1943. 10.3906/elk-2005-1
AMA İNCE K A novel approach for intrusion detection systems: V-IDS . . 2021; 1929 - 1943. 10.3906/elk-2005-1
Vancouver İNCE K A novel approach for intrusion detection systems: V-IDS . . 2021; 1929 - 1943. 10.3906/elk-2005-1
IEEE İNCE K "A novel approach for intrusion detection systems: V-IDS ." , ss.1929 - 1943, 2021. 10.3906/elk-2005-1
ISNAD İNCE, Kenan. "A novel approach for intrusion detection systems: V-IDS ". (2021), 1929-1943. https://doi.org/10.3906/elk-2005-1
APA İNCE K (2021). A novel approach for intrusion detection systems: V-IDS . Turkish Journal of Electrical Engineering and Computer Sciences, 29(4), 1929 - 1943. 10.3906/elk-2005-1
Chicago İNCE Kenan A novel approach for intrusion detection systems: V-IDS . Turkish Journal of Electrical Engineering and Computer Sciences 29, no.4 (2021): 1929 - 1943. 10.3906/elk-2005-1
MLA İNCE Kenan A novel approach for intrusion detection systems: V-IDS . Turkish Journal of Electrical Engineering and Computer Sciences, vol.29, no.4, 2021, ss.1929 - 1943. 10.3906/elk-2005-1
AMA İNCE K A novel approach for intrusion detection systems: V-IDS . Turkish Journal of Electrical Engineering and Computer Sciences. 2021; 29(4): 1929 - 1943. 10.3906/elk-2005-1
Vancouver İNCE K A novel approach for intrusion detection systems: V-IDS . Turkish Journal of Electrical Engineering and Computer Sciences. 2021; 29(4): 1929 - 1943. 10.3906/elk-2005-1
IEEE İNCE K "A novel approach for intrusion detection systems: V-IDS ." Turkish Journal of Electrical Engineering and Computer Sciences, 29, ss.1929 - 1943, 2021. 10.3906/elk-2005-1
ISNAD İNCE, Kenan. "A novel approach for intrusion detection systems: V-IDS ". Turkish Journal of Electrical Engineering and Computer Sciences 29/4 (2021), 1929-1943. https://doi.org/10.3906/elk-2005-1