Published June 30, 2024 | Version CC-BY-NC-ND 4.0
Journal article Open

Intrusion Detection System to Secure a Network Using ACNN Model and Machine Learning

  • 1. Research Scholar, Department of Computer Science & Engineering, University of Technology, Jaipur (R.J), India.

Contributors

Contact person:

  • 1. Research Scholar, Department of Computer Science & Engineering, University of Technology, Jaipur (R.J), India.
  • 2. Professor, Department of Computer Science & Engineering, University of Technology, Jaipur (R.J), India.

Description

Abstract: -As cyber threats continue to evolve in sophistication and diversity, the need for robust Intrusion Detection Systems (IDS) becomes paramount to safeguarding network integrity. This research explores the application of an innovative approach by integrating an Attention-based Convolutional Neural Network (ACNN) model with machine learning techniques to enhance the accuracy and efficiency of intrusion detection. The proposed system leverages the ACNN's ability to capture contextual dependencies in network traffic data, enabling the extraction of intricate patterns indicative of potential intrusions. The ACNN's attention mechanism focuses on relevant features within the data, improving the model's discriminative power and adaptability to dynamic cyber threats. To achieve optimal performance, the ACNN is complemented with a machine learning framework that includes feature engineering, dimensionality reduction, and classification algorithms. This integrated approach allows the system to adapt and learn from evolving attack vectors, providing a proactive defense mechanism against both known and unknown threats. The research evaluates the proposed ACNN-based IDS using benchmark datasets and real-world network traffic scenarios. Comparative analysis against traditional IDS models showcases the superiority of the ACNN in terms of detection accuracy, false positive rates, and computational efficiency. Furthermore, the system's adaptability to emerging threats is demonstrated through continuous learning and retraining mechanisms. Results indicate that the ACNN-based IDS not only exhibits superior performance but also demonstrates resilience against evasion techniques employed by malicious actors. The research findings contribute to the advancement of network security by presenting a cutting-edge solution that combines deep learning and machine learning for effective and adaptive intrusion detection.

Files

G131912070724.pdf

Files (334.0 kB)

Name Size Download all
md5:b1f9d0697284a9ca0ebdc8449e7b2ac1
334.0 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2024-06-15
Manuscript received on 05 June 2024 | Revised Manuscript received on 13 June 2024 | Manuscript Accepted on 15 June 2024 | Manuscript published on 30 June 2024.

References

  • L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, "A Novel Network Intrusion Detection System Based on CNN," 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), pp. 243–247, Dec. 2020, doi:. https://doi.org/10.1109/CBD51900.2020.00051
  • R. Vinayakumar, K. P. Soman, and P. Poornachandrany, "Applying convolutional neural network for network intrusion detection," 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), vol. 2017-January, pp. 1222–1228, Nov. 2017, doi: 10.1109/ICACCI.2017.8126009. https://doi.org/10.1109/ICACCI.2017.8126009
  • Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017, September). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222-1228). IEEE. https://doi.org/10.1109/ICACCI.2017.8126009
  • Liang, J., Jing, T., Niu, H., & Wang, J. (2020). Two-terminal fault location method of distribution network based on adaptive convolution neural network. IEEE Access, 8, 54035-54043. https://doi.org/10.1109/ACCESS.2020.2980573
  • J. Liang, T. Jing, H. Niu, and J. Wang, "Two-Terminal Fault Location Method of Distribution Network Based on Adaptive Convolution Neural Network," IEEE Access, vol. 8, pp. 54035–54043, 2020, doi: https://doi.org/10.1109/ACCESS.2020.2980573
  • L. Ashiku and C. Dagli, "Network Intrusion Detection System using Deep Learning," Procedia Comput Sci, vol. 185, pp. 239–247, Jan. 2021, doi: 10.1016/J.PROCS.2021.05.025. https://doi.org/10.1016/j.procs.2021.05.025
  • J. Kim, Y. Shin, and E. Choi, "An Intrusion Detection Model based on a Convolutional Neural Network," J. Multim. Inf. Syst., vol. 6, no. 4, pp. 165–172, Dec. 2019, doi: https://doi.org/10.33851/JMIS.2019.6.4.165
  • S. Mahadik, P. M. Pawar, and R. Muthalagu, "Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)," Journal of Network and Systems Management, vol. 31, no. 1, pp. 1–27, Mar. 2023, doi:https://doi.org/10.1007/s10922-022-09697-x
  • L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, "A Survey of CNN-Based Network Intrusion Detection," Applied Sciences (Switzerland), vol. 12, no. 16, Aug. 2022, doi: https://doi.org/10.3390/app12168162
  • Mohammadpour, L., Ling, T. C., Liew, C. S., &Aryanfar, A. (2022). A Survey of CNN-Based Network Intrusion Detection. Applied Sciences, 12(16), 8162. https://doi.org/10.3390/app12168162
  • Vigneswaran, R. K., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, July). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication, and networking technologies (ICCCNT) (pp. 1-6). IEEE. https://doi.org/10.1109/ICCCNT.2018.8494096
  • L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, "A Novel Network Intrusion Detection System Based on CNN," 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), pp. 243–247, Dec. 2020, doi: https://doi.org/10.1109/CBD51900.2020.00051
  • R. Vinayakumar, K. P. Soman, and P. Poornachandrany, "Applying convolutional neural network for network intrusion detection," 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), vol. 2017-January, pp. 1222–1228, Nov. 2017, doi: 10.1109/ICACCI.2017.8126009. https://doi.org/10.1109/ICACCI.2017.8126009
  • Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017, September). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222-1228). IEEE. https://doi.org/10.1109/ICACCI.2017.8126009
  • Liang, J., Jing, T., Niu, H., & Wang, J. (2020). Two-terminal fault location method of distribution network based on adaptive convolution neural network. IEEE Access, 8, 54035-54043. https://doi.org/10.1109/ACCESS.2020.2980573
  • J. Liang, T. Jing, H. Niu, and J. Wang, "Two-Terminal Fault Location Method of Distribution Network Based on Adaptive Convolution Neural Network," IEEE Access, vol. 8, pp. 54035–54043, 2020, doi: 10.1109/ACCESS.2020.2980573. https://doi.org/10.1109/ACCESS.2020.2980573
  • L. Ashiku and C. Dagli, "Network Intrusion Detection System using Deep Learning," Procedia Comput Sci, vol. 185, pp. 239–247, Jan. 2021, doi: https://doi.org/10.1016/j.procs.2021.05.025
  • J. Kim, Y. Shin, and E. Choi, "An Intrusion Detection Model based on a Convolutional Neural Network," J. Multim. Inf. Syst., vol. 6, no. 4, pp. 165–172, Dec. 2019, doi: 10.33851/JMIS.2019.6.4.165. https://doi.org/10.33851/JMIS.2019.6.4.165
  • S. Mahadik, P. M. Pawar, and R. Muthalagu, "Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT)," Journal of Network and Systems Management, vol. 31, no. 1, pp. 1–27, Mar. 2023, doi: 10.1007/S10922-022-09697-X/TABLES/14. https://doi.org/10.1007/s10922-022-09697-x
  • L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, "A Survey of CNN-Based Network Intrusion Detection," Applied Sciences (Switzerland), vol. 12, no. 16, Aug. 2022, doi: 10.3390/APP12168162. https://doi.org/10.3390/app12168162
  • Reddy, M. V. K., & Pradeep, Dr. S. (2021). Envision Foundational of Convolution Neural Network. In International Journal of Innovative Technology and Exploring Engineering (Vol. 10, Issue 6, pp. 54–60). https://doi.org/10.35940/ijitee.f8804.0410621
  • Kumar, P., & Rawat, S. (2019). Implementing Convolutional Neural Networks for Simple Image Classification. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 3616–3619). https://doi.org/10.35940/ijeat.b3279.129219
  • Mandhare, V. V., Pede, D. R., & Vikhe, P. S. (2020). Network Intrusion Detection using a Deep Learning Approach. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 9, Issue 3, pp. 59–64). https://doi.org/10.35940/ijrte.b4086.099320
  • Dubey, S. K., Sinha, Dr. S., & Jain, Dr. A. (2023). Heart Disease Prediction Classification using Machine Learning. In International Journal of Inventive Engineering and Sciences (Vol. 10, Issue 11, pp. 1–6). https://doi.org/10.35940/ijies.b4321.11101123
  • Mukherjee*, P., Palan, P., & Bonde, M. V. (2021). Using Machine Learning and Artificial Intelligence Principles to Implement a Wealth Management System. In International Journal of Soft Computing and Engineering (Vol. 10, Issue 5, pp. 26–31). https://doi.org/10.35940/ijsce.f3500.0510521