Training Multi-Layer Deep Neural Networks Using Hybrid Algorithms to Detect Network Intrusions

Training Multi-Layer Deep Neural Networks Using Hybrid Algorithms to Detect Network Intrusions

One of the challenges facing security analysts and administrators is to enable intrusion detection in network systems, preventing intruders from entering the network. Network intrusion detection is usually signature-based and plays an effective role in detecting only known attacks. However, there are concerns about unknown attacks and the difficulty arises here. Which requires creating a model that can detect network attacks by discovering anomalies in the network. Therefore, in this article, an approach to detecting attacks is presented by monitoring the behavior of data and training it to distinguish between network traffic, which is normal traffic, and traffic that is classified as an attack on the network. The known database was used NSL-KDD, a dataset that monitors network traffic including various types of network attacks and detects normal traffic, it also contains numerous patterns and features. It includes 41 features for each traffic and is divided into five classifications. The four types are classified as types of network attacks and the fifth as normal traffic. One of the difficulties and problems is the existence of a wide variety of features. This requires finding a way to extract features that can have a significant impact on the results to achieve greater accuracy in classifying the type of attack. For this reason, principal component analysis PCA technology has been used to reduce feature sizes. Six models were created which are hybrid algorithms to optimize the performance of a multi-layer neural network by training their weights to classify the attack type in the network. A two hidden layer deep neural network was designed, and their weights were trained by designing six hybrid models. These models are hybrid algorithms based on four optimization algorithms which are Genetic Algorithm, Artificial bee colony algorithm, firefly algorithm, and Jaya algorithm. Several metrics were used to evaluate the performance of the proposed models. This paper contributed to finding an effective network intrusion detection methodology and developing a deep neural network by building effective optimization algorithms. Where the proposed algorithms performed well with accuracy ranging from 77.177% to 85.077%. The proposed algorithms also achieved a low MSE loss rate close to zero with an MSE value of 9.99868e-05. Also, precision values range from 82 to 97%, and most of the proposed algorithms achieved high rates when calculating the sensitivity and specificity. The proposed models have contributed to finding a high-performance methodology for detecting intrusion on the network and contributed to proving that the hybrid algorithms used are effective and help to the optimization can be used in other studies.

___

  • Alzahrani, A. & Alenazi, M. (2021). Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks. MDPI, 13(111), 1-18. https://doi.org/10.3390/fi13050111
  • Anderson, J. (1980). Computer Security Threat Monitoring and Surveillance. Fort Washington, 1- 56.
  • Bachar, A., Makhfi, N. & Bannay, O. (2020). Machine Learning for Network Intrusion Detection Based on SVM Binary Classification Model. Advances in Science, Technology and Engineering Systems Journal, 5(4), 638-644. https://doi.org/10.25046/aj050476
  • Choudharya, S. & Kesswanib, N. (2020). Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT. International Conference on Computational Intelligence and Data Science, 9(10), 167 (2020), 1561-1573. https://doi.org/10.1016/j.procs.2020.03.367
  • Denning, D. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2), 222-232
  • Dhanabal, L. & Shantharajah, S. (2015). A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms. International Journal of Advanced Research in Computer and Communication Engineering,4(6), 446-452. https://doi.org/10.17148/IJARCCE.2015.4696
  • Ghanem, H., Jantan, A., Ghaleb, S. & Nasser, A. (2020). An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons. IEEE Access, 8(2020), 130452-130475. https://doi.org/10.1109/ACCESS.2020.3009533
  • Hindy, H., Atkinson, R., Tachtatzis, C., Colin, J., Bayne, E. & Bellekens, X. (2020). Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection. MDPI Journal, 9(10), 1-16. https://doi.org/10.3390/electronics9101684
  • Hosseini, S. & Zade, B. (2020). New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Computer Networks, 173(2020), 107-168. https://doi.org/10.1016/j.comnet.2020.107168
  • Ingre, B., Yadav, A. & Soni, A. (2017). Decision Tree Based Intrusion Detection System for NSLKDD Dataset. Smart Innovation, 2(84), 207-218. https://doi.org/10.1007/978-3-319- 63645-0_23
  • Istiaque, S., Khan, A., Hassan, Z. & Waheed, S. (2021). Performance Evaluation of a Smart Intrusion Detection System (IDS) Model, European Journal of Engineering and Technology Research, 6(2), 148-152. https://doi.org/10.24018/ejers.2021.6.2.2371
  • Karaboga, D. & Basturk, B. (2007). Artificial Bee Colony (ABC) OptimizationAlgorithm for Solving Constrained OptimizationProblems. Lecture Notes in Computer Science, 4529, 789-798. https://doi.org/10.1007/978-3-540-72950-1_77
  • Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J. & Alazab, A. (2020). Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine, MDPI, 9(1), 173-191. https://doi.org/10.3390/electronics9010173
  • Mohmmadzadeh, H. & Gharehchopogh, F. (2020). A novel hybrid whale optimization algorithm with flower pollination algorithm for feature selection: Case study Email spam detection, Preprints, 1-28. https://doi.org/10.1111/coin.12397
  • Niyaz, Q., Sun, W., Javaid, A. & Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection System. EAI Endorsed Trans. Security Safety, 16(9), 1-6. https://doi.org/10.4108/eai.3-12-2015.2262516
  • Rao, R. (2016). Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems. International Journal of Industrial Engineering Computations, 7(2016), 19-34. https://doi.org/10.5267/j.ijiec.2015.8.004
  • Rawat, S., Srinivasan, A. & Ravi, V. (2020). Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network. InternetTechnology Letters, e232, 1-9. https://doi.org/10.1002/itl2.232
  • Reeves, C. (2010). Genetic Algorithms. Handbook of Metaheuristics, 109-139. https://doi.org/10.1007/978-1-4419-1665-5
  • Tang, C., Luktarhan, N. & Zhao, Y. (2020). SAAE-DNN: Deep Learning Method on Intrusion Detection. MDPI, 12, (1695), 1-20. https://doi.org/10.3390/sym12101695
  • Tang, T., Mhamdi, L., McLernon, D., Zaidi, S & Ghogho, M. (2016). Deep Learning Approach for Network Intrusion Detection in Software Defined Networking. IEEE. https://doi.org/10.1109/WINCOM.2016.7777224
  • Ucar, M., Ucar, E. & Incetas, M. (2021). A Stacking Ensemble Learning Approach for Intrusion Detection System, Düzce University Journal of Science & Technology, 9(2021), 1329- 1341. https://doi.org/10.29130/dubited.737211
  • Yang, X. & He, X. (2013). Firefly algorithm: recent advances and applications. International Journal of Swarm Intelligence, 1(1), 36-50. https://doi.org/10.1504/IJSI.2013.055801