An optimized model for network intrusion detection in the network operating system environment
Main Article Content
Abstract
With the heavy reliance on computers and information technology to send and receive data across networks of various types, there has been concern about securing that data from intrusions and cyber-attacks. The expansion of network usage has led to an increase in hacker attacks, which has led to prioritizing cybersecurity precautions in detecting potential threats. Intrusion detection techniques are a critical security measure to protect networks in both personal and corporate environments that are managed by network operating systems. For this, the paper relies on designing a network intrusion detection model. Since deep neural networks (DNNs) are classic deep learning models known for their strong classification performance, making them popular in intrusion detection along with other machine learning algorithms, they have been chosen to improve intrusion classification models based on datasets for intrusion detection systems. The basic structure of this proposal is to adopt one of the optimization algorithms in extracting features from the dataset to obtain more accurate results in the classification and intrusion detection stage. The developed Corona Virus algorithm is adopted to improve the system performance by identifying optimal features. This algorithm, which consists of several stages, optimally selects individuals based on features from the NSL-KDD dataset used for intrusion detection. The resulting optimization solution acts as a network structure for the intrusion classification model based on machine learning and deep learning algorithms. The test results showed exceptional performance on the NSL-KDD dataset, where the proposed Convolution Neural Network CNN model achieved 99.3% accuracy for multi-class classification, while the Decision Tree (DT) achieved 88.64% accuracy for anomaly detection in bi-class classification.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
A. A. Abdulhameed, R. J. Al-Azawi, and B. M. Al-Mahdawi, “Modeling web security analysis attacks with cysemol tool,” Al-Mustansiriyah Journal of Science, vol. 31, no. 3, pp. 101-109, 2020.
S. Mishra, R. Sagban, A. Yakoob, and N. Gandhi, “Swarm intelligence in anomaly detection systems: an overview,” International Journal of Computers and Applications, vol. 43, no. 2, pp. 109-118, 2021.
H. Debar, “An introduction to intrusion-detection systems,” Proceedings of Connect, vol. 2000, 2000.
R. Tahri, Y. Balouki, A. Jarrar, and A. Lasbahani, "Intrusion detection system using machine learning algorithms." p. 02003.
J. Du, K. Yang, Y. Hu, and L. Jiang, “NIDS-CNNLSTM: Network intrusion detection classification model based on deep learning,” IEEE Access, vol. 11, pp. 24808-24821, 2023.
O. Elnakib, E. Shaaban, M. Mahmoud, and K. Emara, “EIDM: Deep learning model for IoT intrusion detection systems,” The Journal of Supercomputing, vol. 79, no. 12, pp. 13241-13261, 2023.
G. Abdelmoumin, D. B. Rawat, and A. Rahman, “On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things,” IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4280-4290, 2021.
H. A. Mahmood, and S. H. Hashem, “Network intrusion detection system (NIDS) in cloud environment based on hidden Naïve Bayes multiclass classifier,” Al-Mustansiriyah Journal of Science, vol. 28, no. 2, pp. 134-142, 2018.
B. Kaushik, R. Sharma, K. Dhama, A. Chadha, and S. Sharma, “Performance evaluation of learning models for intrusion detection system using feature selection,” Journal of Computer Virology and Hacking Techniques, vol. 19, no. 4, pp. 529-548, 2023.
M. H. Al-Tai, B. M. Nema, and A. Al-Sherbaz, “Deep learning for fake news detection: Literature review,” Al-Mustansiriyah Journal of Science, vol. 34, no. 2, pp. 70-81, 2023.
Y. L. Khaleel, M. A. Habeeb, A. Albahri, T. Al-Quraishi, O. Albahri, and A. Alamoodi, “Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods,” Journal of Intelligent Systems, vol. 33, no. 1, pp. 20240153, 2024.
E. İ. Uysal, G. Demircioğlu, G. Kale, E. Bostanci, M. S. Güzel, and S. N. Mohammed, "Network Anomaly Detection System using Genetic Algorithm, Feature Selection and Classification." pp. 1-5.
N. Moustafa, J. Hu, and J. Slay, “A holistic review of network anomaly detection systems: A comprehensive survey,” Journal of Network and Computer Applications, vol. 128, pp. 33-55, 2019.
B. Jothi, and M. Pushpalatha, “WILS-TRS—A novel optimized deep learning based intrusion detection framework for IoT networks,” Personal and Ubiquitous Computing, vol. 27, no. 3, pp. 1285-1301, 2023.
S. Sivamohan, and S. Sridhar, “An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework,” Neural Computing and Applications, vol. 35, no. 15, pp. 11459-11475, 2023.
R. A. I. Alhayali, M. Aljanabi, A. H. Ali, M. A. Mohammed, and T. Sutikno, “Optimized machine learning algorithm for intrusion detection,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 24, no. 1, pp. 590-599, 2021.
D. Stiawan, A. Heryanto, A. Bardadi, D. P. Rini, I. M. I. Subroto, M. Y. B. Idris, A. H. Abdullah, B. Kerim, and R. Budiarto, “An approach for optimizing ensemble intrusion detection systems,” Ieee Access, vol. 9, pp. 6930-6947, 2020.
K. Jiang, W. Wang, A. Wang, and H. Wu, “Network intrusion detection combined hybrid sampling with deep hierarchical network,” IEEE access, vol. 8, pp. 32464-32476, 2020.
P. Wei, Y. Li, Z. Zhang, T. Hu, Z. Li, and D. Liu, “An optimization method for intrusion detection classification model based on deep belief network,” Ieee Access, vol. 7, pp. 87593-87605, 2019.
A. M. Al Tobi, and I. Duncan, “Improving intrusion detection model prediction by threshold adaptation,” Information, vol. 10, no. 5, pp. 159, 2019.
E. O. Abiodun, A. Alabdulatif, O. I. Abiodun, M. Alawida, A. Alabdulatif, and R. S. Alkhawaldeh, “A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities,” Neural Computing and Applications, vol. 33, no. 22, pp. 15091-15118, 2021.
D. Yi, J. Ahn, and S. Ji, “An effective optimization method for machine learning based on ADAM,” Applied Sciences, vol. 10, no. 3, pp. 1073, 2020.
H. Emami, “Anti-coronavirus optimization algorithm,” Soft Computing, vol. 26, no. 11, pp. 4991-5023, 2022.
M. A. Al-Betar, Z. A. A. Alyasseri, M. A. Awadallah, and I. Abu Doush, “Coronavirus herd immunity optimizer (CHIO),” Neural Computing and Applications, vol. 33, no. 10, pp. 5011-5042, 2021.
R. Sun, “Optimization for deep learning: theory and algorithms,” arXiv preprint arXiv:1912.08957, 2019.
S. Sun, Z. Cao, H. Zhu, and J. Zhao, “A survey of optimization methods from a machine learning perspective,” IEEE transactions on cybernetics, vol. 50, no. 8, pp. 3668-3681, 2019.
P. Misra, and A. S. Yadav, "Impact of preprocessing methods on healthcare predictions."
D. Wang, D. Tan, and L. Liu, “Particle swarm optimization algorithm: an overview,” Soft computing, vol. 22, pp. 387-408, 2018.
F. Pourpanah, R. Wang, C. P. Lim, X.-Z. Wang, and D. Yazdani, “A review of artificial fish swarm algorithms: Recent advances and applications,” Artificial Intelligence Review, vol. 56, no. 3, pp. 1867-1903, 2023.
F. Martínez-Álvarez, G. Asencio-Cortés, J. F. Torres, D. Gutiérrez-Avilés, L. Melgar-García, R. Pérez-Chacón, C. Rubio-Escudero, J. C. Riquelme, and A. Troncoso, “Coronavirus optimization algorithm: a bioinspired metaheuristic based on the COVID-19 propagation model,” Big data, vol. 8, no. 4, pp. 308-322, 2020.
Y. Yuan, Q. Shen, S. Wang, J. Ren, D. Yang, Q. Yang, J. Fan, and X. Mu, “Coronavirus mask protection algorithm: A new bio-inspired optimization algorithm and its applications,” Journal of Bionic Engineering, vol. 20, no. 4, pp. 1747-1765, 2023.
N. Gupta, P. Bedi, and V. Jindal, "Effect of activation functions on the performance of deep learning algorithms for network intrusion detection systems." pp. 949-960.
A. D. Rasamoelina, F. Adjailia, and P. Sinčák, "A review of activation function for artificial neural network." pp. 281-286.
F. K. H. Mihna, M. A. Habeeb, Y. L. Khaleel, Y. H. Ali, and L. A. E. Al-saeedi, “Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence,” Mesopotamian J. CyberSecurity, vol. 2024, pp. 4–16, 2024, doi: 10.58496/mjcs/2024/002.
L. A. E. Al-saeedi, F. J. Shakir, F. K. Hasan, G. G. Shayea, Y. L. Khaleel, and M. A. Habeeb, “Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks,” Mesopotamian J. CyberSecurity, vol. 4, no. 2, pp. 129–142, 2024.