Multilayer Perceptron and Auto-Encoder based Intrusion Detection System
Multilayer Perceptron and Auto-Encoder based Intrusion Detection System |
||
|
||
© 2024 by IJETT Journal | ||
Volume-72 Issue-6 |
||
Year of Publication : 2024 | ||
Author : G. Sahitya, C. Kaushik, K. Karthik, V. Anemesh Chandra, C. Janaki Ram |
||
DOI : 10.14445/22315381/IJETT-V72I6P114 |
How to Cite?
G. Sahitya, C. Kaushik, K. Karthik, V. Anemesh Chandra, C. Janaki Ram, "Multilayer Perceptron and Auto-Encoder based Intrusion Detection System," International Journal of Engineering Trends and Technology, vol. 72, no. 6, pp. 136-145, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I6P114
Abstract
In recent times, with the rapid growth of the internet, every day a lot of data is being generated. Along with this growth, there are advancements in cybersecurity attacks and the technologies through which security attacks are taking place; as a result, there is an increase in security and privacy concerns for users. An Intrusion Detection System can be developed to address this issue. The Intrusion Detection System can be made by evaluating several advanced computational deep learning and machine learning models for intrusion detection using datasets containing features extracted from network traffic; in this paper, using Deep Learning (DL) Techniques such as Multi-layer Perceptron (MLP) and Auto encoders (AE). These classifiers are being trained and evaluated on the dataset, and their performance metrics, including accuracy and classification reports, are being computed by using only the features which are necessary and useful. The Intrusion Detection Model, through these classifiers, improves the accuracy of intrusion detection.
Keywords
Auto-encoders (AE), Cybersecurity, Deep Learning Techniques, Multi-layer Perceptron (MLP), Network Intrusion Detection System (NIDS).
References
[1] Sara Al-Emadi, Aisha Al-Mohannadi, and Felwa Al-Senaid, “Using Deep Learning Techniques for Network Intrusion Detection,” 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, Doha, Qatar, pp. 171-176, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Chuanlong Yin et al., “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks,” IEEE Access, vol. 5, pp. 21954-21961, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[3] B. Riyaz, and Sannasi Ganapathy, “A Deep Learning Approach for Effective Intrusion Detection in Wireless Networks Using CNN,” Soft Computing, vol. 24, no. 22, pp. 17265-17278, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Chuanlong Yin et al., “Enhancing Network Intrusion Detection Classifiers Using Supervised Adversarial Training,” The Journal of Supercomputing, vol. 76, no. 9, pp. 6690-6719, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Salim Salmi, and Lahcen Oughdir, “Performance Evaluation of Deep Learning Techniques for DoS Attacks Detection in Wireless Sensor Network,” Journal of Big Data, vol. 10, no. 1, pp. 1-25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Wei Zhong, Ning Yu, and Chunyu Ai, “Applying Big Data Based Deep Learning System to Intrusion Detection,” Big Data Mining and Analytics, vol. 3, no. 3, pp. 181-195, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Petros Toupas et al., “An Intrusion Detection System for Multi-class Classification Based on Deep Neural Networks,” 2019 18th IEEE International Conference on Machine Learning and Applications, Boca Raton, FL, USA, pp. 1253-1258, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Zeeshan Ahmad et al., “Network Intrusion Detection System: A Systematic Study of Machine Learning and Deep Learning Approaches,” Transactions on Emerging Telecommunications Technologies, vol. 35, no. 1, pp. 1-29, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Lirim Ashiku, and Cihan Dagli, “Network Intrusion Detection System using Deep Learning,” Procedia Computer Science, vol. 185, pp. 239-247, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Panda Mrutyunjaya et al., “Network Intrusion Detection System: A Machine Learning Approach,” Intelligent Decision Technologies, vol. 5, no. 4, pp. 347-356, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[11] ISCX NSL-KDD Dataset, UNB, 2009. [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html [12] Mohammed Maithem, and Ghadaa A. Al-Sultany, “Network Intrusion Detection System Using Deep Neural Networks,” Journal of Physics: Conference Series, vol. 1804, no. 1, pp. 1-11, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Sydney Mambwe Kasongo, “A Deep Learning Technique for Intrusion Detection System Using a Recurrent Neural Networks Based Framework,” Computer Communications, vol. 199, pp. 113-125, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ankit Thakkar, and Ritika Lohiya, “A Review of the Advancement in Intrusion Detection Datasets,” Procedia Computer Science, vol. 167, pp. 636-645, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] V.K. Navya et al., “Intrusion Detection System Using Deep Neural Networks (DNN),” 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation, Coimbatore, India, pp. 1-6, 2021.
[CrossRef] [Google Scholar] [Publisher Link]