(cache)Enhancing Intrusion Detection Systems Using RNN, LSTM, and Hybrid RNN-LSTM Models | IEEE Conference Publication | IEEE Xplore

Enhancing Intrusion Detection Systems Using RNN, LSTM, and Hybrid RNN-LSTM Models


Abstract:

Due to The lack of comparison studies and practical applications of RNN, LSTM, and hybrid RNN-LSTM models for intrusion detection systems, especially when managing class ...Show More

Abstract:

Due to The lack of comparison studies and practical applications of RNN, LSTM, and hybrid RNN-LSTM models for intrusion detection systems, especially when managing class imbalances in complex network datasets, represents a gap in the literature. This study investigates the application of deep learning techniques to improve the detection capabilities of IDS. For this study, we applied and assessed Recurrent Neural Network, Long Short-Term Memory, and Hybrid RNN-LSTM models on a UNSW-NB15 dataset, and to redress class imbalance we trained and validated our models using synthetic minority over-sampling. The RNN-LSTM model was shown to perform the best with a 9 4. 0 0 % accuracy in comparison to other models. These experimental results signify the possibility of enhancing IDS performance and a dependable method of detecting various network intrusions with the use of hybrid models comprised of RNN & LSTM.
Date of Conference: 10-12 March 2025
Date Added to IEEE Xplore: 25 April 2025
ISBN Information:
Conference Location: Prawet, Thailand
References is not available for this document.

I. Introduction

According to the data obtained from various sources, there were approximately twenty-six billion devices online in 2019, considering this huge number of connected devices there was an excessive usage of internet for daily operations and this usage led us to evolving and increasing number of network attacks [1]. This is where intrusion detection systems come to light, as they are used for monitoring networks and computers in real time in order to detect intrusions and handle any necessary response [2].

Select All
1.
Laghrissi F, Douzi S, Douzi K, Hssina B. Intrusion detection systems using long short-term memory (LSTM). Journal of Big Data. 2021 May 7 ; 8 ( 1 ): 65.
2.
Mohammed B, Gbashi EK. Intrusion detection system for NSL-KDD dataset based on deep learning and recursive feature elimination. Engineering and Technology Journal. 2021 Jul 25 ; 39 ( 7 ): 1069–79.
3.
Liu H, Lang B. Machine learning and deep learning methods for intrusion detection systems: A survey. applied sciences. 2019 Oct 17 ; 9 ( 20 ): 4396.
4.
( 2024 ) https://research.unsw.edu.au/projects/unsw-nb15-dataset.
5.
Chawla A, Lee B, Fallon S, Jacob P. Host based intrusion detection system with combined CNN/RNN model. InECML PKDD 2018 Workshops: Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings 182019 (pp. 149–158 ). Springer International Publishing.
6.
Mohammadpour L, Ling TC, Liew CS, Aryanfar A. A survey of CNNbased network intrusion detection. Applied Sciences. 2022 Aug 15 ; 12 ( 16 ): 8162.
7.
Psychogyios K, Papadakis A, Bourou S, Nikolaou N, Maniatis A, Zahariadis T. Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data. Future Internet. 2024 Feb 23 ; 16 ( 3 ): 73.
8.
Kamil WF, Mohammed IJ. Deep learning model for intrusion detection system utilizing convolution neural network. Open Engineering. 2023 Aug 3 ; 13 ( 1 ): 20220403.
9.
Elmasry W, Akbulut A, Zaim AH. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks. 2020 Feb 26 ; 168 : 107042.
10.
Karatas G, Demir O, Sahingoz OK. Deep learning in intrusion detection systems. In 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) 2018 Dec 3 (pp. 113–116 ). IEEE.
11.
Song Y, Hyun S, Cheong YG. Analysis of autoencoders for network intrusion detection. Sensors. 2021 Jun 23 ; 21 ( 13 ): 4294.
12.
Lansky J, Ali S, Mohammadi M, Majeed MK, Karim SH, Rashidi S, Hosseinzadeh M, Rahmani AM. Deep learning-based intrusion detection systems: a systematic review. IEEE Access. 2021 Jul 14 ; 9 : 101574–99.
13.
Vigneswaran RK, Vinayakumar R, Soman KP, Poornachandran P. Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication and networking technologies (ICCCNT) 2018 Jul 10 (pp. 1–6 ). IEEE.
14.
KP S. A short review on applications of deep learning for cyber security. arXiv preprint arXiv: 1812.06292. 2018 Dec 15.
15.
Huang X. Network intrusion detection based on an improved long-short-term memory model in combination with multiple spatiotemporal structures. Wireless Communications and Mobile Computing. 2021 Apr 24 ; 2021: 1-0.
16.
Potluri S, Ahmed S, Diedrich C. Convolutional neural networks for multi-class intrusion detection system. InMining Intelligence and Knowledge Exploration: 6th International Conference, MIKE 2018, Cluj-Napoca, Romania, December 20-22, 2018, Proceedings 62018 (pp. 225–238 ). Springer International Publishing.
17.
Hsu CM, Azhari MZ, Hsieh HY, Prakosa SW, Leu JS. Robust network intrusion detection scheme using long-short term memory based convolutional neural networks. Mobile Networks and Applications. 2021 Jun ; 26 : 1137–44.
18.
Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications. 2020 Feb 1 ; 50 : 102419.
19.
Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. Ieee Access. 2019 Apr 3;7 : 41525–50.
20.
Krupski J, Graniszewski W, Iwanowski M. Data transformation schemes for cnn-based network traffic analysis: A survey. Electronics. 2021 Aug 23 ; 10 ( 16 ): 2042.
21.
Shone N, Ngoc TN, Phai VD, Shi Q. A deep learning approach to network intrusion detection. IEEE transactions on emerging topics in computational intelligence. 2018 Jan 22 ; 2 ( 1 ): 41–50.
22.
Park SH, Park HJ, Choi YJ. RNN-based prediction for network intrusion detection. In 2020 international conference on artificial intelligence in information and communication (ICAIIC) 2020 Feb 19 (pp. 572–574 ). IEEE.
23.
Python ( 2024 ) URL https://www.python.org.
24.
NumPy ( 2024 ) URL https://www.numpy.org.
25.
Pandas ( 2024 ) URL https://pandas.pydata.org.
26.
Scikit-Learn ( 2024 ) URL https://scikit-learn.org/stable.
27.
Imbalanced-learn ( 2024 ) URL https://imbalanced-learn.org/stable.
28.
Keras ( 2024 ) URL https://keras.io.

Contact IEEE to Subscribe

References

References is not available for this document.