373 384
Full Length Article
Fusion: Practice and Applications
Volume 13 , Issue 1, PP: 117-125 , 2023 | Cite this article as | XML | Html |PDF

Title

Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset

  Manjunath H. 1 * ,   Saravana Kumar 2

1  Department of Computer Science and Engineering, CMR University, Bangalore, India
    (manjunath.19cphd@cmr.edu.in)

2  Department of Computer Science and Engineering, CMR University, Bangalore, India
    (sarvana.k@cmr.edu.in)


Doi   :   https://doi.org/10.54216/FPA.130109

Received: March 24, 2023 Revised: June 27, 2023 Accepted: September 02, 2023

Abstract :

Increase in network activity of transferring information online allows network breeches where intruders easily avail the most important information or data. The growth of online functioning and many other governmental data over the internet without security has caused data vulnerability; attackers can easily detect the data and misuse them. Network Intrusion Detection System (NIDS) has allowed this whole process of online data transfer to occur safely and secured transactions. Due to the cloud usage in network the huge amount of traffic is created as well as number of attacks are increased day by day. To prevent the vulnerability and its types are social, environmental, cognitive, military attacks in the network are classified using CRNN model.  We used ensemble learning methods in machine learning algorithms are used to detect and prevent the malicious packets in the network. Our model detects the unauthorized users intruding into any network and alerts the organization regarding the same. When a typical firewall is unable to effectively stop certain sorts of attacks on computer system usage and network communications, a network intrusion detection system may be used. First, we are classifying the unauthorized packets using machine learning algorithm. Using our concept, we have used neural networks in this paper to detect any such attack. For the Network Security Laboratory - Knowledge Discovery in Databases data set using CNN and RNN algorithms, we also applied a few well-known techniques as boosting and pasting methods. In this CRNN approach, we demonstrate that neural networks are more effective than other methods at detecting attacks.

Keywords :

Neural networks; supervised learning; Network Security Laboratory - Knowledge Discovery in Databases; SVM and Random Forest; CRNN- convolutional and recurrent neural network.

References :

[1]     Dr. Satya Sandeep Kanumalli, Lavanya K, Rajeswari A, Samyuktha P and Tejaswi M (2023). A Scalable Network Intrusion Detection System using Bi-LSTM and CNN. https://doi.org/10.1109/icais56108.2023.10073719.

[2]     Imrana, Y., Xiang, Y., Ali, L., & Abdul-Rauf, Z. (2021). A bidirectional LSTM deep learning approach for intrusion detection. Expert Systems with Applications, 185, 115524.

[3]     Yoo, J., Min, B., Kim, S., Shin, D., & Shin, D. (2021). Study on network intrusion detection method using discrete pre-processing method and convolution neural network. IEEE Access, 9, 142348-142361.

[4]     Jang, S., & Son, Y. (2019, October). Empirical evaluation of activation functions and kernel initializers on deep reinforcement learning. In 2019 International Conference on Information and Communication Technology Convergence (ICTC) (pp. 1140-1142). IEEE.

[5]     Mohammadpour, L., Ling, T. C., Liew, C. S., & Aryanfar, A. (2022). A survey of CNN-based network intrusion detection. Applied Sciences, 12(16), 8162.

[6]     Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017, September). Applying convolutional neural network for network intrusion detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1222-1228). IEEE.

[7]     Hajisalem, V., & Babaie, S. (2018). A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Computer Networks, 136, 37-50.

[8]     Hajisalem, V.; Babaie, S. A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection.Comput.Netw. 2018, 136, 37–50.

[9]     Mustafa, M., 2021. The Technology of Mobile Banking and Its Impact on the Financial Growth during the Covid-19 Pandemic in the Gulf Region. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(9), pp.389-398.

[10]   Balakrishnan, C.; Ambeth Kumar, V.D. IoT-Enabled Classification of Echocardiogram Images for Cardiovascular Disease Risk Prediction with Pre-Trained Recurrent Convolutional Neural Networks. Diagnostics 2023, 13, 775. https://doi.org/10.3390/diagnostics13040775

[11]   UNB-ISCX: NSL KDD Dataset. http://www.unb.ca/research/iscx/ dataset/iscx-NSL-KDD-dataset.html (2009).

[12]    Salama, M.A., Eid, H.F., Ramadan, R.A., Darwish, A., Hassanien, A.E.: Hybrid intelligent intrusion detection scheme. In: GasparCunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds.) Soft Computing in Industrial Applications. Advances in Intelligent and Soft Computing, vol. 96, pp. 293–303. Springer, Berlin (2011).

[13]     Y. P. Zhou and J. A. Fang, "Intrusion detection model based on hierarchical fuzzy inference system,"    in 2009 2nd International Conference on Information and Computing Science, ICIC 2009.

[14]   Mohammad Hammoudeh, Saeed M. Aljaberi, Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment, Journal of Cybersecurity and Information Management, Vol. 8 , No. 1 , (2021) : 17-25 (Doi   :  https://doi.org/10.54216/JCIM.080102).

[15]   Sowmya G, Navya K, Divya Jyothi G. “Machine learning and mining for social media analytics”. Advances in Intelligent Systems and Computing 978- 981(2019).

[16]   Gupta, B.B., Tewari, A., Jain, A.K. et al. Fighting against phishing attacks: state of the art and future challenges. Neural Computation & Application 28,3629–3654(2017). https://doi.org/10.1007/s00521-016-2275.

[17]   S. Mohammadi, H. Mirvaziri, and M. Ghazizadeh-Ahsaee, ‘‘Multivariate correlation coefficient and mutual information-based feature selection in intrusion detection,’’ Inf. Secur. J. Global Perspective, vol. 26, no. 5, pp. 229–239, Sep. 2017.

[18]   Madhu, G., Kautish, S., Alnowibet, K. A., Zawbaa, H. M., & Mohamed, A. W. (2023). NIPUNA: A Novel Optimizer Activation Function for Deep Neural Networks. Axioms, 12(3), 246.

[19]   S. Hemamalini ,V. D. Ambeth Kumar ,R. Venkatesan,S. Malathi. "Relevance Mapping based CNN model with OSR-FCA Technique for Multi-label DR Classification." Fusion: Practice and Applications, Vol. 11, No. 2, 2023 ,PP. 90-110

[20]   C. S. Manigandaa,V. D. Ambeth Kumar,G. Ragunath,R. Venkatesan,N. Senthil Kumar. "De-Noising and Segmentation of Medical Images using Neutrophilic Sets." Fusion: Practice and Applications, Vol. 11, No. 2, 2023 ,PP. 111-123.

[21]   Qusay Abboodi Ali,Noor M. Sahab. "Interactive Design of a Virtual Classroom Simulation Model Based on Multimedia Applications to Improve the Teaching and Learning Process in the Tikrit University Environment." Fusion: Practice and Applications, Vol. 12, No. 2, 2023 ,PP. 206-216

[22]   V. Sathya Preiya,V. D. Ambeth Kumar,R. Vijay,Vijay K.,N. Kirubakaran. "Blockchain-Based E-Voting System with Face Recognition." Fusion: Practice and Applications, Vol. 12, No. 1, 2023 ,PP. 53-63

[23]   Hamza M. Ridha Al-Khafaji ,Refed Adnan Jaleel. "Design of High-Performance Intelligent WSN based-IoT using Time Synchronized Channel Hopping and Spatial Correlation Model." Fusion: Practice and Applications, Vol. 13, No. 1, 2023 ,PP. 49-58


Cite this Article as :
Style #
MLA Manjunath H., Saravana Kumar. "Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset." Fusion: Practice and Applications, Vol. 13, No. 1, 2023 ,PP. 117-125 (Doi   :  https://doi.org/10.54216/FPA.130109)
APA Manjunath H., Saravana Kumar. (2023). Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset. Journal of Fusion: Practice and Applications, 13 ( 1 ), 117-125 (Doi   :  https://doi.org/10.54216/FPA.130109)
Chicago Manjunath H., Saravana Kumar. "Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset." Journal of Fusion: Practice and Applications, 13 no. 1 (2023): 117-125 (Doi   :  https://doi.org/10.54216/FPA.130109)
Harvard Manjunath H., Saravana Kumar. (2023). Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset. Journal of Fusion: Practice and Applications, 13 ( 1 ), 117-125 (Doi   :  https://doi.org/10.54216/FPA.130109)
Vancouver Manjunath H., Saravana Kumar. Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset. Journal of Fusion: Practice and Applications, (2023); 13 ( 1 ): 117-125 (Doi   :  https://doi.org/10.54216/FPA.130109)
IEEE Manjunath H., Saravana Kumar, Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset, Journal of Fusion: Practice and Applications, Vol. 13 , No. 1 , (2023) : 117-125 (Doi   :  https://doi.org/10.54216/FPA.130109)