Volume 14 , Issue 1 , PP: 278-292, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Israa Ali Al-Neami 1 * , Zaynab Saeed Hameed 2 , Zahraa Abbas Al-zubaydi 3
Doi: https://doi.org/10.54216/JISIoT.140122
The rapidly evolving landscape of cyber threats demands robust and adaptive Intrusion Detection Systems (IDS) capable of real-time operation. This paper presents a novel approach to augmenting Field-Programmable Gate Arrays (FPGA) for the development of a high-performance IDS designed to enhance communication security by rapidly and accurately identifying threats. The proposed system integrates advanced techniques, including Meta Ensemble Learning (MEL), Extreme Gradient Boosting (XGBoost), and a Hybrid Deep Learning (HDL) model that combines Long Short-Term Memory (LSTM) networks for temporal analysis and Convolutional Neural Networks (CNN) for feature extraction. This synergistic approach significantly reduces detection latency and improves the accuracy of threat identification. The effectiveness of the FPGA-based IDS is evaluated using four widely recognized datasets—NSL-KDD, IoTID20, CICIDS2017, and UNSW NB15—all of which focus on communication attacks, making them ideal for testing IDS performance in diverse IoT environments. The results demonstrate that the proposed IDS not only achieves a high detection rate with a low false positive rate but also operates efficiently in real-time settings, underscoring its viability as a critical security solution in data communication networks. Moreover, the system's exceptional performance in securing IoT devices, which are frequently targeted due to their ubiquity and vulnerabilities, highlights its potential as a reliable and scalable security measure. The FPGA-based IDS offers a significant contribution to the field by providing a rapid, accurate, and real-time security solution that addresses the pressing need for effective threat detection and prevention in modern communication networks.
Machine Learning , Network , Security , Data communication , Intrusion detection
[1] Mikhail DY, Hawezi RS, Kareem SW. An Ensemble Transfer Learning Model for Detecting Stego Images. Appl Sci 2023;13:7021. https://doi.org/10.3390/app13127021.
[2] Nandanwar H, Katarya R. Deep learning enabled intrusion detection system for Industrial IOT environment. Expert Syst Appl 2024;249:123808. https://doi.org/10.1016/j.eswa.2024.123808.
[3] Khalid Yousif M, Dallalbashi ZE, Kareem SW. Information security for big data using the NTRUEncrypt method. Meas Sensors 2023;27:100738. https://doi.org/10.1016/j.measen.2023.100738.
[4] Salih AA, Abdulazeez AM. Evaluation of classification algorithms for intrusion detection system: A review. J Soft Comput Data Min 2021;2:31–40.
[5] Awla HQ, Rahman Mirza A, Kareem SW. An Automated CAPTCHA for Website Protection Based on User Behavioral Model. 2022 8th Int Eng Conf Sustain Technol Dev 2022. https://doi.org/10.1109/iec54822.2022.9807472.
[6] Sai Chaitanya Kumar G, Kiran Kumar R, Parish Venkata Kumar K, Raghavendra Sai N, Brahmaiah M. Deep residual convolutional neural Network: An efficient technique for intrusion detection system. Expert Syst Appl 2024;238:121912. https://doi.org/10.1016/j.eswa.2023.121912.
[7] A New Efficient Method for Information Security in Hadoop. Qalaai Zanist Sci J 2022;7. https://doi.org/10.25212/lfu.qzj.7.2.42.
[8] Almukhtar F, Mahmoodd N, Kareem S. Search engine optimization: a review. Appl Comput Sci 2021;17.
[9] Yousif RZ, Kareem SW, Abdalwahid SM. Enhancing Approach for Information Security in Hadoop. Polytech J 2020;10:81–7. https://doi.org/10.25156/ptj.v10n1y2020.pp81-87.
[10] Ullah F, Ullah S, Srivastava G, Lin JC-W. IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digit Commun Networks 2024;10:190–204. https://doi.org/10.1016/j.dcan.2023.03.008.
[11] Turukmane A V, Devendiran R. M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. Comput & Secur 2024;137:103587. https://doi.org/10.1016/j.cose.2023.103587.
[12] Sadia H, Farhan S, Haq YU, Sana R, Mahmood T, Bahaj SAO, et al. Intrusion Detection System for Wireless Sensor Networks: A Machine Learning Based Approach. IEEE Access 2024;12:52565–82. https://doi.org/10.1109/access.2024.3380014.
[13] Zorarpaci E. A fast intrusion detection system based on swift wrapper feature selection and speedy ensemble classifier. Eng Appl Artif Intell 2024;133:108162. https://doi.org/10.1016/j.engappai.2024.108162.
[14] Yaras S, Dener M. IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm. Electronics 2024;13:1053. https://doi.org/10.3390/electronics13061053.
[15] Devendiran R, Turukmane A V. Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst Appl 2024;245:123027. https://doi.org/10.1016/j.eswa.2023.123027.
[16] Saleh HM, Marouane H, Fakhfakh A. Stochastic Gradient Descent Intrusions Detection for Wireless Sensor Network Attack Detection System Using Machine Learning. IEEE Access 2024;12:3825–36. https://doi.org/10.1109/access.2023.3349248.
[17] Roshan K, Zafar A, Ul Haque SB. Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system. Comput Commun 2024;218:97–113. https://doi.org/10.1016/j.comcom.2023.09.030.
[18] Zidi K, Ben Abdellafou K, Aljuhani A, Taouali O, Harkat MF. Novel intrusion detection system based on a downsized kernel method for cybersecurity in smart agriculture. Eng Appl Artif Intell 2024;133:108579. https://doi.org/10.1016/j.engappai.2024.108579.
[19] Tlili F, Ayed S, Chaari Fourati L. Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS). Comput & Secur 2024;142:103878. https://doi.org/10.1016/j.cose.2024.103878.
[20] Chen X, Qiu W, Chen L, Ma Y, Ma J. Fast and practical intrusion detection system based on federated learning for VANET. Comput & Secur 2024;142:103881. https://doi.org/10.1016/j.cose.2024.103881.
[21] Song J, Qin G, Liang Y, Yan J, Sun M. SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN. Comput Secur 2024;142:103847.
[22] Ashiku L, Dagli C. Network intrusion detection system using deep learning. Procedia Comput Sci 2021;185:239–47.
[23] Dutt I, Borah S, Maitra IK. Immune system based intrusion detection system (IS-IDS): A proposed model. IEEE Access 2020;8:34929–41.
[24] Thamilarasu G, Odesile A, Hoang A. An intrusion detection system for internet of medical things. IEEE Access 2020;8:181560–76.
[25] Sarhan M, Layeghy S, Portmann M. Towards a standard feature set for network intrusion detection system datasets. Mob Networks Appl 2022:1–14.
[26] Mebawondu JO, Alowolodu OD, Mebawondu JO, Adetunmbi AO. Network intrusion detection system using supervised learning paradigm. Sci African 2020;9:e00497.
[27] Khan MA. HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system. Processes 2021;9:834.
[28] Amouri A, Alaparthy VT, Morgera SD. A machine learning based intrusion detection system for mobile Internet of Things. Sensors 2020;20:461.
[29] Mushtaq E, Zameer A, Umer M, Abbasi AA. A two-stage intrusion detection system with auto-encoder and LSTMs. Appl Soft Comput 2022;121:108768.
[30] Hnamte V, Hussain J. DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system. Telemat Informatics Reports 2023;10:100053.
[31] Thirimanne SP, Jayawardana L, Yasakethu L, Liyanaarachchi P, Hewage C. Deep neural network based real-time intrusion detection system. SN Comput Sci 2022;3:145.
[32] Ullah S, Ahmad J, Khan MA, Alkhammash EH, Hadjouni M, Ghadi YY, et al. A new intrusion detection system for the internet of things via deep convolutional neural network and feature engineering. Sensors 2022;22:3607.
[33] Martikkala A, David J, Lobov A, Lanz M, Ituarte IF. Trends for low-cost and open-source IoT solutions development for industry 4.0. Procedia Manuf 2021;55:298–305.
[34] Nižetić S, Šolić P, Gonzalez-De DL-I, Patrono L. Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. J Clean Prod 2020;274:122877.
[35] Rymarczyk J. Technologies, opportunities and challenges of the industrial revolution 4.0: theoretical considerations. Entrep Bus Econ Rev 2020;8:185–98.
[36] Pal S, Jadidi Z. Analysis of security issues and countermeasures for the industrial internet of things. Appl Sci 2021;11:9393.
[37] Aziz Al Kabir M, Elmedany W, Sharif MS. Securing IOT devices against emerging security threats: Challenges and mitigation techniques. J Cyber Secur Technol 2023;7:199–223.
[38] Ahmetoglu H, Das R. A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions. Internet of Things 2022;20:100615.
[39] Tariq U, Ahmed I, Bashir AK, Shaukat K. A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review. Sensors 2023;23:4117.
[40] Alladi T, Chamola V, Zeadally S. Industrial control systems: Cyberattack trends and countermeasures. Comput Commun 2020;155:1–8.
[41] Injadat M, Moubayed A, Nassif AB, Shami A. Machine learning towards intelligent systems: applications, challenges, and opportunities. Artif Intell Rev 2021;54:3299–348.