Volume 17 , Issue 1 , PP: 67-77, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Amrita Bhatnagar 1 , Arun Giri 2 , Aditi Sharma 3 *
Doi: https://doi.org/10.54216/FPA.170105
A network Intrusion detection system is a system that can find out different types of attacks. ANIDS is used to find out the noble type of attack by using machine learning and deep learning techniques. These techniques are very useful to find out those attacks whose patterns are not stored in the database. Therefore, these types of systems need more research to improve their accuracy and reduce the false alarm rate. In this paper, we are going to propose an ensemble framework for NIDS using different ML and DL techniques. In this paper, we have used the XGBOOST algorithm for feature extraction and for classification, CNN and RNN deep learning techniques are used. This ensemble model is used for the binary and multiclassification of attacks. Our model was checked on the dataset CICIDS-2018 which gives a better accuracy and low false alarm rate.
Network Intrusion detection system , Denial of service attack , CNN , RNN , XGOBoost
[1] Manimaran, A., Chandramohan, D., Shrinivas, S., & Arulkumar, N. (2020). A comprehensive novel model for network speech anomaly detection system using deep learning approach. International Journal of Speech Technology, 23, 305-313. https://doi.org/10.1007/s10772-020-09693-z.
[2] Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2. https://doi.org/10.1186/s42400-019-0038-7.
[3] Rawat, W., & Wang, Z. (2017). Deep Convolutional Neural Networks for Image Classification: A Comprehensive Review. Neural Computation, 29, 2352-2449. https://doi.org/10.1162/neco_a_00990.
[4] Leevy, J., & Khoshgoftaar, T. (2020). A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 Big Data. J. Big Data, 7, 104. https://doi.org/10.1186/s40537-020-00382-x.
[5] Mohammed, Mohssen. , Abdalla, Mohamed. , Elhoseny, Mohamed. Detecting Zero-day Polymorphic Worms Using Honeywall. Journal of Journal of Cybersecurity and Information Management, vol. 15, no. 1, 2025, pp. 34-49. DOI: https://doi.org/10.54216/JCIM.150104
[6] Gopalakrishnan, Mahalakshmi & Elangovan, Uma & M, Aroosiya & M, Vinitha. (2021). Intrusion Detection System Using Convolutional Neural Network on UNSW NB15 Dataset. 10.3233/APC210116.
[7] Kottapalle, Prasanna. (2020). A CNN-LSTM Model for Intrusion Detection System from High Dimensional Data. 10. 1362-1370. 10.5281/zenodo.7911821.
[8] Shreeya Jain, Pranav M. Pawar, Raja Muthalagu,Hybrid intelligent intrusion detection system for internet of things,Telematics and Informatics Reports,Volume 8,2022,100030,ISSN 2772-5030, https://doi.org/10.1016/j.teler.2022.100030.
[9] Arun Kumar Silivery, Ram Mohan Rao Kovvur, Ramana Solleti, LK Suresh Kumar, Bhukya Madhu,A model for multi-attack classification to improve intrusion detection performance using deep learning approaches, Measurement: Sensors, Volume 30,2023,100924,ISSN 2665-9174, https://doi.org/10.1016/j.measen.2023.100924.
[10] Pritom Biswas Udas, Md. Ebtidaul Karim, Kowshik Sankar Roy,SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks,Journal of King Saud University - Computer and Information Sciences,Volume 34, Issue 10, Part B,2022, Pages 10246-10272,ISSN 1319-1578, https://doi.org/10.1016/j.jksuci.2022.10.019.
[11] Bhatnagar, Amrita. , Giri, Arun. , Sharma, Aditi. A Hybrid Intrusion Detection Approach for Cyber Attacks. Journal of Journal of Cybersecurity and Information Management, vol. 13, no. 2, 2024, pp. 08-18. DOI: https://doi.org/10.54216/JCIM.130201
[12] B., Jorge. , Mauricio, Kevin. , Marks, Adam. Fusion of Forensic Analysis of Mobile Devices: Integrating Multi-Criteria Decision Methods and Case Study Insights. Journal of Fusion: Practice and Applications, vol. 16, no. 2, 2024, pp. 32-42. DOI: https://doi.org/10.54216/FPA.160203
[13] Boukhalfa, A., Abdellaoui, A., Hmina, N., & Chaoui, H. (2019) LSTM deep learning method for network intrusion detection system. International Journal of Electrical and Computer Engineering (IJECE). https://doi.org/10.36478/jeasci.2020.227.232.
[14] Laghrissi, F., Douzi, S., Douzi, K., & Hssina, B. (2021). Intrusion detection systems using long short-term memory (LSTM). Journal of Big Data, 8(1), 65. https://doi.org/10.1186/s40537‑021‑00448‑4
[15] Dixit, Ashish. , P., R.. , K., B.. , Sharma, Aditi. Safeguarding Digital Essence: A Sub-band DCT Neural Watermarking Paradigm Leveraging GRNN and CNN for Unyielding Image Protection and Identification. Journal of Journal of Intelligent Systems and Internet of Things, vol. 10, no. 1, 2023, pp. 33-47. DOI: https://doi.org/10.54216/JISIoT.100103
[16] Fu, Yanfang & Du, Yishuai & Cao, Zijian & Li, Qiang & Xiang, Wei. (2022). A Deep Learning Model for Network Intrusion Detection with Imbalanced Data. Electronics. 11. 898. 10.3390/electronics11060898.
[17] Aldallal A. Toward Efficient Intrusion Detection System Using Hybrid Deep Learning Approach. Symmetry.. 2022; 14(9):1916 https://doi.org/10.3390/sym14091916
[18] C. Yin, Y. Zhu, J. Fei, and X. He, "A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks," in IEEE Access, vol-5.pp. 21954-21961, 2017, doi: 10.1109/ACCESS.2017.2762418.
[19] Samha, A.K., Malik, N., Sharma, D. et al. Intrusion Detection System Using Hybrid Convolutional Neural Network. Mobile Netw Appl (2023). https://doi.org/10.1007/s11036-023-02223-6
[20] J. K. Samriya, C. Chakraborty, A. Sharma, M. Kumar and S. K. Ramakuri, "Adversarial ML-Based Secured Cloud Architecture for Consumer Internet of Things of Smart Healthcare," in IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 2058-2065, Feb. 2024, doi: 10.1109/TCE.2023.3341696.
[21] X. Zhang, J. Ran and J. Mi, "An Intrusion Detection System Based on Convolutional Neural Network for Imbalanced Network Traffic," 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT), Dalian, China, 2019, pp. 456-460, doi: 10.1109/ICCSNT47585.2019.8962490.
[22] G. Sonowal, A. Sharma and L. Kharb, "Spear-phishing emails verification method based on verifiable secret sharing scheme", Journal of Information Assurance & Security, vol. 16, no. 3, pp. 117-124, 2021.
[23] Vanlalruata Hnamte, Jamal Hussain, Dependable intrusion detection system using deep convolutional neural network: A Novel framework and performance evaluation approach,Telematics and Informatics , Reports,Volume 11,2023,100077,ISSN 2772-5030 https://doi.org/10.1016/j.teler.2023.100077.
[24] Anand, Nishant. , Parwekar, Pritee. , Sharma, Aditi. Optimized LoRaWAN Architectures: Enhancing Energy Efficiency and Long-Range Connectivity in IoT Networks for Sustainable, Low-Power Solutions and Future Integrations with Edge Computing and 5G. Journal of Journal of Intelligent Systems and Internet of Things, vol. 13, no. 2, 2024, pp. 78-90. DOI: https://doi.org/10.54216/JISIoT.130206
[25] L. Heng and T. Weise, "Intrusion Detection System Using Convolutional Neuronal Networks: A Cognitive Computing Approach For Anomaly Detection based on Deep Learning," 2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), Milan, Italy, 2019, pp. 34-40, doi:10.1109/ICCICC46617.2019.9146088.
[26] Sydney Mambwe Kasongo,A deep learning technique for intrusion detection system using a Recurrent Neural Networks-based framework Computer Communications, Volume 199,2023, Pages 113-125, ISSN 0140-3664, https://doi.org/10.1016/j.comcom.2022.12.010.
[27] Halbouni, A., Gunawan, T. S., Habaebi, M. H., Halbouni, M., Kartiwi, M., & Ahmad, R. (2022). CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access, 10, 99837-99849.