Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 13 , Issue 2 , PP: 08-18, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

A Hybrid Intrusion Detection Approach for Cyber Attacks

Amrita Bhatnagar 1 , Arun Giri 2 , Aditi Sharma 3 *

  • 1 Dept of Computer Science & Engg. Shobhit Institute of Engg. & Technology Meerut, India - (amritapsaxena@gmail.com)
  • 2 Dept of Computer Science & Engg. Shobhit Institute of Engg. & Technology Meerut, India - (arun.giri@shobhituniversity.ac.in)
  • 3 Dept of Computer Science & Engg. Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India; IEEE, SIT, Pune, India - (aditi.sharma@ieee.org)
  • Doi: https://doi.org/10.54216/JCIM.130201

    Received: July 21, 2023 Revised: November 16, 2023 Accepted: February 02, 2024
    Abstract

    The field of cybersecurity constantly evolves as attackers develop new methods and technologies. Defending against cyberattacks involves a combination of robust security measures, regular updates, user education, and the use of advanced technologies, such as intrusion detection systems and artificial intelligence, to find out the threats in real-time. IDS are designed to identify and address any unauthorized actions or potential security threats within a computer network or system. A hybrid intrusion detection system (IDS) combines many detection techniques and strategies from different IDS types into a single, coherent solution. Combining the benefits of each approach should result in more comprehensive and effective intrusion detection. This paper outlines a proposed anomaly intrusion detection system (AIDS) framework that leverages a hybrid of deep learning strategies. It incorporates Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) models, which were developed using XGBoost, and their efficacy was assessed with the NSL-KDD dataset. The evaluation of the suggested model focused on its accuracy, detection capabilities, and the rate of false positives. The outcomes of this research are noteworthy within the cybersecurity field. In this paper, a framework of an Anomaly IDS is proposed. The purpose of an anomaly IDS, or AIDS, is to spot odd behavior on a network or system that might point to a security breach or malevolent attempt to hack it. Anomaly-based IDSs concentrate on finding departures from accepted typical behavior, in contrast to signature-based detection systems, which depend on a predefined database of known attack patterns.

    Keywords :

    Intrusion , Deep learning , Machine Learning , RNN , LSTM , GRU , XGBoost

    References

    [1] A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges,” Cybersecurity, vol. 2, no. 1, Dec. 2019, doi: 10.1186/s42400-019-0038- 7.

    [2] N. Chakraborty, “INTRUSION DETECTION SYSTEM AND INTRUSION PREVENTION SYSTEM: A COMPARATIVE STUDY,” International Journal of Computing and Business Research.

    [3] A. Choudhary, A. Tripathi, A. Sharma and R. Singh, "Evolution and comparative analysis of different Cloud Access Security Brokers in current era," 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), Uttarakhand, India, 2022, pp. 36-43, doi: 10.1109/ICFIRTP56122.2022.10059416.

    [4] S. Jose, D. Malathi, B. Reddy, and D. Jayaseeli, “A Survey on Anomaly Based Host Intrusion Detection System,” in Journal of Physics: Conference Series, Institute of Physics Publishing, Apr. 2018. doi: 10.1088/1742-6596/1000/1/012049.

    [5] Ahmed Sleem. (2022). Intelligent and Secure Detection of Cyber-attacks in Industrial Internet of Things: A Federated Learning Framework. Journal of Journal of Intelligent Systems and Internet of Things, 7 ( 1 ), 51- 61 (Doi : https://doi.org/10.54216/JISIoT.070105)

    [6] Sharma, A., Goar, V., Kuri, M., Chowdhary, C.L. (2023). Supply Chain Management Using Blockchain Security Enhancement. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-19-9888-1_15

    [7] Li, Z., Rios, A., & Trajković, L. (2021). Machine Learning for Detecting Anomalies and Intrusions in Communication Networks. IEEE Journal on Selected Areas in Communications, 39, 2254-2264. https://doi.org/10.1109/JSAC.2021.3078497.

    [8] V. Gupta, N. Kumar, A. Sharma and A. Abraham, "Sensor Routing Protocol with Optimized Delay and Overheads in Mobile based WSN", Journal of Information Assurance & Security, vol. 16, no. 4, 2021.

    [9] J. Suji Priya, Dr. Aditi Sharma, Dr. S. Gopinath, H. Muthukrishnan, Emmanuel Babu Pukkunnen, Dr. P. Jenopaul, S. Gowdham Kumar. (2021). Block Chain (Binary Relevance Method) Using Machine Learning Technique. Annals of the Romanian Society for Cell Biology, 1537–1548.

    [10] Ferrag, M., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl., 50. https://doi.org/10.1016/j.jisa.2019.102419.

    [11] Liu, H., & Lang, B. (2019). Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Applied Sciences. https://doi.org/10.3390/app9204396.

    [12] Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. (2019). A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection. IEEE Communications Surveys & Tutorials,21,686-728. https://doi.org/10.1109/COMST.2018.2847722.

    [13] A. K. Vashishtha, A. Chauhan and A. Sharma, "Key Spreading and Mutual Validation schemes for Privacy Protection in Fog Computing Environment using MNSOR Protocols", Journal of Information Assurance & Security, vol. 16, no. 4, pp. 148-155, 2021.

    [14] Samanta, S., Sarkar, A., Sharma, A., Geman, O. (2022). Security and Challenges for Blockchain Integrated Fog-Enabled IoT Applications. In: Rout, R.R., Ghosh, S.K., Jana, P.K., Tripathy, A.K., Sahoo, J.P., Li, KC. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 427. Springer, Singapore. https://doi.org/10.1007/978-981-19-1018-0_2

    [15] R. Bhadada and A. Sharma, "Montgomery implantation of ECC over RSA on FPGA for public key cryptography application," 2014 2nd International Conference on Emerging Technology Trends in Electronics, Communication and Networking, Surat, India, 2014, pp. 1-5, doi: 10.1109/ET2ECN.2014.7044973.

    [16] A. Sharma, M. Patel, A. Choudhary and G. Kumar, "Blockchain Based Security Enabled Smart Contract for Energy Management," 2023 16th International Conference on Security of Information and Networks (SIN), Jaipur, India, 2023, pp. 1-7, doi: 10.1109/SIN60469.2023.10474845.

    [17] Srinath Venkatesan, “Design an Intrusion Detection System based on Feature Selection Using ML Algorithms “

    [18] MSEA, vol. 72, no. 1, pp.702–710, Feb. 2023. DOI: https://doi.org/10.17762/msea.v72i1.2000

    [19] Shone, N., Ngọc, T., Phai, V., & Shi, Q. (2018). A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2, 41-50. https://doi.org/10.1109/TETCI.2017.2772792.

    [20] Ashish Dixit, R. P. Aggarwal, B. K. Sharma, Aditi Sharma. (2023). Safeguarding Digital Essence: A Subband DCT Neural Watermarking Paradigm Leveraging GRNN and CNN for Unyielding Image Protection and Identification. Journal of Journal of Intelligent Systems and Internet of Things, 10 ( 1 ), 33-47 (Doi : https://doi.org/10.54216/JISIoT.100103)

    [21] G. Sonowal, A. Sharma and L. Kharb, "Spear-phishing emails verification method based on verifiable secret sharing scheme", Journal of Information Assurance & Security, vol. 16, no. 3, pp. 117-124, 2021.

    [22] Mariam Ibrahim, Ruba Elhafiz, Modeling an intrusion detection using recurrent neural networks, Journal of Engineering Research, Volume 11, Issue1,2023,100013, ISSN 2307- 1877 https://doi.org/10.1016/j.jer.2023.100013.

    Cite This Article As :
    Bhatnagar, Amrita. , Giri, Arun. , Sharma, Aditi. A Hybrid Intrusion Detection Approach for Cyber Attacks. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 08-18. DOI: https://doi.org/10.54216/JCIM.130201
    Bhatnagar, A. Giri, A. Sharma, A. (2024). A Hybrid Intrusion Detection Approach for Cyber Attacks. Journal of Cybersecurity and Information Management, (), 08-18. DOI: https://doi.org/10.54216/JCIM.130201
    Bhatnagar, Amrita. Giri, Arun. Sharma, Aditi. A Hybrid Intrusion Detection Approach for Cyber Attacks. Journal of Cybersecurity and Information Management , no. (2024): 08-18. DOI: https://doi.org/10.54216/JCIM.130201
    Bhatnagar, A. , Giri, A. , Sharma, A. (2024) . A Hybrid Intrusion Detection Approach for Cyber Attacks. Journal of Cybersecurity and Information Management , () , 08-18 . DOI: https://doi.org/10.54216/JCIM.130201
    Bhatnagar A. , Giri A. , Sharma A. [2024]. A Hybrid Intrusion Detection Approach for Cyber Attacks. Journal of Cybersecurity and Information Management. (): 08-18. DOI: https://doi.org/10.54216/JCIM.130201
    Bhatnagar, A. Giri, A. Sharma, A. "A Hybrid Intrusion Detection Approach for Cyber Attacks," Journal of Cybersecurity and Information Management, vol. , no. , pp. 08-18, 2024. DOI: https://doi.org/10.54216/JCIM.130201