A Convolutional Neural Network With Feature Selection-Based Network Intrusion Detection

A Convolutional Neural Network With Feature Selection-Based Network Intrusion Detection

Nassima Chaibi, Baghdad Atmani, Mostéfa Mokaddem
Copyright: © 2022 |Pages: 21
DOI: 10.4018/IJAEC.302014
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This paper attempts to provide a demonstration the importance of the feature selection (FS) in the data mining filed for the optimization. The author’s aim to develop a Convolutional Neural Network (CNN) based Network Intrusion Detection System (NIDS). The CNN was trained using the NSL-KDD dataset. The approach is divided into two methodologies: the first one, is to apply the CNN to the NSL-KDD dataset without FS, in the second methodology: the Information Gain (IG), Grain Ratio (GR) and Correlation Attribute (CA) were applied as FS methods then the CNN is use to classify the intrusion. The performance is proven by comparing our results with other previous works. Our experimentation results show that CNN with FS has a good accuracy 99,72%, true positive rate: 99,29%, false positive rate: 0,18%. Thus, the CNN with FS has outperform the other methods. But the methods use in the FS phase don’t guarantee the use of the best subset or the optimal subset. As future orientation is to develop another method for FS which guarantee the selection of the best and the optimal relevant feature.
Article Preview
Top

Introduction

The Internet has now become an unavoidable part of everyone's life. The Internet is transforming how people learn and work as the Internet and social life become increasingly intertwined, rendering this vast interrelated network vulnerable to a variety of progressively serious security risks. The ability to recognize various network threats, particularly those that have never been seen before, is a critical issue that must be addressed immediately.

The rapid computer and internet technologies development is becoming an attackers’ opportunity to break into network systems, using some of their specific information. Though, an incredible number of attacks were introduced giving rise to network security challenges. Nowadays, network security researchers have introduced fields like cryptography (Belfedhal & Faraoun, 2015; Benaissa et al., 2021), and Intrusion Detection System (IDS) (Chaibi et al., 2020; Denning, 1987).

Cybersecurity appears to be vital in protecting key facilities from attacks and illegal access. Cybersecurity encompasses a wide range of technology and procedures. Some cybersecurity areas include application security, data security, network monitoring, disaster recovery, operational security, end-user education, and so on.

Cyberattacks are an advanced form of warfare that is devoid of weapons but extremely destructive and pernicious, exposing sensitive personal and business information, disrupting crucial tasks, exposing continuous vulnerabilities, and allowing unauthorized access to devices and software, all of which impose high costs on the country's economy. For most reputable firms, cybersecurity is a perennial challenge.

The basic network and machines are protected from unwanted access, damage, dysfunction, and alteration by two types of traditional security systems: network security systems and host security systems. Each of these systems may include a variety of security management components, including as firewalls, intrusion detection systems (IDSs), and antiviruses, which assist monitoring a system or network and send alerts if harmful behaviour is detected. The concept of Intrusion Detection System (IDS) proposed by (Denning, 1987) is useful for detecting, identifying and tracking intruders. (Endorf et al., 2004) proposed a methodology classifying IDS into two categories: signature-based detection and anomaly-based detection. Signature-based detection approaches utilize predetermined signatures of harmful behaviors. As a result, they are only used to identify known attacks. Anomaly detection approaches, on the other hand, describe typical patterns and identify harmful activity based on departures from those patterns. As a result, anomaly-based detection approaches can discover zero-day intrusions. (Buczak & Guven, 2015).

(Dokas et al., 2002; Wu & Yen, 2009) developed data mining methods for IDS. Also, the use of Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL) technologies has sparked a new wave of network security research. The application of neural networks to intrusion detection, in particular, has become a critical issue in current network security technologies (Tavallaee et al., 2009; Ingre & Yadav 2015).

With its complexity and capacity to self-learn, DL enables more accurate and quicker processing. Its success in numerous fields, as well as the limitations of traditional cybersecurity techniques, necessitates more research into the use of DL in security domains. Cybersecurity areas, like as cyberattack detection, can benefit from DL (Tang, 2016; Wang, 2015).

The incapability of robust cybersecurity strategies to deal with the increasing evolution of cyberattacks, the failure to identify new risks, challenges in the analysis process of complex events, and restrictions of efficient virtualization as the quantity of data and attack grow, are the major challenges facing network security solutions in development. The use of DL approaches to solve these issues is the main strategy that researchers are interested in: DDoS attacks detection, behavioral abnormalities detection, malware and protocol detection are just a few examples of how DL approaches can be used to solve cybersecurity problems.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 13: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing