Fast and Effective Intrusion Detection Using Multi-Layered Deep Learning Networks

Fast and Effective Intrusion Detection Using Multi-Layered Deep Learning Networks

P. Chellammal, Sheba Kezia Malarchelvi, K. Reka, G. Raja
Copyright: © 2022 |Pages: 16
DOI: 10.4018/IJWSR.310057
Article PDF Download
Open access articles are freely available for download

Abstract

The process of intrusion detection usually involves identifying complex intrusion signatures from a huge repository. This requires a complex model that can identify these signatures. This work presents a deep learning based neural network model that can perform effective intrusion detection on network transmission data. The proposed multi-layered deep learning network is composed of multiple hidden processing layers in the network that makes it a deep learning network. Detection using the deep network was observed to exhibit effective performances in detecting the intrusion signatures. Experiments were performed on standard benchmark datasets like KDD CUP 99, NSL-KDD, and Koyoto 2006+ datasets. Comparisons were performed with state-of-the-art models in literature, and the results and comparisons indicate high performances by the proposed algorithm.
Article Preview
Top

Introduction

These adoption levels and the high e-commerce transactions happening via networks has also resulted in the increase in large number of cybercrimes in this domain. The monetary losses due to cybercrime are shown in Figure 1. It could be observed that the amount lost worldwide due to cybercrime is 1,418 million dollars. Cybercrime rates of countries are shown in Figure 2. It could be observed that USA, China, Germany occupies the top 3 slots followed closely. India ranks 11th exhibiting about 3% of the overall global crime rates. This shows the increasing necessity for intrusion detection models to provide improved security to online users. This mandates the use of better intrusion detection systems and exhibits the lack of efficiency in the existing intrusion detection systems.

Intrusion detection systems are required to handle data that are inconsistent and varying. Concept drift is a one major issue that affects the domain of network intrusion detection to a large extent. Data in a domain is considered to be affected by concept drift if the distribution of the domain data varies with time. Models trained using static data tend to get affected by concept drift to a large extent. Such models become obsolete after a period of time, as most of the trained signatures become invalid after a considerable period. Hence IDS systems that are being developed should be enabled with a continuous training mechanism that operates to update the intrusion and normal signatures keeping the system up-to-date.

IDS models have several applications and requirements in the industry scenarios. A major application is the process of intrusion detection in personal systems, or in other words distributed scenarios. Current operating systems have intrusion detection mechanisms inbuilt into their architecture. However, the handling capabilities of these systems are still in question. Hence most users tend to use commercial intrusion detection models for added security. Further, IDS for clustered environments that can be used in servers are also in demand. Several commercial IDS are available, which includes Bro intrusion detection system by Vern Paxson from Lawrence Berkeley National Labs and the International Computer Science Institute, Prelude intrusion detection system for Linux, distributed under GNU, Snort intrusion detection system, Network Protocol Analyzer, Multi Router Traffic Grapher (MRTG), etc. IDS models have several applications and requirements in the industry scenarios. A major application is the process of intrusion detection in personal systems, or in other words distributed scenarios. Current operating systems have intrusion detection mechanisms inbuilt into their architecture. However, the handling capabilities of these systems are still in question. Hence most users tend to use commercial intrusion detection models for added security. Further, IDS for clustered environments that can be used in servers are also in demand. Several commercial IDS are available, which includes Bro intrusion detection system by Vern Paxson from Lawrence Berkeley National Labs and the International Computer Science Institute, Prelude intrusion detection system for Linux, distributed under GNU, Snort intrusion detection system, Network Protocol Analyzer, Multi Router Traffic Grapher (MRTG), etc.

Intrusion detection is the process of analysing the network packets to identify if the packet is legitimate or anomalous. The major challenges involved in this domain includes the huge volume of data for training and the fast and streaming data that is to be provided for the prediction process. Further, the intrinsic data imbalance contained in the domain presents more challenges to the intrusion detection model. This work presents three major contributions for effective intrusion detection in the network domain.

Figure 1.

Monetary damage due to cybercrime

IJWSR.310057.f01
Figure 2.

Country wise cybercrime percentages

IJWSR.310057.f02

Complete Article List

Search this Journal:
Reset
Volume 21: 1 Issue (2024)
Volume 20: 1 Issue (2023)
Volume 19: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 18: 4 Issues (2021)
Volume 17: 4 Issues (2020)
Volume 16: 4 Issues (2019)
Volume 15: 4 Issues (2018)
Volume 14: 4 Issues (2017)
Volume 13: 4 Issues (2016)
Volume 12: 4 Issues (2015)
Volume 11: 4 Issues (2014)
Volume 10: 4 Issues (2013)
Volume 9: 4 Issues (2012)
Volume 8: 4 Issues (2011)
Volume 7: 4 Issues (2010)
Volume 6: 4 Issues (2009)
Volume 5: 4 Issues (2008)
Volume 4: 4 Issues (2007)
Volume 3: 4 Issues (2006)
Volume 2: 4 Issues (2005)
Volume 1: 4 Issues (2004)
View Complete Journal Contents Listing