Skip to main content

Comparative Study on Different Intrusion Detection Datasets Using Machine Learning and Deep Learning Algorithms

  • Conference paper
  • First Online:
Big Data and Cloud Computing (ICBCC 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1021))

Included in the following conference series:

  • 255 Accesses

Abstract

The tremendous growth in the Internet of Things (IoT) creates great potential which provides us with incredible productivity and simplified our daily lives. But, due to resource constraints and computation, IoT networks are vulnerable to a variety of malicious activities. Thus, protecting the network from hostile attacks should be the top priority. This can be done by planning and implementing effective security measures, one of them is an intrusion detection system. It detects harmful activities on the network and monitors network traffic based on that detection. The aim of the intrusion detection system (IDS) is to afford various approaches for detecting the rapidly growing network attacks, as well as to stop the harmful activities that occur in the IoT devices. Various artificial intelligence methods were evaluated and concluded on various datasets, including BoT-IoT, IoT-23, UNSW-NB15, CSE-CIC-IDS2018, and MQTT-IOT-IDS2020, in search of a suitable algorithm that can easily learn the pattern of network attack activities. The feature extraction and pre-processing data were then fed into IDS as data to train the model for future anomaly detection, prediction, and analysis. This study focuses primarily on the various types of cyber-attacks and machine learning algorithms used to identify cyber-attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ullah I, Mahmoud QH (2021) A framework for anomaly detection in IoT networks using conditional generative adversarial networks. IEEE Access 9:165907–165931. https://doi.org/10.1109/ACCESS.2021.3132127

    Article  Google Scholar 

  2. Akhtar MS, Feng T (2021) Deep learning-based framework for the detection of cyberattack using feature engineering. Secur Commun Netw 2021:1–12. https://doi.org/10.1155/2021/6129210

    Article  Google Scholar 

  3. Popoola SI, Adebisi B, Ande R et al (2021) SMOTE-DRNN: a deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 21:2985. https://doi.org/10.3390/s21092985

    Article  Google Scholar 

  4. Sengodan T, Murugappan M, Misra S (2021) Advances in electrical and computer technologies. Springer Singapore, Singapore

    Google Scholar 

  5. Leevy JL, Hancock J, Khoshgoftaar TM, Peterson J (2021) Detecting information theft attacks in the bot-IoT dataset. In: 2021 20th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 807–812

    Google Scholar 

  6. Swarna Sugi SS, Ratna SR (2020) Investigation of machine learning techniques in intrusion detection system for IoT network. In: 2020 3rd international conference on intelligent sustainable systems (ICISS). IEEE, pp 1164–1167

    Google Scholar 

  7. Thamaraiselvi R, Mary SAS (2020) Attack and anomaly detection in IoT networks using machine learning 9:95–103. https://doi.org/10.47760/ijcsmc.2020.v09i10.012

  8. Abdalgawad N, Member S (2022) Generative deep learning to detect cyberattacksfortheIoT-23dDataset.IEEEAccess10:6430–6441. https://doi.org/10.1109/ACCESS.2021.3140015

  9. Alshamkhany M, Alshamkhany W, Mansour M et al (2020) Botnet attack detection using machine learning. In: 2020 14th international conference on innovations in information technology (IIT). IEEE, pp 203–208

    Google Scholar 

  10. Zeeshan M, Riaz Q, Bilal MA et al (2022) Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT data-sets. IEEE Access 10:2269–2283. https://doi.org/10.1109/ACCESS.2021.3137201

    Article  Google Scholar 

  11. Farhan BI, Jasim AD (2022) Performance analysis of intrusion detection for deep learning model based on Performance analysis of intrusion detection for deep learning model based on CSE ‑ CIC ‑ IDS2018 dataset. 1165–1172. https://doi.org/10.11591/ijeecs.v26.i2.pp1165-1172

  12. Dwibedi S, Pujari M, Sun W (2020) A comparative study on contemporary intrusion detection datasets for machine learning research. In: 2020 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 1–6

    Google Scholar 

  13. Oussous A, Benjelloun F-Z, Ait Lahcen A, Belfkih S (2018) Big Data technologies: A survey. J King Saud Univ - Comput Inf Sci 30:431–448. https://doi.org/10.1016/j.jksuci.2017.06.001

  14. Syamsuddin I, Barukab OM (2022) SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks. Electronics 11:737. https://doi.org/10.3390/electronics11050737

    Article  Google Scholar 

  15. Ullah I, Mahmoud QH (2021) Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9:103906–103926. https://doi.org/10.1109/ACCESS.2021.3094024

    Article  Google Scholar 

  16. Idrissi I, Azizi M, Moussaoui O (2022) A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT. Int J Comput Digit Syst 11:209–216. https://doi.org/10.12785/ijcds/110117

  17. Snehi M, Bhandari A (2022) IoT-based DDoS on cyber physical systems: research challenges, datasets and future prospects. In: 2022 IEEE international IOT, electronics and mechatronics conference (IEMTRONICS). IEEE, pp 1–8

    Google Scholar 

  18. Gorbett M, Shirazi H, Ray I (2022) WiP: the intrinsic dimensionality of IoT networks. In: Proceedings of the 27th ACM on symposium on access control models and technologies. ACM, New York, pp 245–250

    Google Scholar 

  19. Maurya S, Kumar S, Garg U, Kumar M (2022) An efficient framework for detection and classification of IoT botnet traffic. ECS Sens Plus 1:026401. https://doi.org/10.1149/2754-2726/ac7abc

    Article  Google Scholar 

  20. Souhail et al M (2019) Network based intrusion detection using the UNSW- NB15dataset.IntJComputDigitSyst8:477–487. https://doi.org/10.12785/ijcds/080505

  21. Zolotukhin M, Hämäläinen T, Kotilainen P (2022) Intelligent solutions for attack mitigation in zero-trust environments, pp 403–417

    Google Scholar 

  22. Karatas G, Demir O, Koray Sahingoz O (2018) Deep learning in intrusion detection systems. In: 2018 international congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT). IEEE, pp 113–116

    Google Scholar 

  23. Barolli L, Terzo O (2018) Complex, intelligent, and software intensive systems. Springer International Publishing, Cham

    Book  Google Scholar 

  24. Thomas L, Bhat S (2021) Machine learning and deep learning techniques for IoT-based intrusion detection systems: a literature review machine learning and deep learning techniques for IoT-based intrusion detection systems: a literature review 6:296–314

    Google Scholar 

  25. Al RM, Javeed D, Khan MT et al (2022) Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework. IEEE Access 10:53015–53026. https://doi.org/10.1109/ACCESS.2022.3172304

    Article  Google Scholar 

  26. Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy. IEEE, pp 305–316

    Google Scholar 

  27. Sagu A, Gill NS (2020) Machine learning techniques for securing IoT environment, pp 977–982. https://doi.org/10.35940/ijitee.D1209.029420

  28. Abdalgawad N, Sajun A, Kaddoura Y et al (2022) Generative deep learning to detect cyberattacks for the IoT-23 dataset. IEEE Access 10:6430–6441. https://doi.org/10.1109/ACCESS.2021.3140015

    Article  Google Scholar 

  29. Douiba M, Benkirane S, Guezzaz A, Azrour M (2022) Anomaly detection model based on gradient boosting and decision tree for IoT environments security. J Reliab Intell Environ. https://doi.org/10.1007/s40860-022-00184-3

    Article  Google Scholar 

  30. Mohamed TS, Aydin S (2021) IoT-based intrusion detection systems: a review. Smart Sci 1–18. https://doi.org/10.1080/23080477.2021.1972914

  31. Sagu A, Gill NS (2020) Machine learning techniques for securing IoT environment. Int J Innov Technol Explor Eng 9:977–982. https://doi.org/10.35940/ijitee.D1209.029420

  32. Yang Z, Liu X, Li T et al (2022) A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 116:102675. https://doi.org/10.1016/j.cose.2022.102675

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Aarthi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aarthi, G., Sharon Priya, S., Aisha Banu, W. (2023). Comparative Study on Different Intrusion Detection Datasets Using Machine Learning and Deep Learning Algorithms. In: Venkataraman, N., Wang, L., Fernando, X., Zobaa, A.F. (eds) Big Data and Cloud Computing. ICBCC 2022. Lecture Notes in Electrical Engineering, vol 1021. Springer, Singapore. https://doi.org/10.1007/978-981-99-1051-9_8

Download citation

Publish with us

Policies and ethics