Abstract
Intrusion detection system or abbreviated as IDS is an important security system that is used to protect advanced networks used for communication from dangerous threats. These kinds of systems were strategically created to recognize specific rule violations, patterns and signatures. Many great alternatives have been provided by consistent use of machine learning, deep learning algorithms in the subject of network intrusion detection. We can characterize between anomalous and normal behavioral patterns. In this paper, we have done a comparative analysis of our proposed deep learning model with various ML classifiers: Random Forest, Naive Bayesian, Gradient Boosting, Support Vector Machine, Decision Tree, and Logistic Regression. We used Accuracy, Precision and Recall as evaluation metrics for our models. We run our model on various datasets: CICIDS2018, CICIDS2017, UNSW-NB15, NSL-KDD, KDD99 to verify that our model not only identifies particular attacks but performs well on all types of attacks in various datasets. We also draw attention towards a lack of datasets representing the current modern world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yadav R, Phalguni P, Saraswat S (2020) Comparative study of datasets used in cyber security intrusion detection. Int J Sci Res Comput Sci Eng Inf Technol. 302–312. 10.32628/CSEIT2063103
Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl -Based Syst 136:130–139, Nov 2017. https://doi.org/10.1016/j.knosys.2017.09.014
Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184. https://doi.org/10.1016/j.asoc.2014.01.028
Janarthanan T, Zargari S (2017) IEEE 26th international symposium on industrial electronics (ISIE). IEEE 2017:1881–1886
Zine Boukhamla Akram (2021) CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed. Int J Inf Comput Secur 16:20–32. https://doi.org/10.1504/IJICS.2021.10039325
Lin P, Ye K, Xu CZ (2019) Dynamic network anomaly detection system by using deep learning techniques. Cloud Comput CLOUD 2019, 11513:161–176, LNCS
Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Proc Comput Sci 89:213–217. https://doi.org/10.1016/j.procs.2016.06.047.Jan
Elbasiony RM, Sallam EA, Eltobely TE, Fahmy MM (2013) A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng J 4(4):753–762. https://doi.org/10.1016/j.asej.2013.01.003
Zong W, Chow Y-W, Susilo W (2018) A two-stage classifier approach for network intrusion detection. In: International conference on information security practice and experience. Springer, Berlin. pp 329–340
Stolfo SJ, Fan W, Lee W, Prodromidis A, Chan PK (2000) Costbased modeling for fraud and intrusion detection: results from the jam project. Discex, 02:1130
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD cup 99 data set. In: Proceedings of the second IEEE international conference on computational intelligence for security and defense applications, IEEE Press, Piscataway, NJ, USA, CISDA’09, pp 53–58. http://portal.acm.org/citation.cfm?id=1736481.1736489
Moustafa N, Slay J (2015) Military communications and information systems conference (MilCIS). Canberra, ACT, Australia 2015:1–6. https://doi.org/10.1109/MilCIS.2015.7348942
Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In 4th international conference on information systems security and privacy (ICISSP), Portugal, Jan 2018
Rumelhart DE, Hinton GE, Williams RJ (1986) Learning representations by back-propagating errors. Nature 323(6088):533–536
Dubey SR, Singh SK, Chaudhuri BB (2022) Activation functions in deep learning: a comprehensive survey and benchmark. Neurocomputing
Srivastava Y, Murali V, Dubey SR (2019) A performance evaluation of loss functions for deep face recognition. In: National conference on computer vision, pattern recognition, image processing, and graphics. Springer, Berlin, pp 322–332
Ruder S (2016) An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747
Jia Y, Wang M, Wang Y (2019) Network intrusion detection algorithm based on deep neural network. IET Inf Secur 13: 48–53. https://doi.org/10.1049/iet-ifs.2018.5258
Qazi Emad-ul-Haq, Imran Muhammad, Haider Noman, Shoaib Muhammad, Razzak Imran (2022) An intelligent and efficient network intrusion detection system using deep learning. Comput Electr Eng 99:107764. https://doi.org/10.1016/j.compeleceng.2022.107764
Kim J, Shin N, Jo S, Kim S (2017) Method of intrusion detection using deep neural network. 313–316. https://doi.org/10.1109/BIGCOMP.2017.7881684
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jha, H., Khanna, M., Jhawar, H., Jindal, R. (2023). Performance Analysis of Deep Neural Network for Intrusion Detection Systems. In: Choudrie, J., Mahalle, P.N., Perumal, T., Joshi, A. (eds) ICT with Intelligent Applications. ICTIS 2023. Lecture Notes in Networks and Systems, vol 719. Springer, Singapore. https://doi.org/10.1007/978-981-99-3758-5_41
Download citation
DOI: https://doi.org/10.1007/978-981-99-3758-5_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3757-8
Online ISBN: 978-981-99-3758-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)