Skip to main content

Performance Analysis of Deep Neural Network for Intrusion Detection Systems

  • Conference paper
  • First Online:
ICT with Intelligent Applications ( ICTIS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 719))

  • 216 Accesses

Abstract

Intrusion detection system or abbreviated as IDS is an important security system that is used to protect advanced networks used for communication from dangerous threats. These kinds of systems were strategically created to recognize specific rule violations, patterns and signatures. Many great alternatives have been provided by consistent use of machine learning, deep learning algorithms in the subject of network intrusion detection. We can characterize between anomalous and normal behavioral patterns. In this paper, we have done a comparative analysis of our proposed deep learning model with various ML classifiers: Random Forest, Naive Bayesian, Gradient Boosting, Support Vector Machine, Decision Tree, and Logistic Regression. We used Accuracy, Precision and Recall as evaluation metrics for our models. We run our model on various datasets: CICIDS2018, CICIDS2017, UNSW-NB15, NSL-KDD, KDD99 to verify that our model not only identifies particular attacks but performs well on all types of attacks in various datasets. We also draw attention towards a lack of datasets representing the current modern world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. https://www.statista.com/statistics/273018/number-of-internet-users-worldwide/#:~:text=As%20of%202022%2C%20the%20estimated,66%20percent%20of%20global%20population

  2. https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/#:~:text=The%20total%20installed%20base%20of,that%20are%20expected%20in%202021

  3. Yadav R, Phalguni P, Saraswat S (2020) Comparative study of datasets used in cyber security intrusion detection. Int J Sci Res Comput Sci Eng Inf Technol. 302–312. 10.32628/CSEIT2063103

    Google Scholar 

  4. Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl -Based Syst 136:130–139, Nov 2017. https://doi.org/10.1016/j.knosys.2017.09.014

  5. Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184. https://doi.org/10.1016/j.asoc.2014.01.028

  6. Janarthanan T, Zargari S (2017) IEEE 26th international symposium on industrial electronics (ISIE). IEEE 2017:1881–1886

    Google Scholar 

  7. Zine Boukhamla Akram (2021) CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed. Int J Inf Comput Secur 16:20–32. https://doi.org/10.1504/IJICS.2021.10039325

    Article  Google Scholar 

  8. Lin P, Ye K, Xu CZ (2019) Dynamic network anomaly detection system by using deep learning techniques. Cloud Comput CLOUD 2019, 11513:161–176, LNCS

    Google Scholar 

  9. Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Proc Comput Sci 89:213–217. https://doi.org/10.1016/j.procs.2016.06.047.Jan

  10. Elbasiony RM, Sallam EA, Eltobely TE, Fahmy MM (2013) A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng J 4(4):753–762. https://doi.org/10.1016/j.asej.2013.01.003

    Article  Google Scholar 

  11. Zong W, Chow Y-W, Susilo W (2018) A two-stage classifier approach for network intrusion detection. In: International conference on information security practice and experience. Springer, Berlin. pp 329–340

    Google Scholar 

  12. Stolfo SJ, Fan W, Lee W, Prodromidis A, Chan PK (2000) Costbased modeling for fraud and intrusion detection: results from the jam project. Discex, 02:1130

    Google Scholar 

  13. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD cup 99 data set. In: Proceedings of the second IEEE international conference on computational intelligence for security and defense applications, IEEE Press, Piscataway, NJ, USA, CISDA’09, pp 53–58. http://portal.acm.org/citation.cfm?id=1736481.1736489

  14. Moustafa N, Slay J (2015) Military communications and information systems conference (MilCIS). Canberra, ACT, Australia 2015:1–6. https://doi.org/10.1109/MilCIS.2015.7348942

  15. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In 4th international conference on information systems security and privacy (ICISSP), Portugal, Jan 2018

    Google Scholar 

  16. Rumelhart DE, Hinton GE, Williams RJ (1986) Learning representations by back-propagating errors. Nature 323(6088):533–536

    Article  MATH  Google Scholar 

  17. Dubey SR, Singh SK, Chaudhuri BB (2022) Activation functions in deep learning: a comprehensive survey and benchmark. Neurocomputing

    Google Scholar 

  18. Srivastava Y, Murali V, Dubey SR (2019) A performance evaluation of loss functions for deep face recognition. In: National conference on computer vision, pattern recognition, image processing, and graphics. Springer, Berlin, pp 322–332

    Google Scholar 

  19. Ruder S (2016) An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747

  20. Jia Y, Wang M, Wang Y (2019) Network intrusion detection algorithm based on deep neural network. IET Inf Secur 13: 48–53. https://doi.org/10.1049/iet-ifs.2018.5258

  21. Qazi Emad-ul-Haq, Imran Muhammad, Haider Noman, Shoaib Muhammad, Razzak Imran (2022) An intelligent and efficient network intrusion detection system using deep learning. Comput Electr Eng 99:107764. https://doi.org/10.1016/j.compeleceng.2022.107764

    Article  Google Scholar 

  22. Kim J, Shin N, Jo S, Kim S (2017) Method of intrusion detection using deep neural network. 313–316. https://doi.org/10.1109/BIGCOMP.2017.7881684

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harshit Jha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jha, H., Khanna, M., Jhawar, H., Jindal, R. (2023). Performance Analysis of Deep Neural Network for Intrusion Detection Systems. In: Choudrie, J., Mahalle, P.N., Perumal, T., Joshi, A. (eds) ICT with Intelligent Applications. ICTIS 2023. Lecture Notes in Networks and Systems, vol 719. Springer, Singapore. https://doi.org/10.1007/978-981-99-3758-5_41

Download citation

Publish with us

Policies and ethics