Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

A Survey of Network Intrusion Detection Techniques Using Deep Learning

Author : Auwal Sani Iliyasu 1 Ibrahim Abba 2 Badariyya Sani Iliyasu 3 Munzali Surajo 4

Date of Publication :1st August 2022

Abstract: Network intrusion detection has been studied for long time, with many techniques such as signature-based methods and classical machine learning methods currently available. Recently, DL techniques have received considerable attention for use in intrusion detection systems, due to their inherent advantages such as automatic feature learning. This paper gives an overview about DL techniques employed in intrusion detection to enable new researchers who wish to begin research in the field to be conversant with the state-of-the-art methods as well as unexplored areas.

Reference :

    1.  J. Abbate, “the internet: global evolution and challenges,” THE INTERNET, p. 9.
    2. A. Ku. Saxena, S. Sinha, and P. Shukla, “General study of intrusion detection system and survey of agent based intrusion detection system,” in 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, May 2017, pp. 471–421. doi: 10.1109/CCAA.2017.8229866.
    3. K. A. Scarfone and P. M. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800-94, 2007. doi: 10.6028/NIST.SP.800-94.
    4. K. Goeschel, “Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis,” in SoutheastCon 2016, Norfolk, VA, USA, Mar. 2016, pp. 1–6. doi: 10.1109/SECON.2016.7506774.
    5. L. Dhanabal and D. S. P. Shantharajah, “A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms,” vol. 4, no. 6, p. 7, 2015.
    6. Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, May 2015, doi: 10.1038/nature14539.
    7. B. Dong and X. Wang, “Comparison deep learning method to traditional methods using for network intrusion detection,” in 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, Jun. 2016, pp. 581–585. doi: 10.1109/ICCSN.2016.7586590.
    8. I. Goodfellow, Y. Bengio, and A. Courville, Deep learning. Cambridge, Massachusetts: The MIT Press, 2016. [9] A. B. Dieng, “Deep Probabilistic Graphical Modeling,” p. 142.
    9. S. Albawi, T. A. Mohammed, and S. Al-Zawi, “Understanding of a convolutional neural network,” in 2017 International Conference on Engineering and Technology (ICET), Antalya, Aug. 2017, pp. 1–6. doi: 10.1109/ ICEngTechnol.2017.8308186.
    10. A. Graves, “Generating Sequences With Recurrent Neural Networks,” arXiv:1308.0850 [cs], Jun. 2014, Accessed: Apr. 09, 2022. [Online]. Available: http://arxiv.org/abs/1308.0850
    11. J. Hochst, L. Baumgartner, M. Hollick, and B. Freisleben, “Unsupervised Traffic Flow Classification Using a Neural Autoencoder,” in 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, Oct. 2017, pp. 523– 526. doi: 10.1109/LCN.2017.57.
    12. I. Goodfellow et al., “Generative Adversarial Nets,” p. 9.
    13. Arash Habibi Lashkari, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,” Sharafaldin, I., Lashkari, A.H. and Ghorbani, A.A., 2018, January. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In ICISSp (pp. 108-116)..
    14. A. S. Iliyasu and H. Deng, “Semi-Supervised Encrypted Traffic Classification With Deep Convolutional Generative Adversarial Networks,” IEEE Access, vol. 8, pp. 118–126, 2020, doi: 10.1109/ACCESS.2019.2962106.
    15. A. Javaid, Q. Niyaz, W. Sun, and M. Alam, “A Deep Learning Approach for Network Intrusion Detection System,” presented at the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), New York City, United States, 2016. doi: 10.4108/eai.3-12-2015.2262516.
    16. S. S. Roy, A. Mallik, R. Gulati, M. S. Obaidat, and P. V. Krishna, “A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection,” in Mathematics and Computing, vol. 655, D. Giri, R. N. Mohapatra, H. Begehr, and M. S. Obaidat, Eds. Singapore: Springer Singapore, 2017, pp. 44–53. doi: 10.1007/978-981-10-4642-1_5.
    17. S. M. Kasongo and Y. Sun, “A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System,” IEEE Access, vol. 7, pp. 38597–38607, 2019, doi: 10.1109/ACCESS.2019.2905633.
    18. C. Yin, Y. Zhu, J. Fei, and X. He, “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks,” IEEE Access, vol. 5, pp. 21954–21961, 2017, doi: 10.1109/ACCESS.2017.2762418.
    19. W. Wang et al., “HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection,” vol. 6, p. 15, 2018.
    20. R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Applying convolutional neural network for network intrusion detection,” in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, Sep. 2017, pp. 1222–1228. doi: 10.1109/ICACCI.2017.8126009.
    21. Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, “Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection,” arXiv:1802.09089 [cs], May 2018, Accessed: Apr. 10, 2022. [Online]. Available: http://arxiv.org/abs/1802.09089
    22. J. Kim, J. Kim, H. L. Thi Thu, and H. Kim, “Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection,” in 2016 International Conference on Platform Technology and Service (PlatCon), Jeju, Feb. 2016, pp. 1–5. doi: 10.1109/PlatCon.2016.7456805.
    23. T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, “Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks,” in 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, Jun. 2018, pp. 202–206. doi: 10.1109/NETSOFT.2018.8460090.
    24. M. Nasr, A. Bahramali, and A. Houmansadr, “DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto Canada, Oct. 2018, pp. 1962–1976. doi: 10.1145/3243734.3243824.
    25. Y. Zhang, X. Chen, L. Jin, X. Wang, and D. Guo, “Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data,” IEEE Access, vol. 7, pp. 37004–37016, 2019, doi: 10.1109/ACCESS.2019.2905041.
    26. M. Al-Qatf, Y. Lasheng, M. Al-Habib, and K. Al-Sabahi, “Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection,” IEEE Access, vol. 6, pp. 52843–52856, 2018, doi: 10.1109/ACCESS. 2018.2869577.
    27. N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A Deep Learning Approach to Network Intrusion Detection,” IEEE Trans. Emerg. Top. Comput. Intell., vol. 2, no. 1, pp. 41–50, Feb. 2018, doi: 10.1109/TETCI.2017.2772792.
    28. T. Aldwairi, D. Perera, and M. A. Novotny, “An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection,” Computer Networks, vol. 144, pp. 111–119, Oct. 2018, doi: 10.1016/j.comnet.2018.07.025.
    29. F. A. Khan, A. Gumaei, A. Derhab, and A. Hussain, “TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection,” IEEE Access, vol. 7, pp. 30373–30385, 2019, doi: 10.1109/ACCESS.2019.2899721.

Recent Article