scholarly journals Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-23
Author(s):  
Basim Mahbooba ◽  
Radhya Sahal ◽  
Wael Alosaimi ◽  
Martin Serrano

To design and develop AI-based cybersecurity systems (e.g., intrusion detection system (IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree (DT), K nearest neighbour (KNN), random forest (RF), and naïve Bayes (NB). The four deep learning techniques are LSTM (one and two layers) and GRU (one and two layers). Two datasets are used to classify the IDS attack type, including wireless sensor network detection system (WSN-DS) and KDD Cup network intrusion dataset. A detailed comparison of the eight techniques’ performance using all features and selected features is made by measuring the accuracy, precision, recall, and F1-score. Considering the findings related to the data, methodology, and expert accountability, interpretability for AI-based solutions also becomes demanded to enhance trust in the IDS.

2019 ◽  
Vol 8 (4) ◽  
pp. 11806-11809

Intrusion Detection System (IDS) is the most mainstream approach to protect a computer network from different malicious activities to identify an intrusion. There have been a lot of attempts towards more exceptional performance specifically in IDSs which depends on Data Mining (DM) and Machine Learning Techniques (MLT). Though there is a destructive issue in that available assessment, DataSet (DS), called KDD DS, can't reflect current network circumstances and the most recent attack situations. As far as we could know, there is no possible assessment DS. We present a novel evaluation DS in this paper, called Kyoto, based on the 5 years of actual traffic information, which derived from different sorts of honey pots. This Kyoto DS is utilized for testing and assessing distinctive MLT has examined in this work. The attention was on unprocessed measurements True +ve (TrPo), False +ve (FaPo), True – ve (TrNa), and False – ve (FaNa) to assess execution and to improve the identification rate of IDS.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sagar Pande ◽  
Aditya Khamparia ◽  
Deepak Gupta

Purpose One of the important key components of health care–based system is a reliable intrusion detection system. Traditional techniques are not adequate to handle complex data. Also, the diversified intrusion techniques cannot meet current network requirements. Not only the data is getting increased but also the attacks are increasing very rapidly. Deep learning and machine learning techniques are very trending in the area of research in the area of network security. A lot of work has been done in this area by still evolutionary algorithms along with machine learning is very rarely explored. The purpose of this study is to provide novel deep learning framework for the detection of attacks. Design/methodology/approach In this paper, novel deep learning is the framework is proposed for the detection of attacks. Also, a comparison of machine learning and deep learning algorithms is provided. Findings The obtained results are more than 99% for both the data sets. Research limitations/implications The diversified intrusion techniques cannot meet current network requirements. Practical implications The data is getting increased but also the attacks are increasing very rapidly. Social implications Deep learning and machine learning techniques are very trending in the area of research in the area of network security. Originality/value Novel deep learning is the framework is proposed for the detection of attacks.


Author(s):  
Safaa Laqtib ◽  
Khalid El Yassini ◽  
Moulay Lahcen Hasnaoui

Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network Inception-CNN, Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning methods in MANET.


The Intrusion is a major threat to unauthorized data or legal network using the legitimate user identity or any of the back doors and vulnerabilities in the network. IDS mechanisms are developed to detect the intrusions at various levels. The objective of the research work is to improve the Intrusion Detection System performance by applying machine learning techniques based on decision trees for detection and classification of attacks. The methodology adapted will process the datasets in three stages. The experimentation is conducted on KDDCUP99 data sets based on number of features. The Bayesian three modes are analyzed for different sized data sets based upon total number of attacks. The time consumed by the classifier to build the model is analyzed and the accuracy is done.


Sign in / Sign up

Export Citation Format

Share Document