A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization
Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Lea...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2022-11, Vol.11 (21), p.3529 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 21 |
container_start_page | 3529 |
container_title | Electronics (Basel) |
container_volume | 11 |
creator | Gautam, Sunil Henry, Azriel Zuhair, Mohd Rashid, Mamoon Javed, Abdul Rehman Maddikunta, Praveen Kumar Reddy |
description | Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Learning (DL) technique has been proven better than traditional techniques for IDS. Throughout these studies, we presented a hybrid model that is a Deep Learning method called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit. Through simulations on the public dataset CICIDS2017, we have shown the model’s effectiveness. It has been noted that the suggested model successfully predicted most of the network attacks with 99.13% classification accuracy. The proposed model outperformed the Naïve Bayes classifier in terms of prediction accuracy and False Positive rate. The suggested model managed to perform well with only 58% attributes of the dataset compared to other existing classifiers. Moreover, this study also demonstrates the performance of LSTM and GRU with RNN independently. |
doi_str_mv | 10.3390/electronics11213529 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2734622503</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2734622503</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-83d425aede43709611b3f3d2ff811b720fa284f4572d678f5438d941d4157a993</originalsourceid><addsrcrecordid>eNptkM1OwzAQhC0EElXpE3CxxDlg7zpNzK0USitVrcTPOXJjW6Rq4mA7h_L0JJQDB_ayI-2nGe0Qcs3ZLaJkd-ZgyuhdU5WBc-CYgjwjI2CZTCRIOP-jL8kkhD3rR3LMkY3Ifkbnrm5dqKKhs7b1TpUf1Fm6aqLvQuUa-mhiHzCo12OIpg73dHnc-UrTl82Gqkb3Dt6bgxqY5EEFo-nCqNh5Q7dtrOrq6-d0RS6sOgQz-d1j8r54epsvk_X2eTWfrZMSAWKSoxaQKqONwIzJKec7tKjB2ryXGTCrIBdWpBnoaZbbVGCupeBa8DRTUuKY3Jx8-2c-OxNisXedb_rIAjIUU4CUYU_hiSq9C8EbW7S-qpU_FpwVQ6_FP73iN83Mbi0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2734622503</pqid></control><display><type>article</type><title>A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Gautam, Sunil ; Henry, Azriel ; Zuhair, Mohd ; Rashid, Mamoon ; Javed, Abdul Rehman ; Maddikunta, Praveen Kumar Reddy</creator><creatorcontrib>Gautam, Sunil ; Henry, Azriel ; Zuhair, Mohd ; Rashid, Mamoon ; Javed, Abdul Rehman ; Maddikunta, Praveen Kumar Reddy</creatorcontrib><description>Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Learning (DL) technique has been proven better than traditional techniques for IDS. Throughout these studies, we presented a hybrid model that is a Deep Learning method called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit. Through simulations on the public dataset CICIDS2017, we have shown the model’s effectiveness. It has been noted that the suggested model successfully predicted most of the network attacks with 99.13% classification accuracy. The proposed model outperformed the Naïve Bayes classifier in terms of prediction accuracy and False Positive rate. The suggested model managed to perform well with only 58% attributes of the dataset compared to other existing classifiers. Moreover, this study also demonstrates the performance of LSTM and GRU with RNN independently.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics11213529</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Accuracy ; Anomalies ; Classification ; Classifiers ; Cybersecurity ; Datasets ; Decision trees ; Deep learning ; Genetic algorithms ; Hybrid systems ; Intrusion detection systems ; Machine learning ; Model accuracy ; Neural networks ; Optimization ; Optimization techniques ; Performance evaluation ; Recurrent neural networks ; Support vector machines</subject><ispartof>Electronics (Basel), 2022-11, Vol.11 (21), p.3529</ispartof><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-83d425aede43709611b3f3d2ff811b720fa284f4572d678f5438d941d4157a993</citedby><cites>FETCH-LOGICAL-c322t-83d425aede43709611b3f3d2ff811b720fa284f4572d678f5438d941d4157a993</cites><orcidid>0000-0002-0570-1813 ; 0000-0002-8302-4571 ; 0000-0003-4209-2495</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Gautam, Sunil</creatorcontrib><creatorcontrib>Henry, Azriel</creatorcontrib><creatorcontrib>Zuhair, Mohd</creatorcontrib><creatorcontrib>Rashid, Mamoon</creatorcontrib><creatorcontrib>Javed, Abdul Rehman</creatorcontrib><creatorcontrib>Maddikunta, Praveen Kumar Reddy</creatorcontrib><title>A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization</title><title>Electronics (Basel)</title><description>Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Learning (DL) technique has been proven better than traditional techniques for IDS. Throughout these studies, we presented a hybrid model that is a Deep Learning method called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit. Through simulations on the public dataset CICIDS2017, we have shown the model’s effectiveness. It has been noted that the suggested model successfully predicted most of the network attacks with 99.13% classification accuracy. The proposed model outperformed the Naïve Bayes classifier in terms of prediction accuracy and False Positive rate. The suggested model managed to perform well with only 58% attributes of the dataset compared to other existing classifiers. Moreover, this study also demonstrates the performance of LSTM and GRU with RNN independently.</description><subject>Accuracy</subject><subject>Anomalies</subject><subject>Classification</subject><subject>Classifiers</subject><subject>Cybersecurity</subject><subject>Datasets</subject><subject>Decision trees</subject><subject>Deep learning</subject><subject>Genetic algorithms</subject><subject>Hybrid systems</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Model accuracy</subject><subject>Neural networks</subject><subject>Optimization</subject><subject>Optimization techniques</subject><subject>Performance evaluation</subject><subject>Recurrent neural networks</subject><subject>Support vector machines</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNptkM1OwzAQhC0EElXpE3CxxDlg7zpNzK0USitVrcTPOXJjW6Rq4mA7h_L0JJQDB_ayI-2nGe0Qcs3ZLaJkd-ZgyuhdU5WBc-CYgjwjI2CZTCRIOP-jL8kkhD3rR3LMkY3Ifkbnrm5dqKKhs7b1TpUf1Fm6aqLvQuUa-mhiHzCo12OIpg73dHnc-UrTl82Gqkb3Dt6bgxqY5EEFo-nCqNh5Q7dtrOrq6-d0RS6sOgQz-d1j8r54epsvk_X2eTWfrZMSAWKSoxaQKqONwIzJKec7tKjB2ryXGTCrIBdWpBnoaZbbVGCupeBa8DRTUuKY3Jx8-2c-OxNisXedb_rIAjIUU4CUYU_hiSq9C8EbW7S-qpU_FpwVQ6_FP73iN83Mbi0</recordid><startdate>20221101</startdate><enddate>20221101</enddate><creator>Gautam, Sunil</creator><creator>Henry, Azriel</creator><creator>Zuhair, Mohd</creator><creator>Rashid, Mamoon</creator><creator>Javed, Abdul Rehman</creator><creator>Maddikunta, Praveen Kumar Reddy</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-0570-1813</orcidid><orcidid>https://orcid.org/0000-0002-8302-4571</orcidid><orcidid>https://orcid.org/0000-0003-4209-2495</orcidid></search><sort><creationdate>20221101</creationdate><title>A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization</title><author>Gautam, Sunil ; Henry, Azriel ; Zuhair, Mohd ; Rashid, Mamoon ; Javed, Abdul Rehman ; Maddikunta, Praveen Kumar Reddy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-83d425aede43709611b3f3d2ff811b720fa284f4572d678f5438d941d4157a993</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Anomalies</topic><topic>Classification</topic><topic>Classifiers</topic><topic>Cybersecurity</topic><topic>Datasets</topic><topic>Decision trees</topic><topic>Deep learning</topic><topic>Genetic algorithms</topic><topic>Hybrid systems</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Model accuracy</topic><topic>Neural networks</topic><topic>Optimization</topic><topic>Optimization techniques</topic><topic>Performance evaluation</topic><topic>Recurrent neural networks</topic><topic>Support vector machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gautam, Sunil</creatorcontrib><creatorcontrib>Henry, Azriel</creatorcontrib><creatorcontrib>Zuhair, Mohd</creatorcontrib><creatorcontrib>Rashid, Mamoon</creatorcontrib><creatorcontrib>Javed, Abdul Rehman</creatorcontrib><creatorcontrib>Maddikunta, Praveen Kumar Reddy</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied & Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gautam, Sunil</au><au>Henry, Azriel</au><au>Zuhair, Mohd</au><au>Rashid, Mamoon</au><au>Javed, Abdul Rehman</au><au>Maddikunta, Praveen Kumar Reddy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization</atitle><jtitle>Electronics (Basel)</jtitle><date>2022-11-01</date><risdate>2022</risdate><volume>11</volume><issue>21</issue><spage>3529</spage><pages>3529-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Learning (DL) technique has been proven better than traditional techniques for IDS. Throughout these studies, we presented a hybrid model that is a Deep Learning method called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit. Through simulations on the public dataset CICIDS2017, we have shown the model’s effectiveness. It has been noted that the suggested model successfully predicted most of the network attacks with 99.13% classification accuracy. The proposed model outperformed the Naïve Bayes classifier in terms of prediction accuracy and False Positive rate. The suggested model managed to perform well with only 58% attributes of the dataset compared to other existing classifiers. Moreover, this study also demonstrates the performance of LSTM and GRU with RNN independently.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics11213529</doi><orcidid>https://orcid.org/0000-0002-0570-1813</orcidid><orcidid>https://orcid.org/0000-0002-8302-4571</orcidid><orcidid>https://orcid.org/0000-0003-4209-2495</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2022-11, Vol.11 (21), p.3529 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2734622503 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals |
subjects | Accuracy Anomalies Classification Classifiers Cybersecurity Datasets Decision trees Deep learning Genetic algorithms Hybrid systems Intrusion detection systems Machine learning Model accuracy Neural networks Optimization Optimization techniques Performance evaluation Recurrent neural networks Support vector machines |
title | A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-19T00%3A43%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Composite%20Approach%20of%20Intrusion%20Detection%20Systems:%20Hybrid%20RNN%20and%20Correlation-Based%20Feature%20Optimization&rft.jtitle=Electronics%20(Basel)&rft.au=Gautam,%20Sunil&rft.date=2022-11-01&rft.volume=11&rft.issue=21&rft.spage=3529&rft.pages=3529-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics11213529&rft_dat=%3Cproquest_cross%3E2734622503%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2734622503&rft_id=info:pmid/&rfr_iscdi=true |