A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization

Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Lea...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2022-11, Vol.11 (21), p.3529
Hauptverfasser: Gautam, Sunil, Henry, Azriel, Zuhair, Mohd, Rashid, Mamoon, Javed, Abdul Rehman, Maddikunta, Praveen Kumar Reddy
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 21
container_start_page 3529
container_title Electronics (Basel)
container_volume 11
creator Gautam, Sunil
Henry, Azriel
Zuhair, Mohd
Rashid, Mamoon
Javed, Abdul Rehman
Maddikunta, Praveen Kumar Reddy
description Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Learning (DL) technique has been proven better than traditional techniques for IDS. Throughout these studies, we presented a hybrid model that is a Deep Learning method called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit. Through simulations on the public dataset CICIDS2017, we have shown the model’s effectiveness. It has been noted that the suggested model successfully predicted most of the network attacks with 99.13% classification accuracy. The proposed model outperformed the Naïve Bayes classifier in terms of prediction accuracy and False Positive rate. The suggested model managed to perform well with only 58% attributes of the dataset compared to other existing classifiers. Moreover, this study also demonstrates the performance of LSTM and GRU with RNN independently.
doi_str_mv 10.3390/electronics11213529
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2734622503</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2734622503</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-83d425aede43709611b3f3d2ff811b720fa284f4572d678f5438d941d4157a993</originalsourceid><addsrcrecordid>eNptkM1OwzAQhC0EElXpE3CxxDlg7zpNzK0USitVrcTPOXJjW6Rq4mA7h_L0JJQDB_ayI-2nGe0Qcs3ZLaJkd-ZgyuhdU5WBc-CYgjwjI2CZTCRIOP-jL8kkhD3rR3LMkY3Ifkbnrm5dqKKhs7b1TpUf1Fm6aqLvQuUa-mhiHzCo12OIpg73dHnc-UrTl82Gqkb3Dt6bgxqY5EEFo-nCqNh5Q7dtrOrq6-d0RS6sOgQz-d1j8r54epsvk_X2eTWfrZMSAWKSoxaQKqONwIzJKec7tKjB2ryXGTCrIBdWpBnoaZbbVGCupeBa8DRTUuKY3Jx8-2c-OxNisXedb_rIAjIUU4CUYU_hiSq9C8EbW7S-qpU_FpwVQ6_FP73iN83Mbi0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2734622503</pqid></control><display><type>article</type><title>A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Gautam, Sunil ; Henry, Azriel ; Zuhair, Mohd ; Rashid, Mamoon ; Javed, Abdul Rehman ; Maddikunta, Praveen Kumar Reddy</creator><creatorcontrib>Gautam, Sunil ; Henry, Azriel ; Zuhair, Mohd ; Rashid, Mamoon ; Javed, Abdul Rehman ; Maddikunta, Praveen Kumar Reddy</creatorcontrib><description>Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Learning (DL) technique has been proven better than traditional techniques for IDS. Throughout these studies, we presented a hybrid model that is a Deep Learning method called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit. Through simulations on the public dataset CICIDS2017, we have shown the model’s effectiveness. It has been noted that the suggested model successfully predicted most of the network attacks with 99.13% classification accuracy. The proposed model outperformed the Naïve Bayes classifier in terms of prediction accuracy and False Positive rate. The suggested model managed to perform well with only 58% attributes of the dataset compared to other existing classifiers. Moreover, this study also demonstrates the performance of LSTM and GRU with RNN independently.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics11213529</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Accuracy ; Anomalies ; Classification ; Classifiers ; Cybersecurity ; Datasets ; Decision trees ; Deep learning ; Genetic algorithms ; Hybrid systems ; Intrusion detection systems ; Machine learning ; Model accuracy ; Neural networks ; Optimization ; Optimization techniques ; Performance evaluation ; Recurrent neural networks ; Support vector machines</subject><ispartof>Electronics (Basel), 2022-11, Vol.11 (21), p.3529</ispartof><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-83d425aede43709611b3f3d2ff811b720fa284f4572d678f5438d941d4157a993</citedby><cites>FETCH-LOGICAL-c322t-83d425aede43709611b3f3d2ff811b720fa284f4572d678f5438d941d4157a993</cites><orcidid>0000-0002-0570-1813 ; 0000-0002-8302-4571 ; 0000-0003-4209-2495</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Gautam, Sunil</creatorcontrib><creatorcontrib>Henry, Azriel</creatorcontrib><creatorcontrib>Zuhair, Mohd</creatorcontrib><creatorcontrib>Rashid, Mamoon</creatorcontrib><creatorcontrib>Javed, Abdul Rehman</creatorcontrib><creatorcontrib>Maddikunta, Praveen Kumar Reddy</creatorcontrib><title>A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization</title><title>Electronics (Basel)</title><description>Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Learning (DL) technique has been proven better than traditional techniques for IDS. Throughout these studies, we presented a hybrid model that is a Deep Learning method called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit. Through simulations on the public dataset CICIDS2017, we have shown the model’s effectiveness. It has been noted that the suggested model successfully predicted most of the network attacks with 99.13% classification accuracy. The proposed model outperformed the Naïve Bayes classifier in terms of prediction accuracy and False Positive rate. The suggested model managed to perform well with only 58% attributes of the dataset compared to other existing classifiers. Moreover, this study also demonstrates the performance of LSTM and GRU with RNN independently.</description><subject>Accuracy</subject><subject>Anomalies</subject><subject>Classification</subject><subject>Classifiers</subject><subject>Cybersecurity</subject><subject>Datasets</subject><subject>Decision trees</subject><subject>Deep learning</subject><subject>Genetic algorithms</subject><subject>Hybrid systems</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Model accuracy</subject><subject>Neural networks</subject><subject>Optimization</subject><subject>Optimization techniques</subject><subject>Performance evaluation</subject><subject>Recurrent neural networks</subject><subject>Support vector machines</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNptkM1OwzAQhC0EElXpE3CxxDlg7zpNzK0USitVrcTPOXJjW6Rq4mA7h_L0JJQDB_ayI-2nGe0Qcs3ZLaJkd-ZgyuhdU5WBc-CYgjwjI2CZTCRIOP-jL8kkhD3rR3LMkY3Ifkbnrm5dqKKhs7b1TpUf1Fm6aqLvQuUa-mhiHzCo12OIpg73dHnc-UrTl82Gqkb3Dt6bgxqY5EEFo-nCqNh5Q7dtrOrq6-d0RS6sOgQz-d1j8r54epsvk_X2eTWfrZMSAWKSoxaQKqONwIzJKec7tKjB2ryXGTCrIBdWpBnoaZbbVGCupeBa8DRTUuKY3Jx8-2c-OxNisXedb_rIAjIUU4CUYU_hiSq9C8EbW7S-qpU_FpwVQ6_FP73iN83Mbi0</recordid><startdate>20221101</startdate><enddate>20221101</enddate><creator>Gautam, Sunil</creator><creator>Henry, Azriel</creator><creator>Zuhair, Mohd</creator><creator>Rashid, Mamoon</creator><creator>Javed, Abdul Rehman</creator><creator>Maddikunta, Praveen Kumar Reddy</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-0570-1813</orcidid><orcidid>https://orcid.org/0000-0002-8302-4571</orcidid><orcidid>https://orcid.org/0000-0003-4209-2495</orcidid></search><sort><creationdate>20221101</creationdate><title>A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization</title><author>Gautam, Sunil ; Henry, Azriel ; Zuhair, Mohd ; Rashid, Mamoon ; Javed, Abdul Rehman ; Maddikunta, Praveen Kumar Reddy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-83d425aede43709611b3f3d2ff811b720fa284f4572d678f5438d941d4157a993</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Anomalies</topic><topic>Classification</topic><topic>Classifiers</topic><topic>Cybersecurity</topic><topic>Datasets</topic><topic>Decision trees</topic><topic>Deep learning</topic><topic>Genetic algorithms</topic><topic>Hybrid systems</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Model accuracy</topic><topic>Neural networks</topic><topic>Optimization</topic><topic>Optimization techniques</topic><topic>Performance evaluation</topic><topic>Recurrent neural networks</topic><topic>Support vector machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gautam, Sunil</creatorcontrib><creatorcontrib>Henry, Azriel</creatorcontrib><creatorcontrib>Zuhair, Mohd</creatorcontrib><creatorcontrib>Rashid, Mamoon</creatorcontrib><creatorcontrib>Javed, Abdul Rehman</creatorcontrib><creatorcontrib>Maddikunta, Praveen Kumar Reddy</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied &amp; Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gautam, Sunil</au><au>Henry, Azriel</au><au>Zuhair, Mohd</au><au>Rashid, Mamoon</au><au>Javed, Abdul Rehman</au><au>Maddikunta, Praveen Kumar Reddy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization</atitle><jtitle>Electronics (Basel)</jtitle><date>2022-11-01</date><risdate>2022</risdate><volume>11</volume><issue>21</issue><spage>3529</spage><pages>3529-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Detection of intrusions is a system that is competent in detecting cyber-attacks and network anomalies. A variety of strategies have been developed for IDS so far. However, there are factors that they lack in performance, creating scope for further research. The current trend shows that the Deep Learning (DL) technique has been proven better than traditional techniques for IDS. Throughout these studies, we presented a hybrid model that is a Deep Learning method called Bidirectional Recurrent Neural Network using Long Short-Term Memory and Gated Recurrent Unit. Through simulations on the public dataset CICIDS2017, we have shown the model’s effectiveness. It has been noted that the suggested model successfully predicted most of the network attacks with 99.13% classification accuracy. The proposed model outperformed the Naïve Bayes classifier in terms of prediction accuracy and False Positive rate. The suggested model managed to perform well with only 58% attributes of the dataset compared to other existing classifiers. Moreover, this study also demonstrates the performance of LSTM and GRU with RNN independently.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics11213529</doi><orcidid>https://orcid.org/0000-0002-0570-1813</orcidid><orcidid>https://orcid.org/0000-0002-8302-4571</orcidid><orcidid>https://orcid.org/0000-0003-4209-2495</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2022-11, Vol.11 (21), p.3529
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2734622503
source MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals
subjects Accuracy
Anomalies
Classification
Classifiers
Cybersecurity
Datasets
Decision trees
Deep learning
Genetic algorithms
Hybrid systems
Intrusion detection systems
Machine learning
Model accuracy
Neural networks
Optimization
Optimization techniques
Performance evaluation
Recurrent neural networks
Support vector machines
title A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-19T00%3A43%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Composite%20Approach%20of%20Intrusion%20Detection%20Systems:%20Hybrid%20RNN%20and%20Correlation-Based%20Feature%20Optimization&rft.jtitle=Electronics%20(Basel)&rft.au=Gautam,%20Sunil&rft.date=2022-11-01&rft.volume=11&rft.issue=21&rft.spage=3529&rft.pages=3529-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics11213529&rft_dat=%3Cproquest_cross%3E2734622503%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2734622503&rft_id=info:pmid/&rfr_iscdi=true