Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System

As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2024-03, Vol.13 (5), p.932
Hauptverfasser: Tadesse, Yonatan Embiza, Choi, Young-June
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 5
container_start_page 932
container_title Electronics (Basel)
container_volume 13
creator Tadesse, Yonatan Embiza
Choi, Young-June
description As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches. Most proposed works in this research field aim to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns by utilizing the Short-Term Fourier transform (STFT). The resulting high-quality image dataset allowed us to devise an anomaly detection system for IDS using a simple lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSLKDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have demonstrated the efficacy of our raw dataset to image dataset conversion methodology, which is evident as an excellent generalization of the proposed lightweight CNN model was observed, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed versions.
doi_str_mv 10.3390/electronics13050932
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2955513794</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A786436064</galeid><sourcerecordid>A786436064</sourcerecordid><originalsourceid>FETCH-LOGICAL-c311t-d9c40d6635d07b6b1cdffe2bd81ec7c0e597a233df9c38ab1c7596850506f59b3</originalsourceid><addsrcrecordid>eNptUE1PwzAMjRBITLBfwKUS546kWdLmOI2vSRMgAQdOVZo4o6NLRpIy7d-TMg4csCXbst-zno3QBcETSgW-gg5U9M62KhCKGRa0OEKjApciF4Uojv_Up2gcwhonE4RWFI_Q25OMEbzNZv1qAzaCzpbt6j3uYIjZ3Nkv1_WxdVZ22QP0_ifFnfMfmXE-W9jo-5DG2TXEpGOonvchwuYcnRjZBRj_5jP0envzMr_Pl493i_lsmStKSMy1UFOsOadM47LhDVHaGCgaXRFQpcLARCkLSrURilYyzUsmeMXSodww0dAzdHnYu_Xus4cQ67XrfZIb6kIwxggtxTShJgfUSnZQt9a46KVKrmHTKmfBtKk_Kys-pRzzgUAPBOVdCB5MvfXtRvp9TXA9_L3-5-_0G4Ajel0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2955513794</pqid></control><display><type>article</type><title>Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Tadesse, Yonatan Embiza ; Choi, Young-June</creator><creatorcontrib>Tadesse, Yonatan Embiza ; Choi, Young-June</creatorcontrib><description>As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches. Most proposed works in this research field aim to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns by utilizing the Short-Term Fourier transform (STFT). The resulting high-quality image dataset allowed us to devise an anomaly detection system for IDS using a simple lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSLKDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have demonstrated the efficacy of our raw dataset to image dataset conversion methodology, which is evident as an excellent generalization of the proposed lightweight CNN model was observed, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed versions.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics13050932</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Accuracy ; Anomalies ; Artificial neural networks ; Classification ; Cybersecurity ; Data security ; Datasets ; Deep learning ; Denial of service attacks ; False alarms ; Fourier transforms ; Image quality ; Intrusion detection systems ; Lightweight ; Machine learning ; Malware ; Methods ; Neural networks ; Performance measurement ; Prevention ; Sensitivity</subject><ispartof>Electronics (Basel), 2024-03, Vol.13 (5), p.932</ispartof><rights>COPYRIGHT 2024 MDPI AG</rights><rights>2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c311t-d9c40d6635d07b6b1cdffe2bd81ec7c0e597a233df9c38ab1c7596850506f59b3</cites><orcidid>0009-0003-3571-5356 ; 0000-0003-2240-0892</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Tadesse, Yonatan Embiza</creatorcontrib><creatorcontrib>Choi, Young-June</creatorcontrib><title>Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System</title><title>Electronics (Basel)</title><description>As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches. Most proposed works in this research field aim to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns by utilizing the Short-Term Fourier transform (STFT). The resulting high-quality image dataset allowed us to devise an anomaly detection system for IDS using a simple lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSLKDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have demonstrated the efficacy of our raw dataset to image dataset conversion methodology, which is evident as an excellent generalization of the proposed lightweight CNN model was observed, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed versions.</description><subject>Accuracy</subject><subject>Anomalies</subject><subject>Artificial neural networks</subject><subject>Classification</subject><subject>Cybersecurity</subject><subject>Data security</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Denial of service attacks</subject><subject>False alarms</subject><subject>Fourier transforms</subject><subject>Image quality</subject><subject>Intrusion detection systems</subject><subject>Lightweight</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Methods</subject><subject>Neural networks</subject><subject>Performance measurement</subject><subject>Prevention</subject><subject>Sensitivity</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUE1PwzAMjRBITLBfwKUS546kWdLmOI2vSRMgAQdOVZo4o6NLRpIy7d-TMg4csCXbst-zno3QBcETSgW-gg5U9M62KhCKGRa0OEKjApciF4Uojv_Up2gcwhonE4RWFI_Q25OMEbzNZv1qAzaCzpbt6j3uYIjZ3Nkv1_WxdVZ22QP0_ifFnfMfmXE-W9jo-5DG2TXEpGOonvchwuYcnRjZBRj_5jP0envzMr_Pl493i_lsmStKSMy1UFOsOadM47LhDVHaGCgaXRFQpcLARCkLSrURilYyzUsmeMXSodww0dAzdHnYu_Xus4cQ67XrfZIb6kIwxggtxTShJgfUSnZQt9a46KVKrmHTKmfBtKk_Kys-pRzzgUAPBOVdCB5MvfXtRvp9TXA9_L3-5-_0G4Ajel0</recordid><startdate>20240301</startdate><enddate>20240301</enddate><creator>Tadesse, Yonatan Embiza</creator><creator>Choi, Young-June</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0009-0003-3571-5356</orcidid><orcidid>https://orcid.org/0000-0003-2240-0892</orcidid></search><sort><creationdate>20240301</creationdate><title>Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System</title><author>Tadesse, Yonatan Embiza ; Choi, Young-June</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c311t-d9c40d6635d07b6b1cdffe2bd81ec7c0e597a233df9c38ab1c7596850506f59b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Anomalies</topic><topic>Artificial neural networks</topic><topic>Classification</topic><topic>Cybersecurity</topic><topic>Data security</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Denial of service attacks</topic><topic>False alarms</topic><topic>Fourier transforms</topic><topic>Image quality</topic><topic>Intrusion detection systems</topic><topic>Lightweight</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Methods</topic><topic>Neural networks</topic><topic>Performance measurement</topic><topic>Prevention</topic><topic>Sensitivity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tadesse, Yonatan Embiza</creatorcontrib><creatorcontrib>Choi, Young-June</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tadesse, Yonatan Embiza</au><au>Choi, Young-June</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System</atitle><jtitle>Electronics (Basel)</jtitle><date>2024-03-01</date><risdate>2024</risdate><volume>13</volume><issue>5</issue><spage>932</spage><pages>932-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches. Most proposed works in this research field aim to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns by utilizing the Short-Term Fourier transform (STFT). The resulting high-quality image dataset allowed us to devise an anomaly detection system for IDS using a simple lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSLKDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have demonstrated the efficacy of our raw dataset to image dataset conversion methodology, which is evident as an excellent generalization of the proposed lightweight CNN model was observed, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed versions.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics13050932</doi><orcidid>https://orcid.org/0009-0003-3571-5356</orcidid><orcidid>https://orcid.org/0000-0003-2240-0892</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2024-03, Vol.13 (5), p.932
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2955513794
source MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals
subjects Accuracy
Anomalies
Artificial neural networks
Classification
Cybersecurity
Data security
Datasets
Deep learning
Denial of service attacks
False alarms
Fourier transforms
Image quality
Intrusion detection systems
Lightweight
Machine learning
Malware
Methods
Neural networks
Performance measurement
Prevention
Sensitivity
title Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T14%3A26%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Pattern%20Augmented%20Lightweight%20Convolutional%20Neural%20Network%20for%20Intrusion%20Detection%20System&rft.jtitle=Electronics%20(Basel)&rft.au=Tadesse,%20Yonatan%20Embiza&rft.date=2024-03-01&rft.volume=13&rft.issue=5&rft.spage=932&rft.pages=932-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics13050932&rft_dat=%3Cgale_proqu%3EA786436064%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2955513794&rft_id=info:pmid/&rft_galeid=A786436064&rfr_iscdi=true