Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System
As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2024-03, Vol.13 (5), p.932 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 5 |
container_start_page | 932 |
container_title | Electronics (Basel) |
container_volume | 13 |
creator | Tadesse, Yonatan Embiza Choi, Young-June |
description | As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches. Most proposed works in this research field aim to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns by utilizing the Short-Term Fourier transform (STFT). The resulting high-quality image dataset allowed us to devise an anomaly detection system for IDS using a simple lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSLKDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have demonstrated the efficacy of our raw dataset to image dataset conversion methodology, which is evident as an excellent generalization of the proposed lightweight CNN model was observed, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed versions. |
doi_str_mv | 10.3390/electronics13050932 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2955513794</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A786436064</galeid><sourcerecordid>A786436064</sourcerecordid><originalsourceid>FETCH-LOGICAL-c311t-d9c40d6635d07b6b1cdffe2bd81ec7c0e597a233df9c38ab1c7596850506f59b3</originalsourceid><addsrcrecordid>eNptUE1PwzAMjRBITLBfwKUS546kWdLmOI2vSRMgAQdOVZo4o6NLRpIy7d-TMg4csCXbst-zno3QBcETSgW-gg5U9M62KhCKGRa0OEKjApciF4Uojv_Up2gcwhonE4RWFI_Q25OMEbzNZv1qAzaCzpbt6j3uYIjZ3Nkv1_WxdVZ22QP0_ifFnfMfmXE-W9jo-5DG2TXEpGOonvchwuYcnRjZBRj_5jP0envzMr_Pl493i_lsmStKSMy1UFOsOadM47LhDVHaGCgaXRFQpcLARCkLSrURilYyzUsmeMXSodww0dAzdHnYu_Xus4cQ67XrfZIb6kIwxggtxTShJgfUSnZQt9a46KVKrmHTKmfBtKk_Kys-pRzzgUAPBOVdCB5MvfXtRvp9TXA9_L3-5-_0G4Ajel0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2955513794</pqid></control><display><type>article</type><title>Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Tadesse, Yonatan Embiza ; Choi, Young-June</creator><creatorcontrib>Tadesse, Yonatan Embiza ; Choi, Young-June</creatorcontrib><description>As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches. Most proposed works in this research field aim to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns by utilizing the Short-Term Fourier transform (STFT). The resulting high-quality image dataset allowed us to devise an anomaly detection system for IDS using a simple lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSLKDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have demonstrated the efficacy of our raw dataset to image dataset conversion methodology, which is evident as an excellent generalization of the proposed lightweight CNN model was observed, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed versions.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics13050932</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Accuracy ; Anomalies ; Artificial neural networks ; Classification ; Cybersecurity ; Data security ; Datasets ; Deep learning ; Denial of service attacks ; False alarms ; Fourier transforms ; Image quality ; Intrusion detection systems ; Lightweight ; Machine learning ; Malware ; Methods ; Neural networks ; Performance measurement ; Prevention ; Sensitivity</subject><ispartof>Electronics (Basel), 2024-03, Vol.13 (5), p.932</ispartof><rights>COPYRIGHT 2024 MDPI AG</rights><rights>2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c311t-d9c40d6635d07b6b1cdffe2bd81ec7c0e597a233df9c38ab1c7596850506f59b3</cites><orcidid>0009-0003-3571-5356 ; 0000-0003-2240-0892</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Tadesse, Yonatan Embiza</creatorcontrib><creatorcontrib>Choi, Young-June</creatorcontrib><title>Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System</title><title>Electronics (Basel)</title><description>As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches. Most proposed works in this research field aim to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns by utilizing the Short-Term Fourier transform (STFT). The resulting high-quality image dataset allowed us to devise an anomaly detection system for IDS using a simple lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSLKDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have demonstrated the efficacy of our raw dataset to image dataset conversion methodology, which is evident as an excellent generalization of the proposed lightweight CNN model was observed, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed versions.</description><subject>Accuracy</subject><subject>Anomalies</subject><subject>Artificial neural networks</subject><subject>Classification</subject><subject>Cybersecurity</subject><subject>Data security</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Denial of service attacks</subject><subject>False alarms</subject><subject>Fourier transforms</subject><subject>Image quality</subject><subject>Intrusion detection systems</subject><subject>Lightweight</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Methods</subject><subject>Neural networks</subject><subject>Performance measurement</subject><subject>Prevention</subject><subject>Sensitivity</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUE1PwzAMjRBITLBfwKUS546kWdLmOI2vSRMgAQdOVZo4o6NLRpIy7d-TMg4csCXbst-zno3QBcETSgW-gg5U9M62KhCKGRa0OEKjApciF4Uojv_Up2gcwhonE4RWFI_Q25OMEbzNZv1qAzaCzpbt6j3uYIjZ3Nkv1_WxdVZ22QP0_ifFnfMfmXE-W9jo-5DG2TXEpGOonvchwuYcnRjZBRj_5jP0envzMr_Pl493i_lsmStKSMy1UFOsOadM47LhDVHaGCgaXRFQpcLARCkLSrURilYyzUsmeMXSodww0dAzdHnYu_Xus4cQ67XrfZIb6kIwxggtxTShJgfUSnZQt9a46KVKrmHTKmfBtKk_Kys-pRzzgUAPBOVdCB5MvfXtRvp9TXA9_L3-5-_0G4Ajel0</recordid><startdate>20240301</startdate><enddate>20240301</enddate><creator>Tadesse, Yonatan Embiza</creator><creator>Choi, Young-June</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0009-0003-3571-5356</orcidid><orcidid>https://orcid.org/0000-0003-2240-0892</orcidid></search><sort><creationdate>20240301</creationdate><title>Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System</title><author>Tadesse, Yonatan Embiza ; Choi, Young-June</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c311t-d9c40d6635d07b6b1cdffe2bd81ec7c0e597a233df9c38ab1c7596850506f59b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Anomalies</topic><topic>Artificial neural networks</topic><topic>Classification</topic><topic>Cybersecurity</topic><topic>Data security</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Denial of service attacks</topic><topic>False alarms</topic><topic>Fourier transforms</topic><topic>Image quality</topic><topic>Intrusion detection systems</topic><topic>Lightweight</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Methods</topic><topic>Neural networks</topic><topic>Performance measurement</topic><topic>Prevention</topic><topic>Sensitivity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tadesse, Yonatan Embiza</creatorcontrib><creatorcontrib>Choi, Young-June</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tadesse, Yonatan Embiza</au><au>Choi, Young-June</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System</atitle><jtitle>Electronics (Basel)</jtitle><date>2024-03-01</date><risdate>2024</risdate><volume>13</volume><issue>5</issue><spage>932</spage><pages>932-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches. Most proposed works in this research field aim to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns by utilizing the Short-Term Fourier transform (STFT). The resulting high-quality image dataset allowed us to devise an anomaly detection system for IDS using a simple lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSLKDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have demonstrated the efficacy of our raw dataset to image dataset conversion methodology, which is evident as an excellent generalization of the proposed lightweight CNN model was observed, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed versions.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics13050932</doi><orcidid>https://orcid.org/0009-0003-3571-5356</orcidid><orcidid>https://orcid.org/0000-0003-2240-0892</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2024-03, Vol.13 (5), p.932 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2955513794 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals |
subjects | Accuracy Anomalies Artificial neural networks Classification Cybersecurity Data security Datasets Deep learning Denial of service attacks False alarms Fourier transforms Image quality Intrusion detection systems Lightweight Machine learning Malware Methods Neural networks Performance measurement Prevention Sensitivity |
title | Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T14%3A26%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Pattern%20Augmented%20Lightweight%20Convolutional%20Neural%20Network%20for%20Intrusion%20Detection%20System&rft.jtitle=Electronics%20(Basel)&rft.au=Tadesse,%20Yonatan%20Embiza&rft.date=2024-03-01&rft.volume=13&rft.issue=5&rft.spage=932&rft.pages=932-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics13050932&rft_dat=%3Cgale_proqu%3EA786436064%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2955513794&rft_id=info:pmid/&rft_galeid=A786436064&rfr_iscdi=true |