Performance Analysis of Flow-Based Attacks Detection on CSE-CIC-IDS2018 Dataset Using Deep Learning

rawaa ismael farhan, abeer Tariq Maolood, Nidaa Flaih Hassan

Abstract


The emergence of the Internet of Things (IOT) as a result of the development of the communications system has made the study of cyber security more important. Day after day, attacks evolve and new attacks are emerged. Hence, network anomaly-based intrusion detection system is become very important, which plays an important role in protecting the network through early detection of attacks. Because of the development in  machine learning and the emergence of deep learning field,  and its ability to extract high-level features with high accuracy, made these systems involved to be worked with  real network traffic CSE-CIC-IDS2018 with a wide range of intrusions and normal behavior is an ideal way for testing and evaluation . In this paper , we  test and evaluate our  deep model (DNN) which achieved good detection accuracy about  90% .


Keywords


Flow-based intrusion detection, anomaly-based intrusion detection system , Deep learning , internet of thing(IOT) , CSE-CIC-IDS2018

References


A.A. Diro, N. Chilamkurti, "Distributed attack detection scheme using deep learning approach for Internet of Things", Future Generation Computer Systems (2017),http://dx.doi.org/10.1016/j.future.2017.08.043.

Rao U.H., Nayak U. ,"Intrusion Detection and Prevention Systems",In: The InfoSec Handbook. Apress, Berkeley, CA , 2014.

Mahmudul Hasan,et al., "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches ",Elsevier, Internet of Things 7 ,2019.

Shawq M. Mehibs, Soukaena H. Hashim," Proposed Network Intrusion Detection System In Cloud Environment Based on Back Propagation Neural Network", Journal of Babylon University/Pure and Applied Sciences/ No. 1, Vol. 26, 2018 .

Basnet Ram B,et al., "Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks",Journal of Internet Services and Information Security (JISIS), No.4,vol. 9, pp. 1-17, November 2019 .

M. Parashar,et al., "Packet and Flow Based Network Intrusion Dataset",Springer, CCIS 306, pp. 322–334, IC3 2012.

Gozde Karatas,et al., "Deep Learning in Intrusion Detection Systems", IEEE, International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism Ankara, Turkey, 2018.

Navaporn Chockwanich and Vasaka Visoottiviseth ,"Intrusion Detection by Deep Learning with TensorFlow",International Conference on AdvancedCommunications Technology(ICACT),2019 .

M. Zhu,et al., "A Deep Learning Approach for Network Anomaly Detection Based on AMF-LSTM",Springer ,(Eds.): NPC 2018, LNCS 11276, pp. 137–141, 2018.

Y. Hao ,et al.," Variant-Gated Recurrent Units With Encoders to Preprocess Packets for Payload-Aware Intrusion Detection",IEEE, Vol. 7, 2019 .

V. Kanimozhi and T.P. Jacob, "Artificial Intelligence based Network Intrusion Detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing",Elsevier,ICT Express 5 , pp.211–214, 2019.

Zhou, Q., Pezaros, D. ," Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection - An Analysis on CIC-AWS-2018 dataset", 2019,ArXiv, abs/1905.03685.

Lin P,et al., "Dynamic Network Anomaly Detection System by Using Deep Learning Techniques",Springer,Cham,In D.Da Silva et al.(Eds):CLOUD 2019,Vol. 11513,PP. 161-167,2019 .

Ram B. Basneand ,et al., "Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks", Journal of Internet Services and Information Security (JISIS), Vol. 9, No. 4, pp. 1-17, November 2019.

Jiyeon Kim,et al., " An Intrusion Detection based on a Convolutional Neural Network", Journal of Multimedia Information System ,Vol. 6, NO. 4, pp. 165-172, December 2019.

https://registry.opendata.aws/cse-cic-ids2018/

https://www.unb.ca/cic/datasets/ids-2018.html

Tang,et al.,"Deep Learning Approach for Network Intrusion Detection in Software Defined Networking",InternationalConference on Wireless Networks and Mobile Communications (WINCOM'16), IEEE, Morocco ,26-29 Oct 2016.

Samaneh Mahdavifar, Ali A. Ghorbani , Application of deep learning to cybersecurity: A survey",Elsiever , Neurocomputing 347 , pp. 149–176, 2019.

Keras.io. (2019). Keras Documentation [Online]. Available at: https://keras.io/

Vinayakumar R ,et al., "Deep Learning Approach for Intelligent Intrusion Detection System", IEEE, doi:10.1109/access.2019.2895334 .




DOI: http://doi.org/10.11591/ijeecs.v20.i3.pp%25p
Total views : 20 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics