Abstract
Real-time cyber threat identification and mitigation depend heavily on intrusion detection systems (IDS) for secure networks. Network systems utilize analysis to spot malicious events unauthorized access and system vulnerabilities in network traffic. Machine learning forms the foundation of these security implementations. Through improved network security measures, IDS protect business assets by ensuring both data availability and uncompromised security. After enhancing the effectiveness of intrusion detection, this study suggests a strong method based on DL. A CNN model is developed and evaluated against traditional models, including KNN, Autoencoders (AE), and DNN that are trained on the NSL-KDD dataset. CNN delivers remarkable performance when used in network threat detection with success metrics of 98.63% accuracy alongside 98.45% precision, 98.98% recall, and an F1-score of 98.72%, proving its efficiency for threat recognition. Visualization and comparative performance analysis further prove the model's effectiveness, paving the way for its possible use in safe network settings. The benefits of using DL frameworks to improve IDS systems are highlighted in this paper.
Keywords:
Cybersecurity, Intrusion Detection System, Secure Networks, Network Security, deep learning, NSL-KDD.
References:
1. H. Liu and B. Lang, “Machine learning and deep learning methods for intrusion detection systems: A survey,” 2019. doi: 10.3390/app9204396.
2. K. Kim and M. E. Aminanto, “Deep learning in intrusion detection perspective: Overview and further challenges,” in Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security, 2017. doi: 10.1109/IWBIS.2017.8275095.
3. R. Rama Devi and M. Abualkibash, “Intrusion Detection System Classification Using Different Machine Learning Algorithms on KDD-99 and NSL-KDD Datasets - A Review Paper,” Int. J. Comput. Sci. Inf. Technol., 2019, doi: 10.5121/ijcsit.2019.11306.
4. J. Jabez and B. Muthukumar, “Intrusion detection system (ids): Anomaly detection using outlier detection approach,” in Procedia Computer Science, 2015. doi: 10.1016/j.procs.2015.04.191.
5. V. K. Rahul, R. Vinayakumar, K. Soman, and P. Poornachandran, “Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security,” in 2018 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, 2018. doi: 10.1109/ICCCNT.2018.8494096.
6. S. Pandey, “MODERN NETWORK SECURITY: ISSUES AND CHALLENGES,” Int. J. Eng. Sci. Technol., vol. 3, 2011.
7. N. Aboueata, S. Alrasbi, A. Erbad, A. Kassler, and D. Bhamare, “Supervised machine learning techniques for efficient network intrusion detection,” in Proceedings - International Conference on Computer Communications and Networks, ICCCN, 2019. doi: 10.1109/ICCCN.2019.8847179.
8. K. Atefi, H. Hashim, and M. Kassim, “Anomaly analysis for the classification purpose of intrusion detection system with K-nearest neighbors and deep neural network,” in Proceeding - 2019 IEEE 7th Conference on Systems, Process and Control, ICSPC 2019, 2019. doi: 10.1109/ICSPC47137.2019.9068081.
9. A. Pattawaro and C. Polprasert, “Anomaly-Based Network Intrusion Detection System through Feature Selection and Hybrid Machine Learning Technique,” in International Conference on ICT and Knowledge Engineering, 2018. doi: 10.1109/ICTKE.2018.8612331.
10. B. Sezari, D. P. F. Moller, and A. Deutschmann, “Anomaly-Based Network Intrusion Detection Model Using Deep Learning in Airports,” in Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, 2018. doi: 10.1109/TrustCom/BigDataSE.2018.00261.
11. X. Zhang, P. Zhu, J. Tian, and J. Zhang, “An effective semi-supervised model for intrusion detection using feature selection based LapSVM,” in IEEE CITS 2017 - 2017 International Conference on Computer, Information and Telecommunication Systems, 2017. doi: 10.1109/CITS.2017.8035323.
12. N. Sen, R. Sen, and M. Chattopadhyay, “An effective back propagation neural network architecture for the development of an efficient anomaly-based intrusion detection system,” in Proceedings - 2014 6th International Conference on Computational Intelligence and Communication Networks, CICN 2014, 2014. doi: 10.1109/CICN.2014.221. Technology
13. R. Thomas and D. Pavithran, “A Survey of Intrusion Detection Models based on NSL-KDD Data Set,” in ITT 2018 - Information Trends: Emerging Technologies for Artificial Intelligence, 2018. doi: 10.1109/CTIT.2018.8649498.
14. B. Ingre and A. Yadav, “Performance analysis of NSL-KDD dataset using ANN,” in International Conference on Signal Processing and Communication Engineering Systems - Proceedings of SPACES 2015, in Association with IEEE, 2015. doi: 10.1109/SPACES.2015.7058223.
15. C. L. T. S. L. C. Y. C. C. Mohammadpour Leila, “A Convolutional Neural Network for Network,” A Convolutional Neural Netw. Netw. Intrusion Detect. Syst., p. 16, 2018.
16. Y. Ding and Y. Zhai, “Intrusion detection system for NSL-KDD dataset using convolutional neural networks,” in ACM International Conference Proceeding Series, 2018. doi: 10.1145/3297156.3297230.
17. R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, 2019, doi: 10.1109/ACCESS.2019.2895334.
18. X. Chen Chongzhen Zhang, Fangming Ruan, Lan Yin, “A deep learning approach for network intrusion detection based on NSL-KDD dataset,” IEEE, 2019.
19. S. Gurung, M. K. Ghose, and A. Subedi, “Deep Learning Approach on Network Intrusion Detection System using NSL KDD Dataset,” Int. J. Comput. Netw. Inf. Secur., 2019, doi: 10.5815/ijcnis.2019.03.02..
20. Routhu, K., Bodepudi, V., Jha, K. M., & Chinta, P. C. R. (2020). A Deep Learning Architectures for Enhancing Cyber Security Protocols in Big Data Integrated ERP Systems. Available at SSRN 5102662.
21. Chinta, P. C. R., & Katnapally, N. (2021). Neural Network-Based Risk Assessment for Cybersecurity in Big Data-Oriented ERP Infrastructures. Neural Network-Based Risk Assessment for Cybersecurity in Big Data-Oriented ERP Infrastructures.
22. Katnapally, N., Chinta, P. C. R., Routhu, K. K., Velaga, V., Bodepudi, V., & Karaka, L. M. (2021). Leveraging Big Data Analytics and Machine Learning Techniques for Sentiment Analysis of Amazon Product Reviews in Business Insights. American Journal of Computing and Engineering, 4(2), 35-51.
23. Karaka, L. M. (2021). Optimising Product Enhancements Strategic Approaches to Managing Complexity. Available at SSRN 5147875.
24. Chinta, P. C. R., & Karaka, L. M. AGENTIC AI AND REINFORCEMENT LEARNING: TOWARDS MORE AUTONOMOUS AND ADAPTIVE AI SYSTEMS.
25. Boppana, S. B., Moore, C. S., Bodepudi, V., Jha, K. M., Maka, S. R., & Sadaram, G. AI And ML Applications In Big Data Analytics: Transforming ERP Security Models For Modern Enterprises.
26. Chinta, P. C. R., Katnapally, N., Ja, K., Bodepudi, V., Babu, S., & Boppana, M. S. (2022). Exploring the role of neural networks in big data-driven ERP systems for proactive cybersecurity management. Kurdish Studies.
27. Chinta, P. C. R. (2022). Enhancing Supply Chain Efficiency and Performance Through ERP Optimisation Strategies. Journal of Artificial Intelligence & Cloud Computing, 1(4), 10-47363.
28. Sadaram, G., Sakuru, M., Karaka, L. M., Reddy, M. S., Bodepudi, V., Boppana, S. B., & Maka, S. R. (2022). Internet of Things (IoT) Cybersecurity Enhancement through Artificial Intelligence: A Study on Intrusion Detection Systems. Universal Library of Engineering Technology, (2022).
29. Moore, C. (2023). AI-powered big data and ERP systems for autonomous detection of cybersecurity vulnerabilities. Nanotechnology Perceptions, 19, 46-64.
30. Chinta, P. C. R. (2023). The Art of Business Analysis in Information Management Projects: Best Practices and Insights. DOI, 10.
31. Chinta, P. C. R. (2023). Leveraging Machine Learning Techniques for Predictive Analysis in Merger and Acquisition (M&A). Journal of Artificial Intelligence and Big Data, 3(1), 10-31586.
32. Krishna Madhav, J., Varun, B., Niharika, K., Srinivasa Rao, M., & Laxmana Murthy, K. (2023). Optimising Sales Forecasts in ERP Systems Using Machine Learning and Predictive Analytics. J Contemp Edu Theo Artific Intel: JCETAI-104.
33. Maka, S. R. (2023). Understanding the Fundamentals of Digital Transformation in Financial Services: Drivers and Strategic Insights. Available at SSRN 5116707.
34. Routhu, KishanKumar & Katnapally, Niharika & Sakuru, Manikanth. (2023). Machine Learning for Cyber Defense: A Comparative Analysis of Supervised and Unsupervised Learning Approaches. Journal for ReAttach Therapy and Developmental Diversities. 6. 10.53555/jrtdd.v6i10s(2).3481.
35. Chinta, Purna Chandra Rao & Moore, Chethan Sriharsha. (2023). Cloud-Based AI and Big Data Analytics for Real-Time Business Decision-Making. 36. 96-123. 10.47363/JAICC/2023.
36. Krishna Madhav, J., Varun, B., Niharika, K., Srinivasa Rao, M., & Laxmana Murthy, K. (2023). Optimising Sales Forecasts in ERP Systems Using Machine Learning and Predictive Analytics. J Contemp Edu Theo Artific Intel: JCETAI-104.
37. Bodepudi, V. (2023). Understanding the Fundamentals of Digital Transformation in Financial Services: Drivers and Strategic Insights. Journal of Artificial Intelligence and Big Data, 3(1), 10-31586.
38. Jha, K. M., Bodepudi, V., Boppana, S. B., Katnapally, N., Maka, S. R., & Sakuru, M. Deep Learning-Enabled Big Data Analytics for Cybersecurity Threat Detection in ERP Ecosystems.