Skip to main content

Assessment of Network Intrusion Detection System Based on Shallow and Deep Learning Approaches

  • Conference paper
  • First Online:
Emerging Technologies in Computer Engineering: Cognitive Computing and Intelligent IoT (ICETCE 2022)

Abstract

This extensive review aims to classify the Intrusion Detection System (IDS) and various machine learning and deep learning (ML/DL) approaches used for IDS. The survey also addresses security, which is a concern with the Internet of Things. Several types of intrusion detection systems (IDSs), including shallow and deep learning methods and various learning algorithms to aid intrusion detection, are also categorized. This research expands on Network Intrusion Detection Systems and investigates techniques for improving their performance. It provides a more comprehensive understanding of deep and shallow learning methodologies with their benefits and drawbacks. The study component examines IDS classification, feature extraction techniques, machine learning, deep learning, and examples of how these may be applied. The essence of this review will establish a viable approach to assist professionals in modeling trustworthy and powerful IDS based on real-time requirements. Because the methods of intrusions and cyberattacks in networks are constantly evolving, it attracted the interest of many scholars and industrial professionals. However, cyber specialists struggle to develop an accurate and effective Intrusion Detection System (IDS). In addition, an increasing number of devices has resulted in more complicated network topology, raising security risks. As a result, a lengthy and exhaustive review is indispensable while developing a secure communication system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chand, N., Mishra, P., Krishna, C.R., Pilli, E.S., Govil, M.C.: A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection. In: 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), pp. 1–6. IEEE, April 2016

    Google Scholar 

  2. Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26–41 (1994)

    Article  Google Scholar 

  3. Jonnalagadda, S.K., Reddy, R.P.: A literature survey and comprehensive study of intrusion detection. Int. J. Comput. Appl. 81(16), 40–47 (2013)

    Google Scholar 

  4. Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 1–29 (2014)

    Article  Google Scholar 

  5. Masduki, B.W., Ramli, K., Saputra, F.A., Sugiarto, D.: Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In: 2015 International Conference on Quality in Research (QiR), pp. 56–64. IEEE, August 2015

    Google Scholar 

  6. Hodo, E., Bellekens, X., Iorkyase, E., Hamilton, A., Tachtatzis, C., Atkinson, R.: Machine learning approach for detection of nontor traffic. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1–6, August 2017

    Google Scholar 

  7. Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Ann. Télécommun. 55(7), 361–378 (2000)

    Article  Google Scholar 

  8. Axelsson, S.: Intrusion detection systems: a survey and taxonomy. 2000. Chalmers University of Technology, Goteborg, Sweden (2005)

    Google Scholar 

  9. hafez Amer, S., Hamilton Jr, J.A.: Intrusion detection systems (IDS) taxonomy-a short review. This is a paid advertisement. STN 13-2 June 2010: Defensive Cyber Secur.: Policies Procedures 2, 23 (2010)

    Google Scholar 

  10. Xenakis, C., Panos, C., Stavrakakis, I.: A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Comput. Secur. 30(1), 63–80 (2011)

    Article  Google Scholar 

  11. Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)

    Article  Google Scholar 

  12. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. 31(8), 805–822 (1999)

    Article  Google Scholar 

  13. Mounji, A., Le Charlier, B.: Continuous assessment of a unix configuration: Integrating intrusion detection and configuration analysis. In: Proceedings of SNDSS 1997: Internet Society 1997 Symposium on Network and Distributed System Security, pp. 27–35. IEEE, February 1997

    Google Scholar 

  14. Liu, S., et al.: A flow-based method to detect penetration. In: The 7th IEEE/International Conference on Advanced Infocomm Technology, pp. 184–191. IEEE, November 2014

    Google Scholar 

  15. Kozushko, H.: Intrusion detection: host-based and network-based intrusion detection systems. Independent Study 11, 1–23 (2003)

    Google Scholar 

  16. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)

    Article  Google Scholar 

  17. Qayyum, A., Islam, M.H., Jamil, M.: Taxonomy of statistical based anomaly detection techniques for intrusion detection. In: Proceedings of the IEEE Symposium on Emerging Technologies, pp. 270–276. IEEE, September 2005

    Google Scholar 

  18. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)

    Article  Google Scholar 

  19. Pillai, T.R., Palaniappan, S., Abdullah, A., Imran, H.M.: Predictive modeling for intrusions in communication systems using GARMA and ARMA models. In: 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1–6. IEEE, February 2015

    Google Scholar 

  20. Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, p. 240. IEEE Computer Society, May 1992

    Google Scholar 

  21. Lunt, T.F.: A survey of intrusion detection techniques. Comput. Secur. 12(4), 405–418 (1993)

    Article  Google Scholar 

  22. Poston, H.E.: A brief taxonomy of intrusion detection strategies. In: 2012 IEEE National Aerospace and Electronics Conference (NAECON), pp. 255–263. IEEE, July 2012

    Google Scholar 

  23. Kuperman, B.A.: A categorization of computer security monitoring systems and the impact on the design of audit sources. Doctoral dissertation, Purdue University (2004)

    Google Scholar 

  24. Ghorbani, A.A., Lu, W., Tavallaee, M.: Network attacks. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. Advances in Information Security, vol. 47, pp. 1–25. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-88771-5_1

  25. Nguyen, H.T., Franke, K., Petrovic, S.: Feature extraction methods for intrusion detection systems. In: Threats, Countermeasures, and Advances in Applied Information Security, pp. 23–52. IGI Global (2012)

    Google Scholar 

  26. Mahoney, M.V., Chan, P.K.: An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 220–237. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45248-5_13

    Chapter  Google Scholar 

  27. Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. (TiSSEC) 3(4), 227–261 (2000)

    Article  Google Scholar 

  28. Onik, A.R., Haq, N.F., Mustahin, W.: Cross-breed type Bayesian network based intrusion detection system (CBNIDS). In: 2015 18th International Conference on Computer and Information Technology (ICCIT), pp. 407–412. IEEE, December 2015

    Google Scholar 

  29. Bode, M.A., Oluwadare, S.A., Alese, B.K., Thompson, A.F.B.: Risk analysis in cyber situation awareness using Bayesian approach. In: 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–12. IEEE, June 2015

    Google Scholar 

  30. Padmadas, M., Krishnan, N., Kanchana, J., Karthikeyan, M.: Layered approach for intrusion detection systems based genetic algorithm. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–4. IEEE, December 2013

    Google Scholar 

  31. Wang, G., Yeung, D.Y., Lochovsky, F.H.: A kernel path algorithm for support vector machines. In: Proceedings of the 24th International Conference on Machine Learning, pp. 951–958, June 2007

    Google Scholar 

  32. Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121–167 (1998)

    Article  Google Scholar 

  33. Senthilnayaki, B., Venkatalakshmi, K., Kannan, A.: Intrusion detection using optimal genetic feature selection and SVM based classifier. In: 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), pp. 1–4. IEEE, March 2015

    Google Scholar 

  34. Shi, K., Li, L., Liu, H., He, J., Zhang, N., Song, W.: An improved KNN text classification algorithm based on density. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 113–117. IEEE, September 2011

    Google Scholar 

  35. Canbay, Y., Sagiroglu, S.: A hybrid method for intrusion detection. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 156–161. IEEE, December 2015

    Google Scholar 

  36. Zhang, H., Chen, G.: The research of face recognition based on PCA and K-nearest neighbor. In: 2012 Symposium on Photonics and Optoelectronics, pp. 1–4. IEEE, May 2012

    Google Scholar 

  37. Mahrishi, M., Hiran, K.K., Meena, G., Sharma, P. (eds.): Machine Learning and Deep Learning in Real-Time Applications. IGI Global (2020)

    Google Scholar 

  38. Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. (CSUR) 34(1), 1–47 (2002)

    Article  Google Scholar 

  39. Sahu, S., Mehtre, B.M.: Network intrusion detection system using J48 decision tree. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2023–2026. IEEE, August 2015

    Google Scholar 

  40. Rajasekaran, S., Pai, G.V.: Neural Networks, Fuzzy Logic and Genetic Algorithm: Synthesis and Applications (with CD). PHI Learning Pvt. Ltd. (2003)

    Google Scholar 

  41. Wahengbam, M., Marchang, N.: Intrusion detection in manet using fuzzy logic. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science, pp. 189–192. IEEE, March 2012

    Google Scholar 

  42. Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput. Commun. 30(10), 2201–2212 (2007)

    Article  Google Scholar 

  43. Om, H., Kundu, A.: A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In: 2012 1st International Conference on Recent Advances in Information Technology (RAIT), pp. 131–136. IEEE, March 2012

    Google Scholar 

  44. Gupta, S.: An effective model for anomaly IDS to improve the efficiency. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 190–194. IEEE, October 2015

    Google Scholar 

  45. Ayed, A.B., Halima, M.B., Alimi, A.M.: Survey on clustering methods: towards fuzzy clustering for big data. In: 2014 6th International conference of soft computing and pattern recognition (SoCPaR), pp. 331–336. IEEE, August 2014

    Google Scholar 

  46. Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)

    Article  Google Scholar 

  47. Dong, S., Zhou, D., Ding, W.: The study of network traffic identification based on machine learning algorithm. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks, pp. 205–208. IEEE, November 2012

    Google Scholar 

  48. Bi, J., Zhang, K., Cheng, X.: Intrusion detection based on RBF neural network. In: 2009 International Symposium on Information Engineering and Electronic Commerce, pp. 357–360. IEEE, May 2009

    Google Scholar 

  49. Zhang, C., Jiang, J., Kamel, M.: Comparison of BPL and RBF network in intrusion detection system. In: Wang, G., Liu, Q., Yao, Y., Skowron, A. (eds.) RSFDGrC 2003. LNCS, vol. 2639, pp. 466–470. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39205-X_79

    Chapter  Google Scholar 

  50. Barapatre, P., Tarapore, N. Z., Pukale, S.G., Dhore, M. L.: Training MLP neural network to reduce false alerts in IDS. In: 2008 International Conference on Computing, Communication and Networking, pp. 1–7. IEEE, December 2008

    Google Scholar 

  51. Murphy, K.P.: Machine Learning: A Probabilistic Perspective. MIT Press, Cambridge (2012)

    MATH  Google Scholar 

  52. Meena, G., Dhanwal, B., et al.: Performance comparison of network intrusion detection system based on different pre-processing methods and deep neural network. In: Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence, pp. 110–115. ACM (2021)

    Google Scholar 

  53. Kumar, V.D., Radhakrishnan, S.: Intrusion detection in MANET using self organizing map (SOM). In: 2014 International Conference on Recent Trends in Information Technology, pp. 1–8. IEEE, April 2014

    Google Scholar 

  54. Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527–1554 (2006)

    Article  MathSciNet  Google Scholar 

  55. Ng, A., et al.: Unsupervised feature learning and deep learning tutorial. CS294A Lecture (2013)

    Google Scholar 

  56. Bengio, Y.: Learning Deep Architectures for AI. Now Publishers Inc. (2009)

    Google Scholar 

  57. Deng, L.: A tutorial survey of architectures, algorithms, and applications for deep learning. APSIPA Trans. Signal Inf. Process. 3, 1–29 (2014)

    Google Scholar 

  58. Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)

    Article  Google Scholar 

  59. Gao, N., Gao, L., Gao, Q., Wang, H.: An intrusion detection model based on deep belief networks. In: 2014 Second International Conference on Advanced Cloud and Big Data, pp. 247–252. IEEE, November 2014

    Google Scholar 

  60. Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019)

    Article  Google Scholar 

  61. Zeng, Q., Wu, S.: Anomaly detection based on multi-attribute decision. In: 2009 WRI Global Congress on Intelligent Systems, vol. 2, pp. 394–398. IEEE, May 2009

    Google Scholar 

  62. Tao, L.J., Hong, L.Y., Yan, H.: The improvement and application of a K-means clustering algorithm. In: 2016 IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 93–96. IEEE, July 2016

    Google Scholar 

  63. Gomez, J., Dasgupta, D.: Evolving fuzzy classifiers for intrusion detection. In: Proceedings of the 2002 IEEE Workshop on Information Assurance, vol. 6, no. 3, pp. 321–323, June 2002

    Google Scholar 

  64. Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: A hierarchical SOM-based intrusion detection system. Eng. Appl. Artif. Intell. 20(4), 439–451 (2007)

    Article  Google Scholar 

  65. Somwang, P., Lilakiatsakun, W.: Intrusion detection technique by using fuzzy ART on computer network security. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 697–702. IEEE, July 2012

    Google Scholar 

  66. Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

  67. Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366–64374 (2019)

    Article  Google Scholar 

  68. Hoque, M.S., Mukit, M., Bikas, M., Naser, A.: An implementation of intrusion detection system using genetic algorithm. arXiv preprint arXiv:1204.1336 (2012)

  69. Jabbar, M.A., Aluvalu, R., Reddy, S.S.S.: Intrusion detection system using Bayesian network and feature subset selection. In: 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–5. IEEE, December 2017

    Google Scholar 

  70. Ahmad, Z., et al.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Meena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Meena, G., Babita, Mohbey, K.K. (2022). Assessment of Network Intrusion Detection System Based on Shallow and Deep Learning Approaches. In: Balas, V.E., Sinha, G.R., Agarwal, B., Sharma, T.K., Dadheech, P., Mahrishi, M. (eds) Emerging Technologies in Computer Engineering: Cognitive Computing and Intelligent IoT. ICETCE 2022. Communications in Computer and Information Science, vol 1591. Springer, Cham. https://doi.org/10.1007/978-3-031-07012-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-07012-9_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-07011-2

  • Online ISBN: 978-3-031-07012-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics