Skip to main content

Advertisement

Log in

Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment

  • 1174: Futuristic Trends and Innovations in Multimedia Systems Using Big Data, IoT and Cloud Technologies (FTIMS)
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, there is an exponential increase in the growth of the multimedia data, which is being generated from zettabyte to petabyte scale. At the same time, security issues in networks, Internets and organizations are also continues to increase. The process of finding intrusions in such a big data environment is not easier. Different types of intrusion-detection system (IDS) have been presented for diverse kinds of networking attacks, however, many models could be identified unknown attacks. Deep learning (DL) approaches lately employed to large-scale big data analysis for effectual outcome. In this view, this paper presents a new deep learning based hyperparameter search (HPS) convolutional neural network with Bi-directional long short term memory (CBL) model called HPS-CBL for intrusion detection in big data environment. The HPS-CBL model make use of CBL technique for the identification of intrusions in the network. Since the proper tuning of hyperparameters of the CBL network is highly important, the proposed model uses improved genetic algorithm (IGA) for hyperparameter tuning. The proposed HPS-CBL is validated using a UNSW-NB15 dataset and the results are validated under diverse evaluation parameters. The obtained experimental outcome clearly stated the superior nature of the HPS-CBL model over the compared methods by attaining a maximum precision of 99.24%, recall of 98.69%, F-score of 98.97% and accuracy of 98.18% respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Al-Zewairi M, Almajali S, Awajan A (2017) Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: New trends in computing sciences (ICTCS), 2017 international conference on. IEEE, Amman, Jordan

  2. Alzahrani AO, Alenazi MJ (2021) Designing a network intrusion detection system based on machine learning for software defined networks. Fut Internet 13(5):111

    Article  Google Scholar 

  3. Andreu-Perez J, Poon CCY, Merrifield RD, Wong STC, Yang GZ (2015) Big data for health. IEEE J Biomed Heal Informat 19:1193–1208. https://doi.org/10.1109/JBHI.2015.2450362

    Article  Google Scholar 

  4. Belouch M, El Hadaj S, Idhammad Mo (2017) Two-stage classifier approach using RepTree algorithm for network intrusion detection. Int J Adv Comput Sci Appl 8(6):389–394

    Google Scholar 

  5. Belouch M, El Hadaj S, Idhammad M (2018) Performance evaluation of intrusion detection based on machine learning using Apache Spark. Procedia Comput Sci 127(2018):1–6

    Article  Google Scholar 

  6. Bengio Y, LeCun Y (2007) Scaling learning algorithms towards, AI. In: Bottou L, Chapelle O, DeCoste D, Weston J (eds) Large scale kernel machines, vol 34. MIT Press, Cambridge, MA, pp 321–360

    Google Scholar 

  7. Coelho F, Braga A, Verleysen M (2012) Cluster homogeneity as a semisupervised principle for feature selection using mutual information. In: ESANN. Bruges, Belgium 2012

  8. Dahiya P, Srivastava D (2018) Network intrusion detection in big dataset using spark. Procedia Comput Sci 132:253–262

    Article  Google Scholar 

  9. Denning D (1986) An intrusion-detection model. In: IEEE computer society symposium on research security and privacy, pp 118–131

  10. Goodfellow I, Lee H, Le QV, Saxe A, Ng AY (2009) Measuring invariances in deep networks. In: Advances in neural information processing systems. Curran Associates, Inc, pp 646–654

  11. Gupta GP, Kulariya M (2016) A framework for fast and efficient cyber security network intrusion detection using apache spark. Procedia Comput Sci 93:824–831

    Article  Google Scholar 

  12. Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in big data environment. Inf Sci 513:386–396

    Article  Google Scholar 

  13. Hinton G, Deng L, Yu D, Mohamed A-R, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Sainath T, Dahl G, Kingsbury B (2012) Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. Signal Process Mag IEEE 29(6):82–97

    Article  Google Scholar 

  14. Khan FA, Gumaei A (2019) A comparative study of machine learning classifiers for network intrusion detection. International conference on artificial intelligence and security. Springer, Cham, pp 75–86

    Google Scholar 

  15. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pp 1097–1105

  16. Larochelle H, Bengio Y, Louradour J, Lamblin P (2009) Exploring strategies for training deep neural networks. J Mach Learn Res 10:1–40

    MATH  Google Scholar 

  17. Long F, Zhou K, Ou W (2019) Sentiment analysis of text based on bidirectional LSTM with multi-head attention. IEEE Access 7:141960–141969

    Article  Google Scholar 

  18. Martin-Sanchez F, Verspoor K (2014) Big data in medicine is driving big changes. Yearb Med Inform 9:14–20. https://doi.org/10.15265/IY-2014-0020

    Article  Google Scholar 

  19. Moustafa N, Slay J (2018) The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J 25(1–3):18–31

    Google Scholar 

  20. Nguyen PT, Huynh VDB, Vo KD, Phan PT, Elhoseny M, Le DN (2021) Deep learning based optimal multimodal fusion framework for intrusion detection systems for healthcare data. Comput Mater Continua 66(3):2555–2571

    Article  Google Scholar 

  21. Primartha R, Tama B (2017) Anomaly detection using random forest: a performance revisited. In: Data and software engineering (ICoDSE), 2017 international conference on. IEEE, Palembang Sumatra Selatan, Indonesia.

  22. Salakhutdinov R, Hinton GE (2009) Deep boltzmann machines. In: International conference on, artificial intelligence and statistics. JMLR.org, pp 448–455

  23. Sharafaldin I, Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP. Funchal, Madeira - Portugal

  24. Salih AA, Abdulazeez AM (2021) Evaluation of classification algorithms for intrusion detection system: a review. J Soft Comput Data Min 2(1):31–40

    Google Scholar 

  25. Sedig K, Ola O (2014) The challenge of big data in public helth: an opportunity for visual analytics. J Public Health Inform 5:1–21. https://doi.org/10.5210/ojphi.v5i3.4933

    Article  Google Scholar 

  26. Thakur, S., Chakraborty, A., De, R., Kumar, N. and Sarkar, R., 2021. Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Computers & Electrical Engineering, 91, p. 107044.

  27. Uthayakumar J, Vengattaraman T, Dhavachelvan P (2017) Swarm intelligence based classification rule induction (CRI) framework for qualitative and quantitative approach: an application of bankruptcy prediction and credit risk analysis. J King Saud Univ Comput Inf Sci

  28. Vijayanand R, Devaraj D, Kannapiran B (2018) Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput Secur 77:304–314

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shankar.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pustokhina, I.V., Pustokhin, D.A., Lydia, E.L. et al. Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment. Multimed Tools Appl 81, 34951–34968 (2022). https://doi.org/10.1007/s11042-021-11271-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11271-7

Keywords

Navigation