№2, 2024
NETWORK CYBERSECURITY INCIDENTS MULTICLASSIFICATION BASED ON DEEP LEARNING
The rapid increase in network traffic and the growing complexity of cyberattacks have rendered traditional cybersecurity monitoring methods insufficient for effectively detecting and classifying network incidents. To overcome these limitations, we present a deep learning-based approach that utilizes a hybrid architecture, combining Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) models, for the multi-classification of cybersecurity incidents. Our model is trained on the CICIDS2017 dataset, which encompasses a wide range of attack types. The hybrid CNN-LSTM model achieved a classification accuracy of 96.76% and an error rate of 9.34%, showcasing its ability to accurately detect and classify various cybersecurity threats. This approach offers a robust solution for enhancing the detection and classification of network cybersecurity incidents (pp.16-23).
Alzahrani, M.Y., Bamhdi, A.M. (2022). Hybrid deep-learning model to detect botnet attacks over internet of things environments. Soft Comput 26, 7721–7735.
https://doi.org/10.1007/s00500-022-06750-4.
Belarbi, O., Khan, A., Carnelli, P., and Spyridopoulos, T. (2022). An intrusion detection system based on deep belief networks. Proceedings of the International Conference on Science of Cyber Security, Shimane, Japan, 10–12 August 2022, Volume 13580, 377–392.
https://doi.org/10.48550/arXiv.2207.02117.
Buczak, A. L., and Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys and Tutorials, 18(2), 1153–1176.
https://doi.org/10.1109/COMST.2015.2494502
Chawla, N. V., Bowyer, K. W., O., L., and Kegelmeyer, W. P. (2002). SMOTE: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16, 321–357.
https://doi.org/10.48550/arXiv.1106.1813
Chen Z. (2020). Deep Learning for Cybersecurity: A Review. International Conference on Computing and Data Science (CDS), 01-02 August 2020, Stanford, CA, USA.
https://doi.org/10.1109/CDS49703.2020.00009.
Halbouni A., Gunawan T., S., Habaebi M., H., Halbouni M., Kartiwi M., Ahmad R. (2022). CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System. IEEE Access, 10, 99837 – 99849.
https://doi.org/10.1109/ACCESS.2022.3206425.
Hochreiter, S., and Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735–1780.
https://doi.org/10.1162/neco.1997.9.8.1735
Juyal A., Bhushan B., Hameed A. A., Jamil A. (2023). Deep Learning Approaches for Cyber Threat Detection and Mitigation Proceedings of the 2023 7th International Conference on Advances in Artificial Intelligence, 34-41.
https://doi.org/10.1145/3633598.3633605.
Mbona I., and Eloff Jan H. P. (2022). Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches. IEEE Electron Device Letters 10(2): 69822-69838.
http://dx.doi.org/10.1109/ACCESS.2022.3187116.
Medvedieva K., Tosi T., Barbierato E., Gatti A. (2024). Balancing the Scale: Data Augmentation Techniques for Improved Supervised Learning in Cyberattack Detection. Eng, 5(3), 2170-2205.
https://doi.org/10.3390/eng5030114.
Otokwala, U., Petrovski, A., Kalutarage, H. (2021). Improving intrusion detection through training data augmentation. Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), article 17.
https://doi.org/10.1109/SIN54109.2021.9699293.
Roopak, M., Tian, G. Y., and Chambers, J. (2019). Deep learning models for cybersecurity in IoT networks. Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019, 452–457.
https://doi.org/10.1109/CCWC.2019.8666588
Toupas, P., Chamou, D., Giannoutakis, K. M., Drosou, A., and Tzovaras, D. (2019). An intrusion detection system for multi-class classification based on deep neural networks. Proceedings of the 18th IEEE International Conference on Machine Learning and Applications (ICMLA), Boca Raton, FL, USA, 16–19 December 2019, 1253–1258.
https://doi.org/10.1109/ICMLA.2019.00206
Tripathy, S., and Singh, R. (2021). Convolutional neural network: An overview and application in image classification. Proceedings of Third International Conference on Sustainable Computing, 145–153.
https://doi.org/10.1007/978-981-16-4538-9_15.
Upadhya, K., Kaur, P., and Prasad, S. (2021). A review on data-level approaches to address the class imbalance problem. International Conference on Recent Challenges in Engineering Science and Technology (ICRCEST), 2K21, 152–158.
Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., and Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525–41550.
https://doi.org/10.1109/ACCESS.2019.2895334
Xiao, Y., Xing, C., Zhang, T., and Zhao, Z. (2019). An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access, 7, 42210–42219.
https://doi.org/10.1109/ACCESS.2019.2904620
Yao, Y., Su, L., and Lu, Z. (2018). DeepGFL: Deep feature learning via graph for attack detection on flow-based network traffic. Proceedings of the MILCOM 2018 - IEEE Military Communications Conference (MILCOM), 579–584.
https://doi.org/10.1109/MILCOM.2018.8599821
Zhang, Y., Xu, C., Jin, L., Wang, X. Guo, D. (2019). Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data. IEEE Access, 7, 37004–37016.
https://doi.org/10.1109/ACCESS.2019.2905041