Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks

被引:1
|
作者
El Asry, Chadia [1 ]
Benchaji, Ibtissam [1 ]
Douzi, Samira [2 ]
El Ouahidi, Bouabid [1 ]
机构
[1] Mohammed V Univ, Fac Sci, Intelligent Proc & Secur Syst IPSS, Rabat, Morocco
[2] Mohammed V Univ Rabat, Fac Med & Pharm FMPR, Rabat, Morocco
关键词
Intrusion detection systems; deep learning; SHapley Additive exPlanations (SHAP) values; Long-Short- Term-Memory (LSTM); feature selection;
D O I
10.12720/jait.15.9.1070-1078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new approach to improve the detection of network security by combining feature selection with Long-Short-Term-Memory (LSTM) approaches. The SHapley Additive exPlanations (SHAP) values approach is utilized for feature selection, in conjunction with cross-validation, to identify the most effective set of features that improve model recall for each specific sort of assault. We employ the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset to train and assess the efficacy of our model. The suggested model exhibits greater performance in comparison to standard LSTM models when utilizing all features. Furthermore, it surpasses current leading models with an accuracy of 99.74%, precision of 95.42%, recall of 94.92%, and F1-Score of 94.90%. In addition, the model demonstrates outstanding aptitude in precisely detecting Remote-to-Local (R2L) and User-to-Root (U2R) attacks, which are complex forms of intrusions that exploit vulnerabilities to gain unauthorized access to systems or networks. Although infrequent, these assaults provide a substantial risk because they have the ability to do substantial harm and compromise confidential data.
引用
收藏
页码:1070 / 1078
页数:9
相关论文
共 50 条
  • [31] LOW-FREQUENCY SYSTEMS .1.
    EARGLE, J
    DB-SOUND ENGINEERING MAGAZINE, 1982, 16 (06): : 16 - 18
  • [32] LOW-FREQUENCY DYNAMICS OF TOROIDAL SYSTEMS
    ROSENBLU.M
    BULLETIN OF THE AMERICAN PHYSICAL SOCIETY, 1968, 13 (02): : 302 - &
  • [33] Combined Deep Learning Approaches for Intrusion Detection Systems
    Alshattnawi, Sawsan
    Alshboul, Hadeel Rida
    International Journal of Interactive Mobile Technologies, 2024, 18 (19) : 144 - 155
  • [34] Approaches and Data Processing Techniques for Intrusion Detection Systems
    Srinivasu, Pakkurthi
    Avadhani, P. S.
    Korimilli, Vishal
    Ravipati, Prudhvi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 181 - 186
  • [35] A Comprehensive Review of Various Approaches to Intrusion Detection Systems
    Shinde, Swati
    Borde, Tejas
    Deo, Aditya
    Dhamak, Suraj
    Dungarwal, Shreyas
    INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 : 177 - 189
  • [36] A review on intrusion detection approaches in cloud security systems
    Singh, Satyapal
    Kubendiran, Mohan
    Sangaiah, Arun Kumar
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (04) : 361 - 374
  • [37] LOW-LEVEL LOW-FREQUENCY DETECTION SYSTEM
    LARSEN, NT
    REVIEW OF SCIENTIFIC INSTRUMENTS, 1962, 33 (11): : 1200 - &
  • [38] KINETIC AND FLUID APPROACHES TO LOW-FREQUENCY MAGNETOHYDRODYNAMICS - A COMPARISON
    HASSAM, AB
    PHYSICS OF FLUIDS, 1985, 28 (06) : 1684 - 1687
  • [39] Filtering approaches for interference suppression in low-frequency SAR
    Lamont-Smith, T.
    Hill, R. D.
    Hayward, S. D.
    Yates, G.
    Blake, A.
    IEE PROCEEDINGS-RADAR SONAR AND NAVIGATION, 2006, 153 (04) : 338 - 344
  • [40] HIGH AND LOW-FREQUENCY APPROACHES TO ACOUSTIC RADIATION PROBLEM
    MURRAY, MT
    JOURNAL OF SOUND AND VIBRATION, 1974, 34 (03) : 327 - 356