Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks

被引:1
|
作者
El Asry, Chadia [1 ]
Benchaji, Ibtissam [1 ]
Douzi, Samira [2 ]
El Ouahidi, Bouabid [1 ]
机构
[1] Mohammed V Univ, Fac Sci, Intelligent Proc & Secur Syst IPSS, Rabat, Morocco
[2] Mohammed V Univ Rabat, Fac Med & Pharm FMPR, Rabat, Morocco
关键词
Intrusion detection systems; deep learning; SHapley Additive exPlanations (SHAP) values; Long-Short- Term-Memory (LSTM); feature selection;
D O I
10.12720/jait.15.9.1070-1078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new approach to improve the detection of network security by combining feature selection with Long-Short-Term-Memory (LSTM) approaches. The SHapley Additive exPlanations (SHAP) values approach is utilized for feature selection, in conjunction with cross-validation, to identify the most effective set of features that improve model recall for each specific sort of assault. We employ the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset to train and assess the efficacy of our model. The suggested model exhibits greater performance in comparison to standard LSTM models when utilizing all features. Furthermore, it surpasses current leading models with an accuracy of 99.74%, precision of 95.42%, recall of 94.92%, and F1-Score of 94.90%. In addition, the model demonstrates outstanding aptitude in precisely detecting Remote-to-Local (R2L) and User-to-Root (U2R) attacks, which are complex forms of intrusions that exploit vulnerabilities to gain unauthorized access to systems or networks. Although infrequent, these assaults provide a substantial risk because they have the ability to do substantial harm and compromise confidential data.
引用
收藏
页码:1070 / 1078
页数:9
相关论文
共 50 条
  • [41] Fault Detection for Low-Voltage Residential Distribution Systems With Low-Frequency Measured Data
    Shafiei, Mehdi
    Golestaneh, Faranak
    Ledwich, Gerard
    Nourbakhsh, Ghavameddin
    Gooi, Hoay Beng
    Arefi, Ali
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5265 - 5273
  • [42] An Effective Method for Improving Low-Frequency Response of Geophone
    Ma, Kai
    Wu, Jie
    Ma, Yubo
    Xu, Boyi
    Qi, Shengyu
    Jiang, Xiaochang
    SENSORS, 2023, 23 (06)
  • [43] A SIMPLE EFFECTIVE HAMILTONIAN FOR LOW-FREQUENCY LINEAR RESPONSES
    HARRIS, RA
    PRATT, L
    CHEMICAL PHYSICS LETTERS, 1993, 203 (04) : 399 - 403
  • [44] Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
    Apruzzese, Giovanni
    Andreolini, Mauro
    Ferretti, Luca
    Marchetti, Mirco
    Colajanni, Michele
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03):
  • [45] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Omar E. Elejla
    Bahari Belaton
    Mohammed Anbar
    Ahmad Alnajjar
    Neural Computing and Applications, 2018, 30 : 45 - 56
  • [46] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [47] Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning
    Yang, Ziyuan
    Qu, Haipeng
    Hua, Ying
    Zhang, Xiaoshuai
    Lin, Xijun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 146 - 157
  • [48] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Elejla, Omar E.
    Belaton, Bahari
    Anbar, Mohammed
    Alnajjar, Ahmad
    NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01): : 45 - 56
  • [49] Brief of Intrusion Detection Systems in Detecting ICMPv6 Attacks
    Bdair, Adnan Hasan
    Abdullah, Rosni
    Manickam, Selvakumar
    Al-Ani, Ahmed K.
    COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 : 199 - 213
  • [50] Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers
    Liu, Tzong-Jye
    COMPUTER JOURNAL, 2024, 67 (02): : 728 - 745