Advancing Intrusion Detection: Application of Distributed Deep Learning on the KDD Cup 99 Dataset

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 6
Year of Publication : 2024
Authors : Agalit Mohamed Amine, El Youness Idrissi Khamlichi
pdf
How to Cite?

Agalit Mohamed Amine, El Youness Idrissi Khamlichi, "Advancing Intrusion Detection: Application of Distributed Deep Learning on the KDD Cup 99 Dataset," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 6, pp. 107-113, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I6P109

Abstract:

Intrusion Detection Systems (IDS) are crucial for protecting IT infrastructures against increasingly sophisticated and evolving threats. Faced with complex attacks such as stealthy or polymorphic threats, conventional methods based on rules or signatures show their limitations. An innovative IDS approach utilizing a deep neural network integrated into a distributed architecture for dynamic and precise network traffic analysis is introduced. Tested on the KDD Cup 99 dataset, this method demonstrated an accuracy of 99.90%, a recall of 99.89%, and a specificity of 100%, marking a significant improvement over traditional IDS systems. The exceptional performance obtained encourages the broader adoption of this system and suggests significant potential for revolutionizing IT security practices. The implications of the findings for current security strategies are also discussed, and directions for future research are proposed.

Keywords:

Intrusion detection, Deep learning, Distributed IDS architecture, KDD Cup 99, Cybersecurity.

References:

[1] Ayuba John et al., “Cluster-Based Wireless Sensor Network Framework for Denial-of-Service Attack Detection Based on Variable Selection Ensemble Machine Learning Algorithms,” Intelligent Systems with Applications, vol. 22, pp. 1-12, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Dandy Pramana Hostiadi et al., “A New Approach of Botnet Activity Detection Models Using Combination of Univariate and ANOVA Feature Selection Techniques,” International Journal of Intelligent Engineering and Systems, vol. 17, no. 3, pp. 485-502, 2024.  
[CrossRef] [Google Scholar] [Publisher Link]
[3] Rami Sihwail, Mariam Al Ghamri, and Dyala Ibrahim, “An Enhanced Model of Whale Optimization Algorithm and K-Nearest Neighbors for Malware Detection,” International Journal of Intelligent Engineering and Systems, vol. 17, no. 3, pp. 606-621, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Ammaiyappan Kavitha, and Valavandan Srinivasan Meenakshi, “Collaborative Attackers Detection and Route Optimization by Swarm Intelligentbased Q-learning in MANETs,” International Journal of Intelligent Engineering and Systems, vol. 17, no. 3, pp. 563-574, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Young-Woo Hong, and Dong-Young Yoo, “Multiple Attack Detection Using SHAP and Heterogeneous Ensemble Model in UAV's Controller Area Network,” Preprints, Computer Science and Mathematics, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Widi Santoso, Rahayu Safitri, and Samidi, “Integration of Artificial Intelligence in Facial Recognition Systems for Software Security, Sinkron : Journal and Research in Informatics Engineering, vol. 8, no. 2, pp. 1208-1214, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Teoh Chun Hwung, and Yuhanis Yusof, “Enhanced Network Security: A Data Mining Approach to Intrusion Detection,” Journal of Digital System Development, vol. 2, no. 1, pp. 140–153, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Mahbod Tavallaee et al., “A Detailed Analysis of the KDD CUP 99 Dataset,” 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, pp. 1-6, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Hadeel M. Saleh, Hend Marouane, and Ahmed Fakhfakh, “A Comprehensive Analysis of Security Challenges and Countermeasures in Wireless Sensor Networks Enhanced by Machine Learning and Deep Learning Technologies,” International Journal of Safety and Security Engineering, vol. 14, no. 2, pp. 373-386, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Rodrigo Branco, Vinicius Cogo, and Iberia Medeiros, “Towards a Web Application Attack Detection System based on Network Traffic and Log Classification,” Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE, Angers, France, vol. 1, pp. 692-699, 2024. [CrossRef] [Google Scholar] [Publisher Link]
[11] Tong Lei et al., “Simulation of Automatically Annotated Visible and Multi/Hyperspectral Images Using the Helios 3D Plant and Radiative Transfer Modeling Framework,” Plant Phenomics A Science Partner Journal, vol. 6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Khawlah Harahsheh, Rami Al-Naimat, and Chung-Hao Chen, “Using Feature Selection Enhancement to Evaluate Attack Detection in the Internet of Things Environment,” Electronics, vol. 13, no. 9, pp. 1-16, 2024.  
[CrossRef] [Google Scholar] [Publisher Link]
[13] Hyungchul Im, Donghyeon Lee, and Seongsoo Lee, “A Novel Architecture for an Intrusion Detection System Utilizing Cross-Check Filters for In-Vehicle Networks,” Sensors, vol. 24, no. 9, pp. 1-20, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mohamed Aly Bouke et al., “Application of Bukagini Algorithm for Enhanced Feature Interaction Analysis in Intrusion Detection Systems,” PeerJ Computer Science, vol. 10, pp. 1-26, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Menghao Fang et al., “Reinventing Web Security: An Enhanced Cycle-Consistent Generative Adversarial Network Approach to Intrusion Detection,” Electronics, vol. 13, no. 9, pp. 1-21, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Uneneibotejit Otokwala, Andrei Petrovski, and Harsha Kalutarage, “Optimized Common Features Selection and Deep-Autoencoder (OCFSDA) for Lightweight Intrusion Detection in Internet of Things,” International Journal of Information Security, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[17] J. Jayapradha et al., “Intrusion Detection System for Phishing Detection Using Convolution Neural Network,” International Journal of Computing and Digital Systems, pp. 1-10, 2024.
[Google Scholar] [Publisher Link]
[18] R Vinayakumar, K.P. Soman, and Prabaharan Poornachandran, “Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS),” International Journal of Information System Modeling and Design, vol. 8, no. 3, pp. 43-63, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Jiawei Han, Jian Pei, and Hanghang Tong, Data Mining: Concepts and Techniques, Elsevier Science, pp. 1-752, 2022.
[Google Scholar] [Publisher Link]
[20] David M.W. Powers, “Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness and Correlation,” Journal of Machine Learning Technologies, vol. 2, no. 1, pp. 37-63, 2011.  
[CrossRef] [Google Scholar] [Publisher Link]
[21] Teeb Hussein Hadi, “Deep Learning-Based DDoS Detection in Network Traffic Data,” International Journal of Electrical and Computer Engineering Systems, vol. 15, no. 5, pp. 404-414, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] G. Anusha, Gouse Baigmohammad, and Uma Mageswari, “Detection of Cyber-Attacks on IoT based Cyber-Physical Systems,” MATEC Web of Conferences, International Conference on Multidisciplinary Research and Sustainable Development (ICMED 2024), vol. 392, pp. 1-9, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Zhen Wang et al., “An Efficient Intrusion Detection Model Based on Convolutional Spiking Neural Network,” Scientific Reports, vol. 14, no. 1, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Rasha Gaffer M. Helali, “Phishing Detection Using Hybrid Machine Learning Techniques,” Journal of China University of Mining and Technology, vol. 29, no. 2, pp. 45-52, 2024.
[Publisher Link]
[25] Abdulhafiz Nuhu et al., “Distributed Denial of Service Attack Detection in IoT Networks Using Deep Learning and Feature Fusion: A Review,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 1, pp.  47-70, 2024.
[CrossRef] [Google Scholar] [Publisher Link] 
[26] Sandeep Reddy Gudimetla, “Cloud Malware Protection Strategies,” International Research Journal of Modernization in Engineering Technology and Science, vol. 6, no. 3, pp. 4325-4326, 2024.
[CrossRef] [Publisher Link]
[27] Faizan Younas et al., “An Efficient Artificial Intelligence Approach for Early Detection of Cross-Site Scripting Attacks,” Decision Analytics Journal, vol. 11, pp. 1-13, 2024.  
[CrossRef] [Google Scholar] [Publisher Link]
[28] Richa Singh, Nidhi Srivastava, and Ashwani Kumar, “Machine Learning Techniques for Anomaly Detection in Network Traffic,” 2021 Sixth International Conference on Image Information Processing, Shimla, India, pp. 261-266, 2021.  
[CrossRef] [Google Scholar] [Publisher Link]