Open Access Open Access  Restricted Access Subscription or Fee Access

Design and Analysis of Intrusion Detection System Based on Ensemble Deep Neural Network and XAI


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/iremos.v16i3.23437

Abstract


One of the main aims of designing smart objects is to enhance the comfort and efficiency of living beings. The perspective of the Internet of Things (IoT) is rapidly evolving into a technology that provides smart environments. The practice of IoT in healthcare has automated the method of examining the health of patients in real-time.  In any real-world smart environment that focuses on the IoT model, privacy and security are considered critical. Any Security flaws in IoT-based systems generate security threats that impact intelligent environment applications and can lead to the loss or malicious replacement of important information. As a result, Intrusion Detection Systems (IDSs) developed for IoT environments are critical for justifying security threats. Design and development of an adaptable and robust intrusion detection system for unpredictable attacks is a challenging job. Today, deep learning, classical ML classifiers, and existing ensemble libraries are widely suggested to build such smart Intrusion Detection Systems. But it is difficult to find a suitable ensemble configuration for a particular dataset and develop a vigorous solution with good accuracy and trustable solution that also explain model output, and why the model made certain decisions. This research is focused on how to construct a smart fusion intrusion detection system with deep learning and ensemble-based learning strategy for intrusion detection to enhance the security of IoT devices. This Ensemble architecture is used by integrating 4 different Bidirectional LSTM as a Base classifier with XG BOOST as a Meta classifier, while explainable AI is used for its trustworthiness and interpretability.
Copyright © 2023 Praise Worthy Prize - All rights reserved.

Keywords


Internet of Things; Intrusion Detection Systems; Ensemble Classifier; LSTM; XG Boost

Full Text:

PDF


References


Z. Lu, and V. Thing, How Does It Detect A Malicious App? Explaining the Predictions of AI-based Android Malware Detector, IEEE 8th Intl Conference on Big Data Security on Cloud (Big Data Security), pp. 194-199, 2022.
https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00045

A. A Aburomman, M. B. I. Reaz, A novel SVM-kNN-PSO Ensemble Method for Intrusion Detection System, Applied Soft Computing Journal, Vol.38:360-372, 2016.
https://doi.org/10.1016/j.asoc.2015.10.011

M. Khatkar, K. Kumar, B. Kumar, and P. Agarwal, Parametric Influence of Intrusion Detection System in Healthcare Sector Using Deep Neural [LSTM] Network, Journal of Pharmaceutical Negative Results, Vol 14(Issue 11):685-692, November 2023.

A. A. Reyes, F. D. Vaca, G. A. C., Aguayo, Q. Niyaz, and V. Devabhaktuni, A Machine Learning Based Two-stage Wi-Fi Network Intrusion Detection System. Electronics (Switzerland): Vol. 9 (Issue 10), 1-18,2020.
https://doi.org/10.3390/electronics9101689

A. Nazir, and R.A. Khan, A Novel Combinatorial Optimization Based Feature Selection Method for Network Intrusion Detection. Computers and Security, Vol.102: 102164, January 2021.
https://doi.org/10.1016/j.cose.2020.102164

M. Rajasekaran, and A. Ayyasamy, A novel ensemble approach for the effective intrusion detection system. Second International Conference on Recent Trends and Challenges in Computational Models, pp.244-250, Tindivanam, India, 3-4 Feberuary 2017.
https://doi.org/10.1109/ICRTCCM.2017.27

A. Thakkar, and R. Lohiya, A Review of the Advancement in Intrusion Detection Datasets. Procedia Computer Science 167:636-645, 2020.
https://doi.org/10.1016/j.procs.2020.03.330

M., Torabi, I., Udzir, M. T., Abdullah, and R. Yaakob, A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System, International Journal of Advanced Computer Science and Applications, Vol. 12 (Issue 5):538-553, 2021.
https://doi.org/10.14569/IJACSA.2021.0120566

M. A. Khan, M. R. Karim, and Y. Kim, A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network, Symmetry, Vol. 11(Issue 4):583, April 2019.
https://doi.org/10.3390/sym11040583

Sohal, A., Kait, R., Analytical Workload Allocation for Optimized Power Consumption and Delay in Fog-Cloud Networks Using Particle Swarm Optimization Algorithm, (2023) International Review on Modelling and Simulations (IREMOS), 16 (1), pp. 5-12.
https://doi.org/10.15866/iremos.v16i1.23282

T. Nguyen, V. Dinh, N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, A Deep Learning Approach to Network Intrusion Detection, IEEE Transactions on Emerging Topics in Computational Intelligence, Vol.2 (Issue 1):1-10, November 2017.
https://doi.org/10.1109/TETCI.2017.2772792

A. M. Bamhdi, I. Abrar, and F. Masoodi, An Ensemble Based Approach for Effective Intrusion Detection using Majority Voting, Telkomnika (Telecommunication Computing Electronics and Control), Vol.19 (Issue 2): 664-671, April 2021.
https://doi.org/10.12928/telkomnika.v19i2.18325

H. P. Vinutha, and B. Poornima, An ensemble classifier approach on different feature selection methods for intrusion detection, Advances in Intelligent Systems and Computing (Springer, Vol.672, pp.442-451, 2018).
https://doi.org/10.1007/978-981-10-7512-4_44

D., Kshirsagar, and S. Kumar, An Ensemble Feature Reduction Method for Webattack Detection, Journal of Discrete Mathematical Sciences and Cryptography, Vol. 23(Issue 1):283-291, April 2020.
https://doi.org/10.1080/09720529.2020.1721861

T. Zebin, S. Rezvy, and Y. Luo, An Explainable AI-based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks, IEEE Transactions on Information Forensics and Security, Vol.17: 2339-2349, June 2022.
https://doi.org/10.1109/TIFS.2022.3183390

G. Kumar, An Improved Ensemble Approach for Effective Intrusion Detection. Journal of Supercomputing, Vol.76 (Issue 1): 275-291,2022.
https://doi.org/10.1007/s11227-019-03035-w

N. Acharya, and S. Singh, An IWD-based Feature Selection Method for Intrusion Detection System, Soft Computing, Vol.22(Issue 13): 4407-4416, 2018.
https://doi.org/10.1007/s00500-017-2635-2

Y. Zhou, G. Cheng, S. Jiang, and M. Dai, Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier, Computer Networks, Vol. 174:107247, 2020.
https://doi.org/10.1016/j.comnet.2020.107247

M. A. Jabbar, R. Aluvalu, S.S.S. Reddy, Cluster based ensemble classification for intrusion detection system. Proceedings of the 9th International Conference on Machine Learning and Computing, pp. 253-257, Singapore, 24 February 2017.
https://doi.org/10.1145/3055635.3056595

D. Pérez, S. Alonso, A. Morán, M. A. Prada, J. J. Fuertes, and M. Communications in Computer and Information Science (Springer, CCIS, Vol. 1000, pp. 463-475, 2019).
https://doi.org/10.1007/978-3-030-20257-6_40

D. Gaikwad, and R. Thool, DAR Ensemble: Decision tree and rule learner based ensemble for network intrusion detection system, Smart Innovation, Systems and Technologies (Springer, SIST, Vol.50., pp. 185-193.)
https://doi.org/10.1007/978-3-319-30933-0_20

R. Vinayakumar, A. Mamoun; K.P. Soman, S. Sriram, V. Sitalakshmi, Q. Pham, K. Simran, Deep Learning for Cyber Security Applications: A Comprehensive Survey.
https://doi.org/10.36227/techrxiv.16748161.v1

R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, Deep Learning Approach for Intelligent Intrusion Detection System, IEEE Access, Vol. 7: 41525-41550, 2019.
https://doi.org/10.1109/ACCESS.2019.2895334

F. Salo, A.B. Nassif, and A. Essex, Dimensionality Reduction with IG-PCA and Ensemble Classifier for Network Intrusion Detection. Computer Networks, Vol.148: 164-175, January 2019.
https://doi.org/10.1016/j.comnet.2018.11.010

A. Mahfouz, A. Abuhussein, D. Venugopal, and S. Shiva, Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset. Future Internet, Vol.12(Issue 11):180, October 2020.
https://doi.org/10.3390/fi12110180

R. Damaševičius, A. Venčkauskas, J. Toldinas and S. Grigaliūnas, Ensemble-based classification using neural networks and machine learning models for windows PE malware detection. Electronics (Switzerland), Vol.10(Issue 4):1-26, February 2021.
https://doi.org/10.3390/electronics10040485

Mohanad Sarhan, Siamak Layeghy, Marius Portmann, Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-Based Network Intrusion Detection, Big Data Research, Volume 30, 2022, 100359.
https://doi.org/10.1016/j.bdr.2022.100359

E. Jaw and X. Wang, Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach, Symmetry, Vol.13(Issue 10):1764, 2021.
https://doi.org/10.3390/sym13101764

M. Khatkar, K. Kumar, and B. Kumar, Unfolding the Network Dataset to Understand the Contribution of Features for Detecting Malicious Activities Using AI/ML, Materials Today: Proceedings, Vol.59 (Issue 3): 1824-1830, 2022.
https://doi.org/10.1016/j.matpr.2022.04.391

M. Khatkar, K. Kumar and B. Kumar, An overview of distributed denial of service and internet of things in healthcare devices, 2020 Research, Innovation, Knowledge Management and Technology Application for Business Sustainability (INBUSH), pp. 44-48, Greater Noida, India, February 2020.
https://doi.org/10.1109/INBUSH46973.2020.9392171

A. Binbusayyis and T. Vaiyapuri, Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach, IEEE Access, Vol. 7:106495-106513, 2019.
https://doi.org/10.1109/ACCESS.2019.2929487

A.Yulianto, P. Sukarno, and N.A. Suwastika, Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset. Journal of Physics: Conference Series, Vol.1192(Issue1):012018,2019.
https://doi.org/10.1088/1742-6596/1192/1/012018

Sri Vidhya, G., Nagarajan, R., Performance Analysis of Network Traffic Intrusion Detection System Using Machine Learning Technique, (2022) International Journal on Communications Antenna and Propagation (IRECAP), 12 (2), pp. 111-119.
https://doi.org/10.15866/irecap.v12i2.21724

Mora, E., Ordóñez Bueno, M., Gómez, C., Structural Vulnerability Assessment Procedure for Large Areas Using Machine Learning and Fuzzy Logic, (2021) International Review of Civil Engineering (IRECE), 12 (6), pp. 358-370.
https://doi.org/10.15866/irece.v12i6.19265

Bani Yassein, M., Shatnawi, M., Alomari, O., Users Awareness Prediction of Cyber Security Aspects in Twitter Using Machine Learning Algorithms, (2021) International Journal on Communications Antenna and Propagation (IRECAP), 11 (6), pp. 383-392.
https://doi.org/10.15866/irecap.v11i6.20725

Bou-Rabee, M., Bilal, M., Bashir, M., Ali, A., Forecasting the Solar Panels Power Output Based on Air Pollution and Weather in the Gulf Countries by Using Machine Learning, (2022) International Review of Electrical Engineering (IREE), 17 (6), pp. 570-577.
https://doi.org/10.15866/iree.v17i6.22714

Shatnawi, M., Bani Yassein, M., Aljawarneh, S., Alodibat, S., Meqdadi, O., Hmeidi, I., Al Zoubi, O., An Improvement of Neural Network Algorithm for Anomaly Intrusion Detection System, (2020) International Journal on Communications Antenna and Propagation (IRECAP), 10 (2), pp. 84-93.
https://doi.org/10.15866/irecap.v10i2.18735

Abidi, M., Fizazi, H., Boudali, N., Clustering of Remote Sensing Data Based on Spherical Evolution Algorithm, (2021) International Review of Aerospace Engineering (IREASE), 14 (2), pp. 72-79.
https://doi.org/10.15866/irease.v14i2.19209


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize