CFP last date
20 May 2024
Reseach Article

Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks

by Kyle Rozendaal, Thivanka Dissanayake-Mohottalalage, Akalanka Mailewa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 12
Year of Publication: 2022
Authors: Kyle Rozendaal, Thivanka Dissanayake-Mohottalalage, Akalanka Mailewa
10.5120/ijca2022922098

Kyle Rozendaal, Thivanka Dissanayake-Mohottalalage, Akalanka Mailewa . Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks. International Journal of Computer Applications. 184, 12 ( May 2022), 21-28. DOI=10.5120/ijca2022922098

@article{ 10.5120/ijca2022922098,
author = { Kyle Rozendaal, Thivanka Dissanayake-Mohottalalage, Akalanka Mailewa },
title = { Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks },
journal = { International Journal of Computer Applications },
issue_date = { May 2022 },
volume = { 184 },
number = { 12 },
month = { May },
year = { 2022 },
issn = { 0975-8887 },
pages = { 21-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number12/32376-2022922098/ },
doi = { 10.5120/ijca2022922098 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:21:16.238758+05:30
%A Kyle Rozendaal
%A Thivanka Dissanayake-Mohottalalage
%A Akalanka Mailewa
%T Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 12
%P 21-28
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Modern IDS use inflexible knowledge bases, rule sets and rely on human interaction for successful threat mitigation. While this approach to network and hardware security has been effective in the past, the explosion of large data breaches in the past few years reveals a lack of effective detection for unknown or undocumented threats.We infer that a change in detection and prevention of cybercrime needs to start at the system level and use more intelligent methods of attack detection and prevention: Neural Networks and Artificial Intelligence assisted IDS. This paper gives a broad overview of the modern state of IDS/IPS systems, discusses the benefits and drawbacks of modern implementation, gives a broad overview of current research into the field of neural network-based IDS, and discusses benefits and drawbacks of NNIDS systems. Finally, we conclude with a few examples of modern implementations of NNIDS and areas for future study in the field.

References
  1. Dissanayaka, A.M., Mengel, S., Gittner, L. and Khan, H., 2020. Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities. Cluster Computing, 23(3), pp.1955-1971.
  2. Siddique, K., Akhtar, Z., Khan, F.A. and Kim, Y., 2019. KDD Cup 99 data sets: a perspective on the role of data sets in network intrusion detection research. Computer, 52(2), pp.41-51.
  3. Thomas, R. and Pavithran, D., 2018. A survey of intrusion detection models based on NSL-KDD data set. 2018 Fifth HCT Information Technology Trends (ITT), pp.286-291.
  4. Injadat, M., Salo, F., Nassif, A.B., Essex, A. and Shami, A., 2018, December. Bayesian optimization with machine learning algorithms towards anomaly detection. In 2018 IEEE global communications conference (GLOBECOM) (pp. 1-6). IEEE.
  5. Hnamte, V. and Hussain, J., 2021, November. An Extensive Survey on Intrusion Detection Systems: Datasets and Challenges for Modern Scenario. In 2021 3rd International Conference on Electrical, Control and Instrumentation Engineering (ICECIE) (pp. 1-10). IEEE.
  6. S. Abraham and I. Chengalur-Smith, “An over- view of social engineering malware: Trends, tactics, and implications,” Technology in Society, vol. 32, no. 3, pp. 183–196, 2010.
  7. D. Pietro and L. V, “Intrusion detection systems,” Advances in information security, vol. 38, 2008.
  8. R. Singh, H. Kumar, R. K. Singla, and R. R. Ketti, “Internet attacks and intrusion detection system,” Online Information Review, vol. 41, no. 2, pp. 171–184, Oct. 2017.
  9. V. Prasanth, K. Mudireddy, J. Shanchieh, and Y. Shanchieh, “Error Analysis of Sequence Modeling for Projecting Cyber Attacks,” 2019.
  10. A. Shenfield, D. Day, and A. Ayesh, “Intelligent intrusion detection systems using artificial neural networks,” ICT Express, vol. 4, no. 2, pp. 95–99, 2018.
  11. A. Nisioti, A. Mylonas, P. D. Yoo, and V. Katos, “From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3369–3388, 2018.
  12. S. Patel and J. Sondhi, “A Review of Intrusion Detection Technique Using Various Technique of Machine Learning and Feature Optimization Technique,” International Journal of Computer Applica- tions (0975-8887), vol. 93, no. 14, pp. 43–47, May 2014.
  13. J. Shum and H. A. Malki, “Network Intrusion Detection System Using Neural Networks,” Fourth International Conferences on Natural Computation, pp. 242–246, Oct. 2018.
  14. Shun, Jimmy &MalkiHeidar. (2006). Network Intrusion Detection System Using Neural Networks.International Conference on Natural Computation, 242-246.
  15. Ahmad, A. B. Abdullah and A. S Alghamdi, “Application of Artificial Neural Network in detection of Probing Attacks, ” 2009 IEEE Symposium on Industrial Electronics & Applications, Kuala Lumpur, 2009, pp. 557-562doi: 10.1109/ISIEA.2009.5356382
  16. F. Haddadi, S. Khanchi, M. Shetabi, and V. Derhami, “Intrusion Detection and Attack Classification Using Feed-Forward Neural Network,” 2010 Second International Conference on Computer and Network Technology, pp. 262–266, 2010
  17. N. Sen, R. Sen and M. Chattopadhyay, “An Effective Back Propagation Neural Network Architecture for the Development of an Efficient Anomaly Based Intrusion Detection System,” 2014 Inter- national Conference on Computational Intelligence and Communication Networks, Bhopal, 2014, pp. 1052-1056doi: 10.1109/CICN.2014.221
  18. F. Gao, “Application of Generalized Regression Neural Network in Cloud Security Intrusion Detection,” 2017 International Conference on Robots & Intelligent System (ICRIS), Huai’an, 2017, pp. 54-57. doi: 10.1109/ICRIS.2017.21
  19. J. Maldonado and M.-C. Riff, “Improving Attack Detection of C4.5 Using an Evolutionary Algorithm,” IEEE Congress on Evolutionary Computation (CEC), pp. 2229–2235, Jun. 2019.
  20. P. A. A. Resende and A. C. Drummond, “Adaptive Anomaly-Based Intrusion Detection System using Algorithm and Profiling,” Security and Privacy, vol. 1, no. 4, Aug. 2018. https://doi.org/10.1002/ spy2.36
  21. G. Poojitha, K. N. Kumar, and P. J. Reddy, “Intrusion Detection using Artificial Neural Network,” 2010 Second International conference on Computing, Communication and Networking Technologies, 2010.
  22. Wang, L., Ye, J., Zhao, Y., Wu, W., Li, A., Song, S.L., Xu, Z. and Kraska, T., 2018, February. Superneurons: Dynamic GPU memory management for training deep neural networks. In Proceedings of the 23rd ACM SIGPLAN symposium on principles and practice of parallel programming (pp. 41-53).
  23. M. Malowidzki, P. Berezinski, and M. Mazur, “Network Intrusion Detection: Half a Kingdom for a Good Dataset,” Conference: NATO STO- IST- 139 Visual Analytics for Exploring, Analysing and Understanding Vast, Complex and Dynamic Data, pp. 1–6, Apr. 2015.
  24. Shoshitaishvili, Y., Bianchi, A., Borgolte, K., Cama, A., Corbetta, J., Disperati, F., Dutcher, A., Grosen, J., Grosen, P., Machiry, A. and Salls, C., 2018. Mechanical phish: Resilient autonomous hacking. IEEE Security & Privacy, 16(2), pp.12-22.
  25. C. Salls, R. Wang, C. Kruegel, and G. Vigna, “Rise of the HaCRS,” Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS 17, pp. 1–13, Aug. 2017.
  26. M. H. Ali, B. A. D. A. Mohammed, A. Ismail, and M. F. Zolkipli, “A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization,” IEEE Access, vol. 6, pp. 20255–20261, Apr. 2018
Index Terms

Computer Science
Information Sciences

Keywords

IDS/IPS Neural Network