ARTICLE
TITLE

IDSX-Attention: Intrusion detection system (IDS) based hybrid MADE-SDAE and LSTM-Attention mechanism

SUMMARY

An Intrusion Detection System (IDS) is essential for automatically monitoring cyber-attack activity. Adopting machine learning to develop automatic cyber attack detection has become an important research topic in the last decade. Deep learning is a popular machine learning algorithm recently applied in IDS applications. The adoption of complex layer algorithms in the term of deep learning has been applied in the last five years to increase IDS detection effectiveness. Unfortunately, most deep learning models generate a large number of false negatives, leading to dominant mistake detection that can affect the performance of IDS applications. This paper aims to integrate a statistical model to remove outliers in pre-processing, SDAE, responsible for reducing data dimensionality, and LSTM-Attention, responsible for producing attack classification tasks. The model was implemented into the NSL-KDD dataset and evaluated using Accuracy, F1, Recall, and Confusion metrics measures. The results showed that the proposed IDSX-Attention outperformed the baseline model, SDAE, LSTM, PCA-LSTM, and Mutual Information (MI)-LSTM, achieving more than a 2% improvement on average. This study demonstrates the potential of the proposed IDSX-Attention, particularly as a deep learning approach, in enhancing the effectiveness of IDS and addressing the challenges in cyber threat detection. It highlights the importance of integrating statistical models, deep learning, and dimensionality reduction mechanisms to improve IDS detection. Further research can explore the integration of other deep learning algorithms and datasets to validate the proposed model's effectiveness and improve the performance of IDS.

 Articles related

Fadlin Arsin,Muh. Yamin,La Surimi    

Kemampuan untuk mengakses dan menyediakan informasi ataupun data-data secara cepat dan akurat menjadi sangat dibutuhkan bagi sebuah organisasi, baik yang berupa organisasi komersial (perusahaan), instansi, perguruan tinggi, lembaga pemerintahan, maupun i... see more

Revista: semanTIK

Muhammad Sadam Husain,LM Fid Aksara,Natalis Ransi    

The use of computer networks uses the current wireless media that provides significant information that allows others to access the connection because they do not use cables.Techno's Studio is a company engaged in technology and is a company that uses wi... see more

Revista: semanTIK

Saidat Adebukola Onashoga,Adio Taofiki Akinwale,Opeyemi L. Amusa,Gboyega Adebayo    

Intrusion Detection Systems (IDSs) are an integral part of an organization's infrastructure. Without an IDS facility in place to monitor network and host activities, attempted and successful intrusion attempts may go unnoticed. This study proposed a Coll... see more


Bambang Sugiantoro    

As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later deve... see more


Muhammad Hanis Norli,Mardiana Mahari    

Issue of security is very paramount in any organization, especially organization that has confidential data. Therefore, this project intends to aid in security of the company by introducing intrusion detection system to the cloud service. This project is... see more