ARTICLE
TITLE

IDSX-Attention: Intrusion detection system (IDS) based hybrid MADE-SDAE and LSTM-Attention mechanism

SUMMARY

An Intrusion Detection System (IDS) is essential for automatically monitoring cyber-attack activity. Adopting machine learning to develop automatic cyber attack detection has become an important research topic in the last decade. Deep learning is a popular machine learning algorithm recently applied in IDS applications. The adoption of complex layer algorithms in the term of deep learning has been applied in the last five years to increase IDS detection effectiveness. Unfortunately, most deep learning models generate a large number of false negatives, leading to dominant mistake detection that can affect the performance of IDS applications. This paper aims to integrate a statistical model to remove outliers in pre-processing, SDAE, responsible for reducing data dimensionality, and LSTM-Attention, responsible for producing attack classification tasks. The model was implemented into the NSL-KDD dataset and evaluated using Accuracy, F1, Recall, and Confusion metrics measures. The results showed that the proposed IDSX-Attention outperformed the baseline model, SDAE, LSTM, PCA-LSTM, and Mutual Information (MI)-LSTM, achieving more than a 2% improvement on average. This study demonstrates the potential of the proposed IDSX-Attention, particularly as a deep learning approach, in enhancing the effectiveness of IDS and addressing the challenges in cyber threat detection. It highlights the importance of integrating statistical models, deep learning, and dimensionality reduction mechanisms to improve IDS detection. Further research can explore the integration of other deep learning algorithms and datasets to validate the proposed model's effectiveness and improve the performance of IDS.

 Articles related

Abdulatif Alabdulatif, Sajjad Hussain Rizvi    

The rapid growth of the data-communications network for real-world commercial applications requires security and robustness. Network intrusion is one of the most prominent network attacks. Moreover, the variants of network intrusion have also been extens... see more


Andri Agung Riyadi, Fachri Amsury, Irwansyah Saputra, Tiska Pattiasina, Jupriyanto Jupriyanto    

Security in computer networks can be vulnerable, this is because we have weaknesses in making security policies, weak computer system configurations, or software bugs. Intrusion detection is a mechanism for securing computer networks by detecting, preven... see more


Saifudin Usman, Idris Winarno, Amang Sudarsono    

Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio... see more


Raghad Mohammed Hadi,Salma Hameedi Abdullah,Wafaa M. Salih Abedi    

MANTs are groups of mobiles hosts that arrange themselves into a grid lacking some preexist organization where the active network environment makes it simple in danger by an attacker. A node leaves out, and another node enters in the network, making it e... see more


Saqib Ali, Tahir Nadeem Malik    

Industrial Microgrids (IµG) are the large-scale buildings fortified with onsite Distributed Generations (DGs), energy storage, and demand response strategies. For optimal handling of these energy resources, storages, and loads to better match the power d... see more