SSRN 4749820
SSRN 4749820
Abstract— In the year of 2022, all over glob 42% cyber-attacks swift response to potential threats. Traditional IDSs,
are increased as compared to the previous year 2021. Due to this however, may prove less effective against modern
growing number of cyber-attacks, there is necessary to develop sophisticated cyber- attacks. To enhance accuracy and
most effective Intrusion Detection System (IDS). In this paper robustness, the integration of data mining techniques,
we reviewed the different existing Intrusion Detection System
particularly those based on deep learning, has emerged as a
and their merits and demerits; also we reviewed the different
standard datasets by considering the different parameters. promising approach. Deep learning enables exhibit higher
Based on earlier finding we will propose new Intrusion precision and resilient behavior against cyber knowledge
Detection system which is implemented by Convolution Neural discovery and empowers IDSs to threats. While the adoption
Network (CNN) algorithm. This paper extends previous work of deep learning approaches holds great potential decision
and addresses this challenge by presenting a review of intrusion tree classifiers. They propose the RDTIDS (Rules and
detection systems utilizing deep learning approaches with the decision tree based intrusion technique) which
help of CNN algorithm and CSE (Communications Security employs binary and multi-class classifiers to minimize the
Establishment) -CIC (Canadian Institute for Cyber security) - impact of data imbalance.
IDS 2018. The main objective is to improve the accuracy and
reliability of detecting cyber -attacks on network- level
The researchers utilize the CIC-IDS-2017 dataset and explore
the outcomes achieved through deep learning models. The
Keywords: Intrusion detection system, Convolution Neural appropriate datasets that cover various benign and attack
Network, Cybersecurity. scenarios, align with real-world conditions, and are publicly
available is crucial for evaluating the performance of
. The main objective is to improve the accuracy and intrusion detection systems.
reliability of detecting cyber- attacks on network- level. The contributions of this study are multi-fold. Firstly, it is
generative/unsupervised models (deep auto encoders,
restricted Boltzmann machine, deep Boltzmann machines,
and deep belief networks). Furthermore, the performance of
Introduction each deep learning model is assessed using two real traffic
datasets, namely the CSE-CIC-IDS2018 dataset and the Bot-
With the increasing prevalence of cyber-attacks targeting IoT dataset. Lastly, a comparison is drawn between the
Critical National Infrastructures (CNIs) such as ports, performance of deep learning approaches and four traditional
hospitals, and energy providers, safeguarding these vital machine learning techniques: Naive Bayes, Artificial Neural
systems has become a matter of utmost importance. CNIs Network, Support Vector Machine, and Random Forests cost,
heavily rely on Supervisory Control and Data Acquisition and time overhead. The researchers utilize the SCADA
(SCADA) systems to manage their production processes system for security purposes and propose a foundation for
effectively. Protecting these Industrial Control Systems (ICS) real- time adaptive IDS. The main objective is to improve the
and CNIs has gained significant attention at organizational, accuracy and reliability of detecting cyber- attacks on
national, and European levels. In response to the growing network- level. The main objective is to improve the accuracy
risks faced by CNIs, several directives and regulations have and reliability of detecting cyber -attacks on network- level.
been issued by Europe in recent years, aiming to establish a
coherent framework for securing networks, information, and
electronic communications. However, beyond policy . Literature
measures, it is crucial to implement specific security
measures that address legal, organizational, capacity-building Ahmim et al. [1] introduces a new Intrusion Detection
and technical aspects of cyber security. System (IDS) called HCPTC-IDS. This system aims to boost
One essential aspect of securing systems against cyber- the identification of different cyber-attacks while keeping
attacks is the deployment of Intrusion Detection Systems false alarms to a minimum. HCPTC-IDS are designed with
(IDS). Positioned as the second line of defense, IDSs work two layers: the first layer is a tree-like structure with four
alongside other security mechanisms, including encryption levels, each representing a classifier. This structure
techniques, to fortify systems. By analyzing patterns of categorizes network connections into clusters such as Denial
benign traffic or specific attack rules, IDSs can effectively of Service (DoS), Probing attacks.
differentiate between normal and malicious actions, enabling
Berman et al. [4] focuses on deep learning (DL) methods for Ferrag et al. [9] examined different deep learning models for
cyber-security. It offers short explanations of various DL intrusion detection. They tested seven types of deep learning
techniques like deep auto-encoders, recurrent neural models, including deep neural networks, recurrent neural
networks, and more. As cyber-attacks become more complex, networks, convolution neural networks, restricted Boltzmann
traditional methods struggle to keep up, creating an machines, deep belief networks, deep Boltzmann machines,
opportunity to use DL to detect new attack variants. The and deep auto-encoders. They used the CSE-CIC-IDS 2018
paper reviews how DL is used to detect various cyber threats dataset and Tensor Flow for their experiments and evaluated
and covers training processes for different DL methods. It the models based on accuracy, detection rate, and false alarm
also highlights the need for considering the full attack rate. The goal was to compare the performance of these deep
lifecycle and emphasizes the importance of benchmark learning methods for intrusion detection, both discriminative
datasets for fair comparisons. and generative/unsupervised ones.
Buczak et al. [5] focuses on using machine learning (ML) Kurniabudi et al.[10] focuses on picking the most important
and data mining (DM) techniques for cyber-security and parts of data to make analyzing it faster and more accurate.
intrusion detection. The paper provides brief tutorials on The results show that having the right important parts of data
different ML/DM methods and discusses their relevance. The improves finding problems. One algorithm called "Random
importance of data sets for training these methods is Forest" does really well with a small number of important
highlighted, emphasizing the challenges of obtaining suitable parts, while another called "J48" is good with a bit more parts
data. The paper acknowledges the complexity of evaluating but takes longer. The study also shows that even though one
the methods and suggests criteria like accuracy, complexity, algorithm isn't as accurate, it can still find all the problems in
and time for classification. It also points out the need for certain cases. The study also found that the chosen important
labeled data and proposes the idea of collecting and labeling parts help reduce false alarms.
new data to enhance ML/DM methods for cyber-security.
Maglaras et al. [11] discusses the cyber security challenges
Dewa and Maglaras [6] discussed rapid technology growth faced by modern Supervisory Control and Data Acquisition
and increased connectivity creates cyber security challenges. (SCADA) systems, which play a vital role in monitoring and
The article explores existing IDS and suggests using data managing power generation and distribution. The paper
mining to enhance accuracy against new attacks. It highlights emphasizes the need for security methods that balance high
the need for accurate IDS due to rising cyber incidents and efficiency, real-time intrusion identification, and minimal
mentions testing methods like NSL-KDD dataset for modern overhead. The study highlights the importance of
networks. Despite progress, there's still a need for smarter safeguarding Industrial Control Systems (ICS), including
IDS to counter evolving cyber threats. SCADA and Distributed Control Systems (DCS), due to their
critical role in various sectors.
Dey[7] discusses challenges such as data availability, the
emergence of new machine learning algorithms, and the need Maimoet. Al.[12] suggests a fresh way to protect against
to address evolving cyber threats. The introduction of a novel cyber threats in 5G networks. They use advanced machine
attention-based CNN-LSTM model for intrusion detection learning to analyze network traffic and adapt their defense
using the IDS 2018 dataset is proposed. The review also system to changing conditions. This makes detection more
highlights the growing complexity of networks due to IoT efficient and saves resources. Tests show that their system
Anomaly Kurniabudi et CID-IDS-2017 28,30,743 Preprocessing: Datasets for IDS often undergo
preprocessing steps, such as cleaning, normalization, and
detection .al [10] feature extraction, to prepare the data for model training and
evaluation.
Scada -system Maglaras et al. - -
detection [12]
1. Data Mining Techniques: This method is crucial
for protecting networks and systems from cyber
CNN Model Nguyen & NSL-KDD 311,027 threats in which clustering helps in identifying
unusual patterns in network traffic, potentially
Kim[13]
signalling intrusions. The traffic is categorized as
Artificial Rekha et al. KDD1998 768 normal or malicious, based on data features. The
Neural anomaly detection spots deviations from typical
Network [14] behaviour, alerting to potential security breaches.
Machine Sharafaldin et CICIDS2017 2,830,743
Learning 2. Machine Learning Techniques: Machine learning
Algorithms al. [15] techniques are vital tools in the realm of cyber-
security. Deep Neural Networks (DNN) employs
One Class Stewart et al. DARPA dataset 4,900,000 multi-layer neural networks to effectively learn and
Support Vector
Machine [16] classify network traffic patterns, making them
(OCSVM) invaluable for precise intrusion detection. Support