Abstract
Cyber-attacks have increased in recent years; however, the classic Network Intrusion Detection System based on feature selection by filtering has significant disadvantages that make it difficult to stop new attacks promptly. An anomaly-based hybrid deep learning system for detecting network intrusions is done by using various neural networks such as Gated Recurrent Unit (GRU) and Long short-term memory (LSTM). Extreme Gradient Boosting with Shapley Additive Explanations (SHAP) values-based supervised machine learning feature selection methods have been used to optimally select the number of features. Optimization techniques such as Adam and Root Mean Square Propagation (RMSPROP) are used to further enhance the performance of the deep learning classifier. Finally, the mechanism is examined using simulation characteristics including precision, accuracy, recall, and F1-score. The model is tested on two benchmark datasets, CICIDS2017 and UNSW-NB15. This sort of research aids in the identification of the optimal algorithm for predicting future cyber-attacks, especially in the vulnerable public healthcare industry.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kaur, S., Singh, M.: Hybrid intrusion detection and signature generation using Deep recurrent Neural Networks. Neural Comput. Appl. 32(12), 7859–7877 (2019). https://doi.org/10.1007/s00521-019-04187-9
Patel, A., Qassim, Q., Wills, C.: A survey of intrusion detection and prevention systems. Inf. Manag. Comput. Secur. 18(4), 277–290 (2010). https://doi.org/10.1108/09685221011079199
Maithem, M., Al-sultany, G.: Network intrusion detection system using deep neural network. J. Phys. Conf. Ser. 1804(1), 012–138 (2021). https://doi.org/10.1088/1742-6596/1804/1/012138
Mahhizharuvi, P., Seethalaksmi, A.V.: An effective intrusion detection system using enhanced multi relational fuzzy tree. Turk. J. Comput. Math. Educ. 12(13), 3152–3159 (2021)
Kim, J., Shin, N., Jo, S.Y., Kim, S.H.: Method of intrusion detection using deep neural network. In: IEEE International Conference on Big Data and Smart Computing (BigComp). IEEE (2017). https://doi.org/10.1109/bigcomp.2017.7881684
Firdausi, I., lim, C. , Erwin, A., Nugroho, A.S.: Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection. In: 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies. IEEE (2010). https://doi.org/10.1109/act.2010.33
Smita, R. , Hiray, S.R. : SVM Based Effective Malware Detection System. (IJCSIT) Int. J. Comput. Sci. Inf. Technol. 6(4), 3361–3365 (2015)
Das, V., Pathak, V., Sharma, S., Sreevathsan, Srikanth, M., Gireesh Kumar, T.: Network intrusion detection system based on machine learning algorithm. Int. J.Comput. Sci. Inf. Technol. 2( 6), 138–151 (2010). https://doi.org/10.5121/ijcsit.2010
Sujitha, B. Ramani, R., Parameswari.: Intrusion detection system using fuzzy genetic approach. Int. J. Adv. Res. Comput. Commun. Eng. 1(10) (2012)
Halim, Z.: An effective genetic algorithm-based feature selection method for intrusion detection systems. Comput. Secur. 110, 102448 (2021). https://doi.org/10.1016/j.cose.2021.102448
Gao, X., Shan, C., Hu, C., Niu, Z., Liu, Z.: An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7, 82512–82521 ( 2019). https://doi.org/10.1109/access.2019.2923640 Accessed 8 Jan 2022
Maseer, Z., Yusof, R., Bahaman, N. Mostafa, S., Foozy, C.: Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 Dataset. IEEE Access 9, 22351–22370 (2021). https://doi.org/10.1109/access.2021.3056614
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Conflict of Interest
The authors declare that there is no conflict of interest in this paper.
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
OmaMageswari, M., Peroumal, V., Ghosh, R., Goswami, D. (2023). Gated Recurrent Unit and Long Short-Term Memory Based Hybrid Intrusion Detection System. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 716. Springer, Cham. https://doi.org/10.1007/978-3-031-35501-1_53
Download citation
DOI: https://doi.org/10.1007/978-3-031-35501-1_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35500-4
Online ISBN: 978-3-031-35501-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)