Skip to main content
Log in

An optimized Bi-LSTM with random synthetic over-sampling strategy for network intrusion detection

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Due to the increased quantity and variety of cyber-attacks against networks, the conventional firewalls and encrypting data technologies are no longer sufficient to meet the network security requirements. As a consequence of this, the idea of using intrusion detection systems to combat network threats has been advocated. Machine learning aids common intrusion detection methods which show poor detection rates and requires wider feature engineering. This research offers the random synthetic over-sampling (RSO) Linguistic algorithm for detecting network intrusion and to identify communication anomalies. Deep learning method for network security is combined with an attention mechanism and bidirectional long short-term memory (Bi-LSTM) network. Frequent pattern stream characteristics were retrieved using CNN network and weights in each channel are changed. Hyperparameter tuning techniques like improvised elephant herding optimization algorithm is employed to increase the Bi-LSTM’s efficiency. The training process, the number of hidden layers and epochs are chosen optimally using these strategies. The RSOA-IEHO-BiLSTM model's effectiveness testing showed that it outperformed the competing techniques. With NSLKDD dataset model, an accuracy of 98.36% and an F-measure of 99.05% were achieved both of which point to an increase in the accuracy of malicious node detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Availability of data and materials

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  • Abdullah N (2021) Advances in cyber security: third international conference, ACeS 2021, Penang, Malaysia, August 24–25, 2021, Revised Selected Papers, Springer Nature, Penang. https://doi.org/10.1007/978-981-16-8059-5

  • Aldweesh A, Derhab A, Emam AZ (2020) Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl Based Syst 189:105124

    Article  Google Scholar 

  • Alqahtani H, Sarker IH, Kalim A, Hossain SMM, Ikhlaq S, Hossain S (2020) Cyber intrusion detection using machine learning classification techniques. In: International conference on computing science, communication and security. Springer, pp 121–31

  • Amudhavalli et al (2019) An efficient network threat detection and classification method using ANP-MVPS algorithm in wireless sensor networks. Int J Innov Technol Explor Eng (IJITEE) 8(11):1597–1606

    Article  Google Scholar 

  • Asokan R, Preethi P (2021) Deep learning with conceptual view in meta data for content categorization. In: Deep learning applications and intelligent decision making in engineering. IGI Global, pp 176–191

  • Bengio Y (2009) Learning deep architectures for AI. Found. Trends Mach. Learn 2(1):1–127

    Article  MathSciNet  Google Scholar 

  • Bhati BS, Chugh G, Al-Turjman F, Bhati NS (2021) An improved ensemble based intrusion detection technique using XGBoost. Trans Emerg Telecommun Technol 32(6):e4076

    Article  Google Scholar 

  • Cannady J (1998) Artificial neural networks for misuse detection. Natl Inf Syst Secur Conf 26:443–456

    Google Scholar 

  • Carrier T, Victor P, Tekeoglu A, Lashkari A (2022) Detecting obfuscated malware using memory feature engineering. In: Proceedings of the 8th international conference on information systems security and privacy—ICISSP. INSTICC. SciTePress, pp 177–88

  • Dener M, Ok G, Orman A (2022) Malware detection using memory analysis data in big data environment. Appl Sci 12(17):8604

    Article  Google Scholar 

  • Fernández Maimó L, Huertas Celdrán A, Gil Pérez M, García Clemente FJ, Martínez Pérez G (2019) Dynamic management of a deep learning-based anomaly detection system for 5G networks. J Ambient Intell Humaniz Comput 10(8):3083–3097

    Article  Google Scholar 

  • Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. https://arxiv.org/abs/1701.02145.

  • Hu Y, Liu R, Ma Z (2021) Identification of cybersecurity elements based on convolutional attention LSTM networks. J Phys Conf Ser 1757:012146

    Article  Google Scholar 

  • Indrasiri PL, Lee E, Rupapara V, Rustam F, Ashraf I (2022) Malicious traffic detection in iot and local networks using stacked ensemble classifier. Comput Mater Continua 71(1):489–515

    Article  Google Scholar 

  • Kasongo SM, Sun Y (2020) Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data 7(1):1–20

    Article  Google Scholar 

  • Koroniotis N, Moustafa N, Sitnikova E, Slay J (2017) Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques. In: International conference on mobile networks and management. Springer, pp 30–44.

  • Kshirsagar D, Kumar S (2021) An efficient feature reduction method for the detection of DoS attack. ICT Express

  • Kumar V, Das AK, Sinha D (2020) Statistical analysis of the UNSW-NB15 dataset for intrusion detection. In: Computational intelligence in pattern recognition. Springer, pp 279–94

  • Li LH, Ahmad R, Tsai WC, Sharma AK (2021) A feature selection based DNN for intrusion detection system. In: 2021 15th international conference on ubiquitous information management and communication (IMCOM). IEEE, pp 1–8

  • Mahhizharuvi P et al (2021) An elective intrusion detection system using enhanced multi relational fuzzy tree. Turk J Comput Math Educ (TURCOMAT) 12(13):3152–3159

    Google Scholar 

  • Mohanasundaram N et al (2020) Graph based event measurement for analyzing distributed anomalies in sensor networks. Sådhanå 45:212. https://doi.org/10.1007/s12046-020-01451-w

    Article  MathSciNet  Google Scholar 

  • Mugabo E, Zhang QY, Ngaboyindekwe A, Kwizera VDPN, Lumorvie VE (2021) Intrusion detection method based on MapReduce for evolutionary feature selection in mobile cloud computing. Int J Netw Secur 23(1):106–115

    Google Scholar 

  • Narayanasami S, Sengan S, Khurram S, Arslan F, Murugaiyan SK, Rajan R et al (2021) Biological feature selection and classification techniques for intrusion detection on BAT. Wirel Pers Commun 1–23

  • Nimbalkar P, Kshirsagar D (2021) Feature selection for intrusion detection system in internet-of-things (IoT). ICT Express 7(2):177–181

    Article  Google Scholar 

  • Norwahidayah S, Farahah N, Amirah A, Liyana N, Suhana N et al (2021) Performances of artificial neural network (ANN) and particle swarm optimization (PSO) using KDD Cup ‘99 dataset in intrusion detection system (IDS). J Phys Conf Ser 1874:012061

    Article  Google Scholar 

  • Preethi P, Asokan R (2020) Neural network oriented roni prediction for embedding process with hex code encryption in dicom images. In: Proceedings of the 2nd international conference on advances in computing, communication control and networking (ICACCCN), Greater Noida, pp 18–19

  • Preethi P, Asokan R (2021) Modelling LSUTE: PKE schemes for safeguarding electronic healthcare records over cloud communication environment. Wirel Pers Commun 117(4):2695–2711

    Article  Google Scholar 

  • Salo F, Nassif AB, Essex A (2019) Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput Netw 148:164–175

    Article  Google Scholar 

  • Sherubha P et al (2018) An efficient intrusion detection and authentication mechanism for detecting clone attack in wireless sensor networks. J Adv Res Dyn Control Syst (JARDCS) 11(5):55–68

    Google Scholar 

  • Susilo B, Sari RF (2020) Intrusion detection in IoT networks using deep learning algorithm. Information 11(5):279

    Article  Google Scholar 

  • Talita A, Nataza O, Rustam Z (2021) Naive Bayes classifier and particle swarm optimization feature selection method for classifying intrusion detection system dataset. J Phys Conf Ser 1752:012021

    Article  Google Scholar 

  • Tan X, Su S, Huang Z, Guo X, Zuo Z, Sun X et al (2019) Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm. Sensors 19(1):203

    Article  Google Scholar 

Download references

Funding

The authors received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Contributions

BP prepared the manuscript, AB prepared results and discussion, DK and PI reviewed the manuscript.

Corresponding author

Correspondence to B. Padmavathi.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest.

Ethical approval

The authors declare that there is no conflict of interest and follows the journal ethics.

Informed consent

There is no object to have data published in a journal article.

Statement regarding research involving human participants and/or animals

There is no human or animal participation in this manuscript.

Consent to participate

There is no participation in this manuscript.

Consent to publish

We give our consent for the publication of identifiable details which can include details within the text (“Material”) to be published in the above Journal and Article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Padmavathi, B., Bhagyalakshmi, A., Kavitha, D. et al. An optimized Bi-LSTM with random synthetic over-sampling strategy for network intrusion detection. Soft Comput 28, 777–790 (2024). https://doi.org/10.1007/s00500-023-09483-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-09483-0

Keywords

Navigation