Abstract
In recent years, there is an exponential increase in the growth of the multimedia data, which is being generated from zettabyte to petabyte scale. At the same time, security issues in networks, Internets and organizations are also continues to increase. The process of finding intrusions in such a big data environment is not easier. Different types of intrusion-detection system (IDS) have been presented for diverse kinds of networking attacks, however, many models could be identified unknown attacks. Deep learning (DL) approaches lately employed to large-scale big data analysis for effectual outcome. In this view, this paper presents a new deep learning based hyperparameter search (HPS) convolutional neural network with Bi-directional long short term memory (CBL) model called HPS-CBL for intrusion detection in big data environment. The HPS-CBL model make use of CBL technique for the identification of intrusions in the network. Since the proper tuning of hyperparameters of the CBL network is highly important, the proposed model uses improved genetic algorithm (IGA) for hyperparameter tuning. The proposed HPS-CBL is validated using a UNSW-NB15 dataset and the results are validated under diverse evaluation parameters. The obtained experimental outcome clearly stated the superior nature of the HPS-CBL model over the compared methods by attaining a maximum precision of 99.24%, recall of 98.69%, F-score of 98.97% and accuracy of 98.18% respectively.









Similar content being viewed by others
References
Al-Zewairi M, Almajali S, Awajan A (2017) Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: New trends in computing sciences (ICTCS), 2017 international conference on. IEEE, Amman, Jordan
Alzahrani AO, Alenazi MJ (2021) Designing a network intrusion detection system based on machine learning for software defined networks. Fut Internet 13(5):111
Andreu-Perez J, Poon CCY, Merrifield RD, Wong STC, Yang GZ (2015) Big data for health. IEEE J Biomed Heal Informat 19:1193–1208. https://doi.org/10.1109/JBHI.2015.2450362
Belouch M, El Hadaj S, Idhammad Mo (2017) Two-stage classifier approach using RepTree algorithm for network intrusion detection. Int J Adv Comput Sci Appl 8(6):389–394
Belouch M, El Hadaj S, Idhammad M (2018) Performance evaluation of intrusion detection based on machine learning using Apache Spark. Procedia Comput Sci 127(2018):1–6
Bengio Y, LeCun Y (2007) Scaling learning algorithms towards, AI. In: Bottou L, Chapelle O, DeCoste D, Weston J (eds) Large scale kernel machines, vol 34. MIT Press, Cambridge, MA, pp 321–360
Coelho F, Braga A, Verleysen M (2012) Cluster homogeneity as a semisupervised principle for feature selection using mutual information. In: ESANN. Bruges, Belgium 2012
Dahiya P, Srivastava D (2018) Network intrusion detection in big dataset using spark. Procedia Comput Sci 132:253–262
Denning D (1986) An intrusion-detection model. In: IEEE computer society symposium on research security and privacy, pp 118–131
Goodfellow I, Lee H, Le QV, Saxe A, Ng AY (2009) Measuring invariances in deep networks. In: Advances in neural information processing systems. Curran Associates, Inc, pp 646–654
Gupta GP, Kulariya M (2016) A framework for fast and efficient cyber security network intrusion detection using apache spark. Procedia Comput Sci 93:824–831
Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in big data environment. Inf Sci 513:386–396
Hinton G, Deng L, Yu D, Mohamed A-R, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Sainath T, Dahl G, Kingsbury B (2012) Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. Signal Process Mag IEEE 29(6):82–97
Khan FA, Gumaei A (2019) A comparative study of machine learning classifiers for network intrusion detection. International conference on artificial intelligence and security. Springer, Cham, pp 75–86
Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pp 1097–1105
Larochelle H, Bengio Y, Louradour J, Lamblin P (2009) Exploring strategies for training deep neural networks. J Mach Learn Res 10:1–40
Long F, Zhou K, Ou W (2019) Sentiment analysis of text based on bidirectional LSTM with multi-head attention. IEEE Access 7:141960–141969
Martin-Sanchez F, Verspoor K (2014) Big data in medicine is driving big changes. Yearb Med Inform 9:14–20. https://doi.org/10.15265/IY-2014-0020
Moustafa N, Slay J (2018) The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J 25(1–3):18–31
Nguyen PT, Huynh VDB, Vo KD, Phan PT, Elhoseny M, Le DN (2021) Deep learning based optimal multimodal fusion framework for intrusion detection systems for healthcare data. Comput Mater Continua 66(3):2555–2571
Primartha R, Tama B (2017) Anomaly detection using random forest: a performance revisited. In: Data and software engineering (ICoDSE), 2017 international conference on. IEEE, Palembang Sumatra Selatan, Indonesia.
Salakhutdinov R, Hinton GE (2009) Deep boltzmann machines. In: International conference on, artificial intelligence and statistics. JMLR.org, pp 448–455
Sharafaldin I, Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP. Funchal, Madeira - Portugal
Salih AA, Abdulazeez AM (2021) Evaluation of classification algorithms for intrusion detection system: a review. J Soft Comput Data Min 2(1):31–40
Sedig K, Ola O (2014) The challenge of big data in public helth: an opportunity for visual analytics. J Public Health Inform 5:1–21. https://doi.org/10.5210/ojphi.v5i3.4933
Thakur, S., Chakraborty, A., De, R., Kumar, N. and Sarkar, R., 2021. Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Computers & Electrical Engineering, 91, p. 107044.
Uthayakumar J, Vengattaraman T, Dhavachelvan P (2017) Swarm intelligence based classification rule induction (CRI) framework for qualitative and quantitative approach: an application of bankruptcy prediction and credit risk analysis. J King Saud Univ Comput Inf Sci
Vijayanand R, Devaraj D, Kannapiran B (2018) Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput Secur 77:304–314
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pustokhina, I.V., Pustokhin, D.A., Lydia, E.L. et al. Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment. Multimed Tools Appl 81, 34951–34968 (2022). https://doi.org/10.1007/s11042-021-11271-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11271-7