Skip to main content
Log in

DeepIDX: sophisticated IDS model using the generative adversarial network (GAN) algorithm

  • Original Article
  • Published:
Iran Journal of Computer Science Aims and scope Submit manuscript

Abstract

Many security threats across the network make the security aspect the most critical security issue. To solve the problem, we propose an intrusion detection system (IDS) using Generative Adversarial Networks (GAN) by analyzing the extracted features of the network traffic. At present, the intrusion detection system is a widely used practical security tool to prevent malicious traffic from penetrating networks and systems. In this paper, we propose an intrusion detection model using GAN. To build our detection model, we collect the dataset, process it first, train it with several different parameters to get the highest accuracy results, then test the model using the new data. Based on experimental results, this model shows a threshold value of 0.0054779826. Therefore, a smaller threshold value indicates a more accurate detection model and a lower error rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Lin, Z et al.: IDSGAN: generative adversarial networks for attack generation against intrusion detection (2021)

  2. Purser et al.: Using generative adversarial networks for intrusion detection in cyber-physical Systems. (2020)

  3. Liu, G.: CNID: research of network intrusion detection based on CNN (2020)

  4. Peng, Y et al.: Detecting adversarial examples for networks intrusion detection system with GAN. (2020)

  5. Khurana, J., Aggarwal, V., Singh, H.: A comparative study of DL models for network intrusion detection. Int. J. Comput. Appl. 174, 38–46 (2021)

    Google Scholar 

  6. Patel, S.K., Sonker, A.: Rule-based NIDS for port scanning with efficient port scan detection rules using snort. Int. J. Fut. Gener. Commun. Netw. 9, 339–350 (2016)

    Google Scholar 

  7. Raja, S., et al.: An efficient fuzzy self-classifying clustering-based framework for cloud security. Int. J. Comput. Intell. Syst. 10, 495–506 (2017)

    Article  Google Scholar 

  8. Jia, Y., et al.: Network intrusion detection algorithm based on deep neural network. IET Inform. Secur. 13, 48–53 (2018)

    Article  Google Scholar 

  9. Nie, L., et al.: Intrusion detection for secure social internet of things based on collaborative edge computing: a generative adversarial network-based approach. IEEE Trans. Comput. Soc. Syst. 9, 134–145 (2021)

    Article  Google Scholar 

  10. Zhang, G., et al.: Network intrusion detection based on conditional wasserstein generative adversarial network and cost-sensitive stacked autoencoder. IEEE Access 9, 190431–190447 (2020)

    Article  Google Scholar 

  11. Wanda, P., Jie, H.J.: DeepProfile: finding fake profile in online social network using dynamic CNN. J. Inform. Secur. Appl. 52, 102465 (2020)

    Google Scholar 

  12. Wanda, P., Jie, H.J.: RunPool: a dynamic pooling layer for convolution neural network. J. Inform. Secur. Appl. 13, 66–76 (2020)

    Google Scholar 

  13. Diqi, M., Nurhadi-Wijaya, R., Mujastia-Feliati, M.: Pooling comparison in CNN architecture for Javanese script classification. Int. J. Inform. Comput. (IJICOM) 3(2), 15–22 (2021)

    Google Scholar 

  14. Hamzah, M.D., Ronaldo, A.D.: Effective soil type classification using convolutional neural network. Int. J. Inform. Comput. (IJICOM) 3(1), 20 (2021)

    Google Scholar 

  15. Wanda, P.: A survey of intrusion detection system. IJICOM 1, 1 (2020)

    Google Scholar 

  16. Jin, J.H., Wanda, P.: A survey of network and information security. IJICOM. 1, 15 (2020)

    Google Scholar 

  17. Zhang, Y., et al.: Network intrusion detection: based on deep hierarchical network and original flow data. IEEE Acess 7, 37004 (2019)

    Article  Google Scholar 

  18. Rajagopal, S., et al.: A stacking ensemble for network intrusion detection using heterogeneous datasets. Hindawi Secur. Commun. Netw. 2020, 1–7 (2020)

    Article  Google Scholar 

  19. Shone, N., et al.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2, 41–50 (2017)

    Article  Google Scholar 

  20. Khan, F.A., Gumaei, A.: A comparative study of ML classifiers for network intrusion detection. In: Sun X et al (Eds) ICAIS 2019, LNCS 11633, Springer Nature Switzerland AG, pp 75–86 (2019)

  21. Wang, H., Cao, Z., Hong, B.: A network intrusion detection system based on convolutional neural network. J. Intell. Fuzzy Syst. 38, 7623–7637 (2020)

    Article  Google Scholar 

  22. Su, T., et al.: BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8, 29575–29585 (2020)

    Article  Google Scholar 

  23. Fernandez, G.C., Xu, S.: A case study on using DL for network intrusion detection (2019)

  24. Qiu, H., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet of Things J. 7, 10327–10335 (2020)

    Google Scholar 

  25. Sun, P., et al.: DL-IDS: extracting features using CNN-LSTM hybrid network for intrusion detection system. Secur. Commun. Netw. 2020, 1–11 (2020)

    Google Scholar 

  26. Haggag, M., et al.: Implementing a deep learning model for intrusion detection on apache spark platform. IEEE Access 8, 163660–163672 (2020)

    Article  Google Scholar 

  27. Jiyeon, K., et al.: CNN-based network intrusion detection against denial-of-service attacks. Electronics 9, 916 (2020)

    Article  Google Scholar 

  28. Devan, P., Khare, N.: An efficient XGBoost–DNN-based classification model for network intrusion detection system. Neural Comput. Appl. 32(16), 12499–12514 (2020)

    Article  Google Scholar 

  29. Liao, D et al.: Network intrusion detection method based on GAN model (2020)

  30. Jie, H.: A survey of network and information security. Int. J. Inform. Comput. 1(2), 15–22 (2019)

    Google Scholar 

  31. Kim, D., Zhang, X.: Network intrusion detection using generative adversarial networks

  32. Salem, M et al.: Anomaly generation using generative adversarial networks in host-based intrusion detection (2018)

  33. Zhang, X., et al.: Adversarial examples detection for XSS attacks based on generative adversarial networks. IEEE Access 8, 10989–10996 (2020)

    Article  Google Scholar 

  34. Dutta, I. K. et al.: Generative adversarial networks in security: a survey (2021)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nurhadi Wijaya.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wijaya, N., Hiswati, M.E. & Anjani, S. DeepIDX: sophisticated IDS model using the generative adversarial network (GAN) algorithm. Iran J Comput Sci 5, 197–204 (2022). https://doi.org/10.1007/s42044-022-00099-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42044-022-00099-5

Keywords

Navigation