Skip to main content
Log in

A deep learning approach for effective intrusion detection in wireless networks using CNN

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Security is playing a major role in this Internet world due to the rapid growth of Internet users. The various intrusion detection systems were developed by many researchers in the past to identify and detect the intruders using data mining techniques. However, the existing systems are not able to achieve sufficient detection accuracy when using the data mining. For this purpose, we propose a new intrusion detection system to provide security in data communication by identifying and detecting the intruders effectively in wireless networks. Here, we propose a new feature selection algorithm called conditional random field and linear correlation coefficient-based feature selection algorithm to select the most contributed features and classify them using the existing convolutional neural network. The experiments have been conducted for evaluating the proposed intrusion detection system that achieves 98.88% as overall detection accuracy. The tenfold cross-validation has been done for evaluating the performance of the proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Abualigah LMQ (2019) Feature selection and enhanced krill Herd algorithm for text document clustering. Studies in computational intelligence, vol 816. Springer, Switzerland

    Book  Google Scholar 

  • Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2017a) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456–466

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES, Gandomi AH (2017b) A novel hybridization strategy for krill herd algorithm applied to clustering techniques. Appl Soft Comput 60:423–435

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2018a) A combination of objective functions and hybrid krill herd algorithm for text document clustering analysis. Eng Appl Artif Intell 73:115–123

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2018b) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48:4047–4071

    Article  Google Scholar 

  • Aburomman AA, Reaz MBI (2017) A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput Secur 65:135–152

    Article  Google Scholar 

  • Anand K, Ganapathy S, Kulothungan K, Yogesh P, Kannan A (2012) A rule based approach for attribute selection and intrusion detection in wireless sensor networks. Procedia Eng 38:1658–1664

    Article  Google Scholar 

  • Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tuts 18(2):1153–1176

    Article  Google Scholar 

  • Chiba Z, Abghour N, Moussaid K, El Omri A, Rida M (2018) A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput Secur 75:36–58

    Article  Google Scholar 

  • Chiba Z, Abghour N, Moussaid K, Elomri A, Rida M (2019) Intelligent approach to build a deep neural network based IDS for cloud environment using combination of machine learning algorithms. Comput Secur 86:291–317

    Article  Google Scholar 

  • Chowdhury MMU, Hammond F, Konowicz G, Xin C, Wu H, Li J (2017) A few-shot deep learning approach for improved intrusion detection. In: 2017 IEEE 8th annual ubiquitous computing, electronics and mobile communication conference (UEMCON), New York, NY, pp 456–462

  • Dias LP, Cerqueira JJF, Assis KDR, Almeida RC (2017) Using artificial neural network in intrusion detection systems to computer networks. In: 2017 9th computer science and electronic engineering (CEEC), Colchester, pp 145–150

  • Ganapathy S, Kulothungan K, Yogesh P, Kannan A (2012a) A novel weighted fuzzy C –means clustering based on immune genetic algorithm for intrusion detection. Procedia Eng 38:1750–1757

    Article  Google Scholar 

  • Ganapathy S, Yogesh P, Kannan A (2012b) Intelligent agent based intrusion detection using enhanced multiclass SVM. Comput Intell Neurosci 2012:1–11

    Article  Google Scholar 

  • Ganapathy S, Yogesh P, Kannan A (2012c) Intelligent agent-based intrusion detection system using enhanced multiclass SVM. Comput Intell Neurosci 2012:12

    Article  Google Scholar 

  • Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 2013(1):271

    Article  Google Scholar 

  • Ganapathy S, Sethukkarasi R, Yogesh P, Vijayakumar P, Kannan A (2014) An intelligent temporal pattern classification system using fuzzy temporal rules and particle swarm optimization. Sadhana 39:283–302

    Article  MathSciNet  Google Scholar 

  • Ganapathy S, Vijayakumar P, Yogesh P, Kannan A (2016) An intelligent CRF based feature selection for effective intrusion detection. Int Arab J Inf Technol 13(1):44–50

    Google Scholar 

  • Gupta K, Nath B, Kotagiri R (2010) Layered approach using conditional random fields for intrusion detection. IEEE Trans Dependable Secure Comput 7(1):35–49

    Article  Google Scholar 

  • Kanimozhi U, Ganapathy S, Manjula D, Kannan A (2019) An intelligent risk prediction system for breast cancer using fuzzy temporal rules. Natl Acad Sci Lett 42(03):227–232

    Article  Google Scholar 

  • Kim J-Y, Cho S-B (2019) Exploiting deep convolutional neural networks for a neural-based learning classifier system. Neurocomputing 354:61–70

    Article  Google Scholar 

  • Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. In: 2017 IEEE international conference on big data and smart computing (BigComp), Jeju, pp 313–316

  • Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24

    Article  Google Scholar 

  • Lin W-H, Lin H-C, Wang P, Bao-Hua W, Tsai J-Y (2018) Using convolutional neural networks to network intrusion detection for cyber threats. Proc IEEE Int Conf Appl Syst Innov 2018:1107–1110

    Google Scholar 

  • Liu J, Zhang W, Tang Z, Xie Y, Ma T, Zhang J, Zhang G, Niyoyita JP (2019) Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection. Expert Syst Appl. https://doi.org/10.1016/j.eswa.2019.112845

    Article  Google Scholar 

  • Manzoor I, Kumar N (2017) A feature reduced intrusion detection system using ann classifier. Elsevier Expert Syst Appl 88:249–257

    Article  Google Scholar 

  • Mao X, Hou J (2019) Object-based forest gaps classification using airborne LiDAR data. J For Res 30(2):617–627

    Article  Google Scholar 

  • Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M (2017) Multivariate correlation coefficient and mutual information-based feature selection in intrusion detection. Inf Secur J Glob Perspect 26(5):229–239

    Article  Google Scholar 

  • Naseer S, Saleem Y, Khalid S (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231–48246

    Article  Google Scholar 

  • Nguyen S-N, Nguyen V-Q, Choi J, Kim K (2018) Design and implementation of intrusion detection system using convolutional neural network for DoS detection. In: Proceedings of the 2nd international conference on machine learning and soft computing, pp 34–38

  • Pajouh HH, Javidan R, Khayami RK, Dehghantanha A, Choo K-KR (2019) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7(2):314–323

    Article  Google Scholar 

  • Sangkatsance P, Watlanapongsakorn N, CharnsriPinyo C (2011) Practical real time intrusion detection using machine learning approach”. J Comput Commun 34:2227–2235

    Article  Google Scholar 

  • Selvakumar B, Muneeswaran K (2019) Firefly algorithm based feature selection for network intrusion detection. Comput Secur 81:148–155

    Article  Google Scholar 

  • Shi H, Li H, Zhang D, Cheng C, Cao X (2018) An efficient feature generation approach based on deep learning and feature selection techniques for traffic classification. Comput Netw 132:81–98

    Article  Google Scholar 

  • Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2(1):41–50

    Article  Google Scholar 

  • Tavallaee M, Bagheri E, Lu W, Ghorbani A (2009) A detailed analysis of the KDD CUP 99 data set. In: Proceedings of 2nd IEEE symposium on computational intelligence for security and defense applications, pp 1–6

  • Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994–12000

    Article  Google Scholar 

  • Upadhyay R, Pantiukhin D (2015) Application of Convolutional neural networks to intrusion type recognition. In: International conference engineering & telecommunications, pp 1–6

  • Vani R (2017) Towards efficient intrusion detection using deep learning techniques: a review. Int J Adv Res Comput Commun Eng 6:375–384

    Article  Google Scholar 

  • Vinayakumar R, Soman KP, Poornachandran P (2017) Applying convolutional neural network for network intrusion detection. In: 2017 international conference on advances in computing, communications and informatics (ICACCI), Udupi, pp 1222–1228

  • Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550

    Article  Google Scholar 

  • Wang M, Li J (2017) Network intrusion detection model based on convolutional neural network. J Inf Secur Res 3:990–994

    Google Scholar 

  • Wu K, Chen Z, Li W (2018) A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6:50850–50859

    Article  Google Scholar 

  • Xiang C, Yong PC, Meng LS (2008) Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recognit Lett 29(7):918924

    Article  Google Scholar 

  • Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210–42219

    Article  Google Scholar 

  • Yahalom R, Steren A, Nameri Y, Roytman M, Porgador A, Elovici Y (2019) Improving the effectiveness of intrusion detection systems for hierarchical data. Knowl-Based Syst 168:59–69

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Riyaz.

Ethics declarations

Conflict of interest

There is no conflict of interest.

Additional information

Communicated by V. Loia.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Riyaz, B., Ganapathy, S. A deep learning approach for effective intrusion detection in wireless networks using CNN. Soft Comput 24, 17265–17278 (2020). https://doi.org/10.1007/s00500-020-05017-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-020-05017-0

Keywords

Navigation