An Innovative Intrusion Detection System for High-Density Communication Networks Using Artificial Intelligence †
Abstract
:1. Introduction
- Detect unauthorized activities and malicious behavior that pose a risk to the confidentiality, integrity, and availability of network systems and monitor system activity and develop response plans for suspicious events.
- Enable faster responses to detected threats by providing real-time threat detection and strengthen the overall security posture of a network system by providing additional layers of defense.
2. Materials and Methods
- Identifying suspicious connections to detect potential malicious attacks.
- Detecting multiple types of attacks, including known attacks, zero-day attacks, advanced persistent threats, and targeted attacks.
- Producing real-time alerts for responses within a few seconds.
2.1. Related Works
2.2. Proposed Model
- Robust detection: AI-backed real-time anomaly detection can identify malicious activity very precisely in high-density networks. It can differentiate between innocuous and malicious traffic so accuracy is ensured.
- Automated monitoring: The AI-powered anomaly detection system is automated and constantly monitors network traffic to detect any malicious activity. This helps to mitigate threats quickly.
- Scalability: The system can be easily scaled up and down to accommodate networks of different sizes and densities, making it an excellent choice for high-density networks.
3. Results and Discussion
- ○
- A lack of accuracy and robustness of outcomes when presented with new datasets and tasks.
- ○
- Limited access to data gathering (from human experts or external sources) and verification processes.
- ○
- Low scalability due to architectural constraints and hardware requirements.
- Explainability: Explainability measures enable the identification of easily understandable rules or features underlying a system’s decision. Visualizations, such as heat maps of important features, can be used to provide context and explain the rationale behind an AI system’s decisions.
- Transparency: Transparency aims to provide an insight into the underlying data or training process that has produced the AI system. This can be performed by providing access to logs, training datasets, and algorithm codes.
- Trustworthiness: Measures such as audits and tests can be used to establish trust in the decisions made by the AI-driven IDS. This includes ensuring that the system operates according to intended parameters, such as fairness or accuracy.
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Whelan, J.; Almehmadi, A.; El-Khatib, K. Artificial intelligence for intrusion detection systems in unmanned aerial vehicles. Comput. Electr. Eng. 2022, 99, 107784. [Google Scholar] [CrossRef]
- Salman, E.H.; Taher, M.A.; Hammadi, Y.I.; Mahmood, O.A.; Muthanna, A.; Koucheryavy, A. An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms. Sensors 2022, 23, 206. [Google Scholar] [CrossRef] [PubMed]
- Mendonca, R.V.; Silva, J.C.; Rosa, R.L.; Saadi, M.; Rodriguez, D.Z.; Farouk, A. A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst. 2022, 39, e12917. [Google Scholar] [CrossRef]
- Yadav, N.; Pande, S.; Khamparia, A.; Gupta, D. Intrusion detection system on IoT with 5G network using deep learning. Wirel. Commun. Mob. Comput. 2022, 2022, 9304689. [Google Scholar] [CrossRef]
- Muthanna, M.S.A.; Alkanhel, R.; Muthanna, A.; Rafiq, A.; Abdullah, W.A.M. Towards SDN-enabled, intelligent intrusion detection system for internet of things (IoT). IEEE Access 2022, 10, 22756–22768. [Google Scholar] [CrossRef]
- Imanbayev, A.; Tynymbayev, S.; Odarchenko, R.; Gnatyuk, S.; Berdibayev, R.; Baikenov, A.; Kaniyeva, N. Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond. Sensors 2022, 22, 9957. [Google Scholar] [CrossRef] [PubMed]
- Yu, Y.; Zeng, X.; Xue, X.; Ma, J. LSTM-based intrusion detection system for VANETs: A time series classification approach to false message detection. IEEE Trans. Intell. Transp. Syst. 2022, 23, 23906–23918. [Google Scholar] [CrossRef]
- Amanoul, S.V.; Abdulazeez, A.M. Intrusion detection system based on machine learning algorithms: A review. In Proceedings of the 2022 IEEE 18th International Colloquium on Signal Processing & Applications (CSPA), Selangor, Malaysia, 12 May 2022. [Google Scholar]
- Shitharth, S.; Kshirsagar, P.R.; Balachandran, P.K.; Alyoubi, K.H.; Khadidos, A.O. An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system. IEEE Access 2022, 10, 46424–46441. [Google Scholar] [CrossRef]
- Onyema, E.M.; Dalal, S.; Romero, C.A.T.; Seth, B.; Young, P.; Wajid, M.A. Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities. J. Cloud Comput. 2022, 11, 26. [Google Scholar] [CrossRef]
- Alani, M.M.; Awad, A.I. An Intelligent Two-Layer Intrusion Detection System for the Internet of Things. IEEE Trans. Ind. Inform. 2022, 19, 683–692. [Google Scholar] [CrossRef]
- Park, C.; Lee, J.; Kim, Y.; Park, J.G.; Kim, H.; Hong, D. An enhanced AI-based network intrusion detection system using generative adversarial networks. IEEE Internet Things J. 2022, 10, 2330–2345. [Google Scholar] [CrossRef]
- Rizvi, S.; Scanlon, M.; McGibney, J.; Sheppard, J. Deep learning based network intrusion detection system for resource-constrained environments. In Proceedings of the International Conference on Digital Forensics and Cyber Crime, Boston, MA, USA, 16–18 November 2022; Springer Nature: Cham, Switzerland, 2022; pp. 355–367. [Google Scholar]
- Ragab, M.; Sabir, M.F.S. Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment. Sustain. Energy Technol. Assess. 2022, 52, 102311. [Google Scholar] [CrossRef]
- Friha, O.; Ferrag, M.A.; Shu, L.; Maglaras, L.; Choo, K.K.R.; Nafaa, M. FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J. Parallel Distrib. Comput. 2022, 165, 17–31. [Google Scholar] [CrossRef]
- Hnamte, V.; Hussain, J. DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system. Telemat. Inform. Rep. 2023, 10, 100053. [Google Scholar] [CrossRef]
- Tang, F.; Chen, X.; Zhao, M.; Kato, N. The Roadmap of Communication and Networking in 6G for the Metaverse. IEEE Wirel. Commun. 2022, 30, 72–81. [Google Scholar] [CrossRef]
- Saheed, Y.K.; Abiodun, A.I.; Misra, S.; Holone, M.K.; Colomo-Palacios, R. A machine learning-based intrusion detection for detecting internet of things network attacks. Alex. Eng. J. 2022, 61, 9395–9409. [Google Scholar] [CrossRef]
- Chang, V.; Golightly, L.; Modesti, P.; Xu, Q.A.; Doan, L.M.T.; Hall, K.; Kobusińska, A. A survey on intrusion detection systems for fog and cloud computing. Future Internet 2022, 14, 89. [Google Scholar] [CrossRef]
- Singh, S.; Rathore, S.; Alfarraj, O.; Tolba, A.; Yoon, B. A framework for privacy-preservation of IoT healthcare data using Federated Learning and blockchain technology. Future Gener. Comput. Syst. 2022, 129, 380–388. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sirisha, G.; Stephen, K.V.K.; Suganya, R.; Patra, J.P.; Lakshmi, T.R.V. An Innovative Intrusion Detection System for High-Density Communication Networks Using Artificial Intelligence. Eng. Proc. 2023, 59, 78. https://doi.org/10.3390/engproc2023059078
Sirisha G, Stephen KVK, Suganya R, Patra JP, Lakshmi TRV. An Innovative Intrusion Detection System for High-Density Communication Networks Using Artificial Intelligence. Engineering Proceedings. 2023; 59(1):78. https://doi.org/10.3390/engproc2023059078
Chicago/Turabian StyleSirisha, G., K. Vimal Kumar Stephen, R. Suganya, Jyoti Prasad Patra, and T. R. Vijaya Lakshmi. 2023. "An Innovative Intrusion Detection System for High-Density Communication Networks Using Artificial Intelligence" Engineering Proceedings 59, no. 1: 78. https://doi.org/10.3390/engproc2023059078
APA StyleSirisha, G., Stephen, K. V. K., Suganya, R., Patra, J. P., & Lakshmi, T. R. V. (2023). An Innovative Intrusion Detection System for High-Density Communication Networks Using Artificial Intelligence. Engineering Proceedings, 59(1), 78. https://doi.org/10.3390/engproc2023059078