Modified Of Evaluating Shallow And Deep Neural Networks For Network Intrusion Detection Systems In Cyber Security

Tangang Qisthina Handayani Zatadini, Achmad Farid Wadjdi, I Made Wiryana, Gilang Prakoso, Fadhil Muhammad, Cahya Maharani Badzlina Zataamani, H. Ruby Alamsyah, H.A. Danang Rimbawa

Abstract


Abstract—Intrusion Detection Systems (IDS) have developed into a crucial layer in all contemporary Information and Communication Technology (ICT) systems as a result of a demand for cyber safety in real-world situations. IDS advises integrating Deep Neural Networks (DNN) because, among other things, it might be challenging to identify certain types of assaults and advanced cyberattacks are complex (DNNs). DNNs were employed in this study to anticipate Network Intrusion Detection System attacks (N-IDS). The network has been trained and benchmarked using the KDDCup-'99 dataset, and a DNN with a learning rate of 0.001 is used, running for 10 epochs for using the activation model experiment and 8 epochs for using the TensorFlow experiment.

 

Keywords—Intrusion detection system, deep neural networks, machine learning, deep learning


Keywords


Intrusion detection system, deep neural networks, machine learning, deep learning

Full Text:

PDF

References


Adhitya Prananda, Yusuf, & Rudy A.G. Gultom. (2021). Sinergi Lembaga Intelijen dalam Menghadapi Ancaman Siber di Indonesia. Jurnal Peperangan Asimetris, Universitas Pertahanan Republik Indonesia, Vol 7(1), 51–70.

Carl Endorf, E. S. (2004). Intrusion Detection & Prevention. California, U.S.A: Brandon A. Nordin.

Cybersecurity Best Practices. Retrieved from https://www.cisa.gov/topics/cybersecurity-best-practices

D. Michie, D. S. (1994). Machine Learning, Neural, and Statistical Classification.

Guansong Pang, C. S. (2019). Deep Anomaly Detection with Deviation Networks.

Hanan Hindy, D. B. (2020). A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems.

Indonesia responds to the cyber dark side. Retrieved from https://www.lowyinstitute.org/the-interpreter/indonesia-responds-cyber-dark-side

keras.io. (n.d.). Layer activation functions. Retrieved from keras.io: https://keras.io/api/layers/activations/

Luke Irwin. 8th September 2022. The 5 Stages of an Effective Cyber Defence Strategy. Retrived from https://www.itgovernance.eu/blog/en/the-5-stages-of-an-effective-cyber-defence-strategy

N. Tran, H. Chen, J. Bhuyan and J. Ding. (October, 2022). "Data Curation and Quality Evaluation for Machine Learning-Based Cyber Intrusion Detection," in IEEE Access, vol. 10, pp. 121900-121923, 2022, https://ieeexplore.ieee.org/document/9907008

Peraturan Presiden (PERPRES) No. 47 Tahun 2023 tentang Strategi Keamanan Siber Nasional dan Manajemen Krisis Siber (Presidential Regulation (PERPRES) No. 47 of 2023 concerning National Cybersecurity Strategy and Cyber Crisis Management). https://peraturan.bpk.go.id/Details/255542/perpres-no-47-tahun-2023. https://drive.google.com/file/d/1v6kAQTXE4VtJY9KtWtDDuMnjYry8jxBs/view

Rahul Vigneswaran K, V. R. (n.d.). Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security.

Selçuk BAYRACI, O. S. (2019). A Deep Neural Network (DNN) based classification model in application to loan default prediction. Theoretical and Applied Economics, 75-84.

Stuart Russell, P. N. (2020). Artificial Intelligence A Modern Apporach Fourth Edition. Pearson.

Yisroel Mirsky, T. D. (2018). Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.




DOI: http://dx.doi.org/10.52155/ijpsat.v42.1.5822

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Tangang Qisthina Handayani Zatadini

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.