Enhancing intrusion detection systems: Innovative deep learning approaches using CNN, RNN, DBN and autoencoders for robust network security
Article Sidebar
Open full text
Issue Vol. 21 No. 1 (2025)
-
A multi-modal transformer-based model for generative visual dialog system
Ghada ELSHAMY, Marco ALFONSE, Islam HEGAZY, Mostafa AREF1-17
-
Spatial identification of manipulable objects for a bionic hand prosthesis
Yurii LOBUR, Kostiantyn VONSEVYCH, Natalia BEZUGLA18-30
-
Numerical modelling and comparison of SIF in pipelines exposed to internal pressure with longitudinal crack using XFEM method
Aya BARKAOUI, Mohammed EL MOUSSAID, Hassane MOUSTABCHIR31-43
-
Machine learning evidence towards eradication of malaria burden: A scoping review
Idara JAMES, Veronica OSUBOR44-69
-
Harnessing multi-source data for AI-driven oncology insights: Productivity, trend, and sentiment analysis
Wissal EL HABTI, Abdellah AZMANI70-82
-
The evolution and impact of artificial intelligence in market analysis: A quantitative bibliometric exploration of the past thirty-five (35) years
Donalson WILSON, Abdellah AZMANI83-96
-
Structural equation modeling (SEM) in Jamovi: An example of analyzing the impact of factors on the innovation activity of enterprises
Assel SADENOVA, Oxana DENISSOVA, Marina KOZLOVA, Saule RAKHIMOVA, Arkadiusz GOLA, Saltanat SUIEUBAYEVA97-110
-
Enhancing intrusion detection systems: Innovative deep learning approaches using CNN, RNN, DBN and autoencoders for robust network security
Yakub HOSSAIN, Zannatul FERDOUS, Tanzillah WAHID, Md. Torikur RAHMAN, Uttam Kumar DEY, Mohammad Amanul ISLAM111-125
-
A systematic literature review of diabetes prediction using metaheuristic algorithm-based feature selection: Algorithms and challenges method
Sirmayanti, Pulung Hendro PRASTYO, Mahyati, Farhan RAHMAN126-142
-
A concept for a production flow control system toolset for discrete manufacturing of mechanical products
Jarosław CHROBOT143-153
-
Optimizing customer relationship management through AI for service effectiveness: Systematic literature review
Aji HARTANTO, VERONICA, Danang PRIHANDOKO153-163
-
LANA-YOLO: Road defect detection algorithm optimized for embedded solutions
Paweł TOMIŁO164-181
Archives
-
Vol. 21 No. 3
2025-10-05 12
-
Vol. 21 No. 2
2025-06-27 12
-
Vol. 21 No. 1
2025-03-31 12
-
Vol. 20 No. 4
2025-01-31 12
-
Vol. 20 No. 3
2024-09-30 12
-
Vol. 20 No. 2
2024-08-14 12
-
Vol. 20 No. 1
2024-03-30 12
-
Vol. 19 No. 4
2023-12-31 10
-
Vol. 19 No. 3
2023-09-30 10
-
Vol. 19 No. 2
2023-06-30 10
-
Vol. 19 No. 1
2023-03-31 10
-
Vol. 18 No. 4
2022-12-30 8
-
Vol. 18 No. 3
2022-09-30 8
-
Vol. 18 No. 2
2022-06-30 8
-
Vol. 18 No. 1
2022-03-30 7
-
Vol. 17 No. 4
2021-12-30 8
-
Vol. 17 No. 3
2021-09-30 8
-
Vol. 17 No. 2
2021-06-30 8
-
Vol. 17 No. 1
2021-03-30 8
Main Article Content
DOI
Authors
2202081012@uttarauniversity.edu.bd
2201081021@uttarauniversity.edu.bd
tanzillah@uttarauniversity.edu.bd
amanul.islam@uttarauniversity.edu.bd
Abstract
The increasing sophistication of cyber threats poses significant challenges to network security. This makes effective intrusion detection system (IDS) more important than ever before. Conventional IDS methods, which often rely on signatures or rules it will struggle to keep up with its complex attacks and evolution. This thesis evaluates and analyze the performance of DL algorithms. They include convolutional neural networks (CNN), recurrent neural networks (RNN), deep belief networks (DBN), and Auto-encoder. Using the models, these models are trained and tested only on the NSL-set. KDD data, which is a widely accepted benchmark for evaluating IDS performance. Results show that the proposed deep learning approach significantly outperforms traditional methods, has a higher detection rate, reduce the false positive rate and the ability to identify both known and unknown intrusions. They leverage the strengths of CNN, RNN, DBN, and autoencoders. Doing this research Advances IDS capabilities by providing a robust and adaptable solution to enhance network security.
Keywords:
References
Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150. https://doi.org/10.1002/ett.4150 DOI: https://doi.org/10.1002/ett.4150
Edeh, D. I. (2021). Network intrusion detection system using deep learning technique. Master of Science, Department of Computing, University of Turku.
Fu, K., Cheng, D., Tu, Y., & Zhang, L. (2016). Credit card fraud detection using convolutional neural networks. In A. Hirose, S. Ozawa, K. Doya, K. Ikeda, M. Lee, & D. Liu (Eds.), Neural Information Processing (Vol. 9949, pp. 483–490). Springer International Publishing. https://doi.org/10.1007/978-3-319-46675-0_53 DOI: https://doi.org/10.1007/978-3-319-46675-0_53
Ghani, H., Virdee, B., & Salekzamankhani, S. (2023). A deep learning approach for network intrusion detection using a small features vector. Journal of Cybersecurity and Privacy, 3(3), 451-463. https://doi.org/10.3390/jcp3030023 DOI: https://doi.org/10.3390/jcp3030023
Kim, J., Kim, J., Thi Thu, H. L., & Kim, H. (2016). Long short term memory recurrent neural network cassifier for intrusion detection. 2016 International Conference on Platform Technology and Service (PlatCon) (pp. 1–5). https://doi.org/10.1109/PlatCon.2016.7456805 DOI: https://doi.org/10.1109/PlatCon.2016.7456805
Kültür, E. (2022). Network intrusion detection with a deep learning approach. Master's thesis, Middle East Technical University (Turkey).
Nasr, M., Bahramali, A., & Houmansadr, A. (2018). DeepCorr: Strong flow correlation attacks on tor using deep learning. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1962–1976). https://doi.org/10.1145/3243734.3243824 DOI: https://doi.org/10.1145/3243734.3243824
Sama, L. (2022). Network intrusion detection using deep learning. Doctoral dissertation, Victoria University.
Sharafaldin, I., Lashkari, A. H., Hakak, S., & Ghorbani, A. A. (2019). Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. 2019 international carnahan conference on security technology (ICCST) (pp. 1-8). IEEE. https://doi.org/10.1109/CCST.2019.8888419 DOI: https://doi.org/10.1109/CCST.2019.8888419
Shiri, F. M., Perumal, T., Mustapha, N., & Mohamed, R. (2024). A comprehensive overview and comparative analysis on deep learning models. Journal on Artificial Intelligence, 6, 301-360. https://doi.org/10.32604/jai.2024.054314 DOI: https://doi.org/10.32604/jai.2024.054314
Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. https://doi.org/10.1109/TETCI.2017.2772792 DOI: https://doi.org/10.1109/TETCI.2017.2772792
Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2016). Deep learning approach for network intrusion detection in software defined networking. 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 258–263. https://doi.org/10.1109/WINCOM.2016.7777224 DOI: https://doi.org/10.1109/WINCOM.2016.7777224
Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954-21961. https://doi.org/10.1109/ACCESS.2017.2762418 DOI: https://doi.org/10.1109/ACCESS.2017.2762418
Zhang, Y., Chen, X., Jin, L., Wang, X., & Guo, D. (2019). Network intrusion detection: Based on deep hierarchical network and original flow data. IEEE Access, 7, 37004–37016. https://doi.org/10.1109/ACCESS.2019.2905041 DOI: https://doi.org/10.1109/ACCESS.2019.2905041
Zhang, Z., Zhou, X., Zhang, X., Wang, L., & Wang, P. (2018). A model based on convolutional neural network for online transaction fraud detection. Security and Communication Networks, 2018, 1–9. https://doi.org/10.1155/2018/5680264 DOI: https://doi.org/10.1155/2018/5680264
Article Details
Abstract views: 715
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
