Enhancing intrusion detection systems: Innovative deep learning approaches using CNN, RNN, DBN and autoencoders for robust network security

Yakub HOSSAIN


Uttara University (Bangladesh)

Zannatul FERDOUS


Uttara University (Bangladesh)

Tanzillah WAHID


Uttara University (Bangladesh)

Md. Torikur RAHMAN

torikurrahman@gmail.com
Uttara University (Bangladesh)
https://orcid.org/0000-0003-2173-6458

Uttam Kumar DEY


Uttara University (Bangladesh)

Mohammad Amanul ISLAM


Uttara University (Bangladesh)

Abstract

The increasing sophistication of cyber threats poses significant challenges to network security. This makes effective intrusion detection system (IDS) more important than ever before. Conventional IDS methods, which often rely on signatures or rules it will struggle to keep up with its complex attacks and evolution. This thesis evaluates and analyze the performance of DL algorithms. They include convolutional neural networks (CNN), recurrent neural networks (RNN), deep belief networks (DBN), and Auto-encoder. Using the models, these models are trained and tested only on the NSL-set. KDD data, which is a widely accepted benchmark for evaluating IDS performance. Results show that the proposed deep learning approach significantly outperforms traditional methods, has a higher detection rate, reduce the false positive rate and the ability to identify both known and unknown intrusions. They leverage the strengths of CNN, RNN, DBN, and autoencoders. Doing this research Advances IDS capabilities by providing a robust and adaptable solution to enhance network security.


Keywords:

network intrusion detection, deep learning, CNN, RNN, DBN, autoencoder, NSL-KDD, cybersecurity

Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150. https://doi.org/10.1002/ett.4150
  Google Scholar

Edeh, D. I. (2021). Network intrusion detection system using deep learning technique. Master of Science, Department of Computing, University of Turku.
  Google Scholar

Fu, K., Cheng, D., Tu, Y., & Zhang, L. (2016). Credit card fraud detection using convolutional neural networks. In A. Hirose, S. Ozawa, K. Doya, K. Ikeda, M. Lee, & D. Liu (Eds.), Neural Information Processing (Vol. 9949, pp. 483–490). Springer International Publishing. https://doi.org/10.1007/978-3-319-46675-0_53
  Google Scholar

Ghani, H., Virdee, B., & Salekzamankhani, S. (2023). A deep learning approach for network intrusion detection using a small features vector. Journal of Cybersecurity and Privacy, 3(3), 451-463. https://doi.org/10.3390/jcp3030023
  Google Scholar

Kim, J., Kim, J., Thi Thu, H. L., & Kim, H. (2016). Long short term memory recurrent neural network cassifier for intrusion detection. 2016 International Conference on Platform Technology and Service (PlatCon) (pp. 1–5). https://doi.org/10.1109/PlatCon.2016.7456805
  Google Scholar

Kültür, E. (2022). Network intrusion detection with a deep learning approach. Master's thesis, Middle East Technical University (Turkey).
  Google Scholar

Nasr, M., Bahramali, A., & Houmansadr, A. (2018). DeepCorr: Strong flow correlation attacks on tor using deep learning. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1962–1976). https://doi.org/10.1145/3243734.3243824
  Google Scholar

Sama, L. (2022). Network intrusion detection using deep learning. Doctoral dissertation, Victoria University.
  Google Scholar

Sharafaldin, I., Lashkari, A. H., Hakak, S., & Ghorbani, A. A. (2019). Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. 2019 international carnahan conference on security technology (ICCST) (pp. 1-8). IEEE. https://doi.org/10.1109/CCST.2019.8888419
  Google Scholar

Shiri, F. M., Perumal, T., Mustapha, N., & Mohamed, R. (2024). A comprehensive overview and comparative analysis on deep learning models. Journal on Artificial Intelligence, 6, 301-360. https://doi.org/10.32604/jai.2024.054314
  Google Scholar

Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. https://doi.org/10.1109/TETCI.2017.2772792
  Google Scholar

Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2016). Deep learning approach for network intrusion detection in software defined networking. 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 258–263. https://doi.org/10.1109/WINCOM.2016.7777224
  Google Scholar

Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954-21961. https://doi.org/10.1109/ACCESS.2017.2762418
  Google Scholar

Zhang, Y., Chen, X., Jin, L., Wang, X., & Guo, D. (2019). Network intrusion detection: Based on deep hierarchical network and original flow data. IEEE Access, 7, 37004–37016. https://doi.org/10.1109/ACCESS.2019.2905041
  Google Scholar

Zhang, Z., Zhou, X., Zhang, X., Wang, L., & Wang, P. (2018). A model based on convolutional neural network for online transaction fraud detection. Security and Communication Networks, 2018, 1–9. https://doi.org/10.1155/2018/5680264
  Google Scholar

Download


Published
2025-03-31

Cited by

HOSSAIN, Y., FERDOUS, Z., WAHID, T., RAHMAN, M. T., DEY, U. K., & ISLAM, M. A. (2025). Enhancing intrusion detection systems: Innovative deep learning approaches using CNN, RNN, DBN and autoencoders for robust network security. Applied Computer Science, 21(1), 111–125. https://doi.org/10.35784/acs_6667

Authors

Yakub HOSSAIN 

Uttara University Bangladesh

Authors

Zannatul FERDOUS 

Uttara University Bangladesh

Authors

Tanzillah WAHID 

Uttara University Bangladesh

Authors

Md. Torikur RAHMAN 
torikurrahman@gmail.com
Uttara University Bangladesh
https://orcid.org/0000-0003-2173-6458

Authors

Uttam Kumar DEY 

Uttara University Bangladesh

Authors

Mohammad Amanul ISLAM 

Uttara University Bangladesh

Statistics

Abstract views: 50
PDF downloads: 2


License

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.


Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.