THE UTILIZATION OF MACHINE LEARNING FOR NETWORK INTRUSION DETECTION SYSTEMS
Article Sidebar
Open full text
Issue Vol. 14 No. 4 (2024)
-
IDENTIFICATION OF AN ARBITRARY SHAPE RIGID OBSTACLE ILLUMINATED BY FLAT ACOUSTIC WAVE USING NEAR FIELD DATA
Tomasz Rymarczyk, Jan Sikora5-9
-
RADIO FREQUENCY BASED INPAINTING FOR INDOOR LOCALIZATION USING MEMORYLESS TECHNIQUES AND WIRELESS TECHNOLOGY
Tammineni Shanmukha Prasanthi, Swarajya Madhuri Rayavarapu, Gottapu Sasibhushana Rao, Raj Kumar Goswami, Gottapu Santosh Kumar10-15
-
INTELLIGENT MATCHING TECHNIQUE FOR FLEXIBLE ANTENNAS
Olena Semenova, Andriy Semenov, Stefan Meulesteen, Natalia Kryvinska, Hanna Pastushenko16-22
-
DIFFERENTIAL MUELLER-MATRIX MAPPING OF THE POLYCRYSTALLINE COMPONENT OF BIOLOGICAL TISSUES OF HUMAN ORGANS
Andrei Padure, Oksana Bakun, Ivan Mikirin, Oleksandr Dubolazov, Iryna Soltys, Oleksandr Olar, Yuriy Ushenko, Oleksandr Ushenko, Irina Palii, Saule Kumargazhanova23-27
-
POLARIZATION SELECTOR ON WAVEGUIDES PARTIALLY FILLED BY DIELECTRIC
Vitaly Pochernyaev, Nataliia Syvkova, Mariia Mahomedova28-31
-
FUNCTIONALLY INTEGRATED DEVICE FOR TEMPERATURE MEASUREMENT
Les Hotra, Oksana Boyko, Igor Helzhynskyy, Hryhorii Barylo, Marharyta Rozhdestvenska, Halyna Lastivka32-37
-
STUDY OF THE OZONE CONTROL PROCESS USING ELECTRONIC SENSORS
Sunggat Marxuly, Askar Abdykadyrov, Katipa Chezhimbayeva, Nurzhigit Smailov38-45
-
OPTIMIZING WIND POWER PLANTS: COMPARATIVE ENHANCEMENT IN LOW WIND SPEED ENVIRONMENTS
Mustafa Hussein Ibrahim, Muhammed A. Ibrahim, Salam Ibrahim Khather46-51
-
PV SYSTEM MPPT CONTROL: A COMPARATIVE ANALYSIS OF P&O, INCCOND, SMC AND FLC ALGORITHMS
Khoukha Bouguerra, Samia Latreche, Hamza Khemlche, Mabrouk Khemliche52-62
-
DSTATCOM-BASED 15 LEVEL ASYMMETRICAL MULTILEVEL INVERTER FOR IMPROVING POWER QUALITY
Panneerselvam Sundaramoorthi, Govindasamy Saravana Venkatesh63-70
-
COMPUTER SIMULATION OF A SUPERCONDUCTING TRANSFORMER SHORT-CIRCUIT
Leszek Jaroszyński71-74
-
AI-BASED FIELD-ORIENTED CONTROL FOR INDUCTION MOTORS
Elmehdi Benmalek, Marouane Rayyam, Ayoub Gege, Omar Ennasiri, Adil Ezzaidi75-81
-
INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH
Olha Saliieva, Yurii Yaremchuk82-85
-
THE UTILIZATION OF MACHINE LEARNING FOR NETWORK INTRUSION DETECTION SYSTEMS
Ahmad Sanmorino, Herri Setiawan, John Roni Coyanda86-89
-
USING SUPPORT VECTORS TO BUILD A RULE-BASED SYSTEM FOR DETECTING MALICIOUS PROCESSES IN AN ORGANISATION'S NETWORK TRAFFIC
Halyna Haidur, Sergii Gakhov, Dmytro Hamza90-96
-
EXTRACTING EMOTION-CAUSE PAIRS: A BILSTM-DRIVEN METHODOLOGY
Raga Madhuri Chandra, Giri Venkata Sai Tej Neelaiahgari, Satya Sumanth Vanapalli97-103
-
IMPROVING α-PARAMETERIZED DIFFERENTIAL TRANSFORM METHOD WITH DANDELION OPTIMIZER FOR SOLVING ORDINARY DIFFERENTIAL EQUATIONS
Mustafa Raed Najeeb, Omar Saber Qasim104-108
-
THE METHOD OF ADAPTIVE STATISTICAL CODING TAKING INTO ACCOUNT THE STRUCTURAL FEATURES OF VIDEO IMAGES
Volodymyr Barannik, Dmytro Havrylov, Serhii Pantas, Yurii Tsimura, Tatayna Belikova, Rimma Viedienieva, Vasyl Kryshtal109-114
-
OPTIMIZING TIME SERIES FORECASTING: LEVERAGING MACHINE LEARNING MODELS FOR ENHANCED PREDICTIVE ACCURACY
Waldemar Wójcik, Assem Shayakhmetova, Ardak Akhmetova, Assel Abdildayeva, Galymzhan Nurtugan115-120
-
SYNCHRONIZATION OF EVENT-DRIVEN MANAGEMENT DURING DATA COLLECTION
Valeriy Kuzminykh, Oleksandr Koval, Yevhen Havrylko, Beibei Xu, Iryna Yepifanova, Shiwei Zhu, Nataliia Bieliaieva, Bakhyt Yeraliyeva121-129
-
INTERFACE LAYOUT VERSUS EFFICIENCY OF INFORMATION ASSIMILATION IN THE LEARNING PROCESS
Julia Zachwatowicz, Oliwia Zioło, Mariusz Dzieńkowski130-135
-
AUTOMATED WATER MANAGEMENT SYSTEM WITH AI-BASED DE-MAND PREDICTION
Arman Mohammad Nakib136-140
-
UML DIAGRAMS OF THE MANAGEMENT SYSTEM OF MAINTENANCE STATIONS
Lyudmila Samchuk, Yuliia Povstiana141-145
-
DEFECT SEVERITY CODE PREDICTION BASED ON ENSEMBLE LEARNING
Ghada Mohammad Tahir Aldabbagh, Safwan Omar Hasoon146-153
-
AFFORDABLE AUGMENTED REALITY FOR SPINE SURGERY: AN EMPIRICAL INVESTIGATION INTO IMPROVING VISUALIZATION AND SURGICAL ACCURACY
Iqra Aslam, Muhammad Jasim Saeed, Zarmina Jahangir, Kanza Zafar, Muhammad Awais Sattar154-163
Archives
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
Main Article Content
DOI
Authors
Abstract
This study investigates the integration of Multilayer Perceptron (MLP) architecture in Network Intrusion Detection Systems (NIDS) to strengthen cyber defences against evolving threats. The goal is to explore the potential of MLP in learning complex patterns and adapting to dynamic attack vectors, thereby improving detection accuracy. Key results from 5-fold cross-validation demonstrate model consistency, achieving an average accuracy of 0.97 with minimal standard deviation. Further evaluation across multiple nodes per layer and train-test splits demonstrate model robustness, displaying high metrics such as AUC-ROC and F1-Score. Challenges, such as the scarcity of large labelled datasets and complex model interpretability, are acknowledged. This study provides a comprehensive foundation for future investigations, suggesting potential directions such as integrating advanced neural network architectures and assessing model transferability. In conclusion, this study contributes to the evolving intersection of machine learning and cyber security, offering insights into the strengths, limitations, and future directions of MLP-based NIDS. As cyber threats evolve, continued refinement of MLP methods is critical to effective network defences against sophisticated adversaries.
Keywords:
References
[1] Alazab M. et al.: An Effective Networks Intrusion Detection Approach Based on Hybrid Harris Hawks and Multi-Layer Perceptron. Egyptian Informatics Journal 25, 2024, 100423. DOI: https://doi.org/10.1016/j.eij.2023.100423
[2] Anthi E. et al.: Hardening Machine Learning Denial of Service (DoS) Defences against Adversarial Attacks in IoT Smart Home Networks. Computers and Security 108, 2021, 102352. DOI: https://doi.org/10.1016/j.cose.2021.102352
[3] Artur M.: Review the Performance of the Bernoulli Naïve Bayes Classifier in Intrusion Detection Systems Using Recursive Feature Elimination with Cross-Validated Selection of the Best Number of Features. Procedia Computer Science 190(2019), 2021, 564–70. DOI: https://doi.org/10.1016/j.procs.2021.06.066
[4] Bedi P. et al.: Siam-IDS: Handling Class Imbalance Problem in Intrusion Detection Systems Using Siamese Neural Network. Procedia Computer Science 171, 2020, 780–89. DOI: https://doi.org/10.1016/j.procs.2020.04.085
[5] Bukhari O. et al.: Anomaly Detection Using Ensemble Techniques for Boosting the Security of Intrusion Detection System. Procedia Computer Science 218, 2022, 1003–13. DOI: https://doi.org/10.1016/j.procs.2023.01.080
[6] Bukhari S. M. S. et al.: Secure and Privacy-Preserving Intrusion Detection in Wireless Sensor Networks: Federated Learning with SCNN-Bi-LSTM for Enhanced Reliability. Ad Hoc Networks 155, 2024, 103407. DOI: https://doi.org/10.1016/j.adhoc.2024.103407
[7] Choudhary S., Nishtha K.: Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets Using Deep Learning in IoT. Procedia Computer Science 167, 2020, 1561–73. DOI: https://doi.org/10.1016/j.procs.2020.03.367
[8] Hnamte, V., Hussain J.: Dependable Intrusion Detection System Using Deep Convolutional Neural Network: A Novel Framework and Performance Evaluation Approach. Telematics and Informatics Reports 11, 2023, 100077. DOI: https://doi.org/10.1016/j.teler.2023.100077
[9] Hossain M. A., Islam M. S.: Ensuring Network Security with a Robust Intrusion Detection System Using Ensemble-Based Machine Learning. Array 19, 2023, 100306. DOI: https://doi.org/10.1016/j.array.2023.100306
[10] Ishaque M. et al.: A Novel Hybrid Technique Using Fuzzy Logic, Neural Networks and Genetic Algorithm for Intrusion Detection System. Measurement: Sensors 30, 2023, 100933. DOI: https://doi.org/10.1016/j.measen.2023.100933
[11] Khalil A. et al.: Artificial Intelligence-Based Intrusion Detection System for V2V Communication in Vehicular Adhoc Networks. Ain Shams Engineering Journal 15(4), 2024, 102616. DOI: https://doi.org/10.1016/j.asej.2023.102616
[12] Layeghy S. et al.: DI-NIDS: Domain Invariant Network Intrusion Detection System. Knowledge-Based Systems 273, 2023, 110626. DOI: https://doi.org/10.1016/j.knosys.2023.110626
[13] Lin H. et al.: Internet of Things Intrusion Detection Model and Algorithm Based on Cloud Computing and Multi-Feature Extraction Extreme Learning Machine. Digital Communications and Networks 9(1), 2023, 111–24. DOI: https://doi.org/10.1016/j.dcan.2022.09.021
[14] Manocchio L. D. et al.: FlowTransformer: A Transformer Framework for Flow-Based Network Intrusion Detection Systems. Expert Systems with Applications 241, 2024, 122564. DOI: https://doi.org/10.1016/j.eswa.2023.122564
[15] Muruganandam S. et al.: A Deep Learning Based Feed Forward Artificial Neural Network to Predict the K-Barriers for Intrusion Detection Using a Wireless Sensor Network. Measurement: Sensors 25, 2023, 100613. DOI: https://doi.org/10.1016/j.measen.2022.100613
[16] Osa E. et al.: Design and Implementation of a Deep Neural Network Approach for Intrusion Detection Systems. E-Prime - Advances in Electrical Engineering, Electronics and Energy 7, 2024, 100434. DOI: https://doi.org/10.1016/j.prime.2024.100434
[17] Palshikar A.: What Distinguishes Binary from Multi-Class Intrusion Detection Systems: Observations from Experiments. International Journal of Information Management Data Insights 2(2), 2022, 100125. DOI: https://doi.org/10.1016/j.jjimei.2022.100125
[18] Patterson C. M. et al.: ‘I Don’t Think We’re There yet’: The Practices and Challenges of Organisational Learning from Cyber Security Incidents. Computers and Security 139, 2024, 103699. DOI: https://doi.org/10.1016/j.cose.2023.103699
[19] Paya A. et al.: Apollon: A Robust Defense System against Adversarial Machine Learning Attacks in Intrusion Detection Systems. Computers and Security 136, 2024, 103546. DOI: https://doi.org/10.1016/j.cose.2023.103546
[20] Sanmorino A., Isabella.: The Design a System of Retention and Control on Broiler Farms Based on the Flow of Data. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) 4, 2017. DOI: https://doi.org/10.11591/eecsi.v4.973
[21] Sanmorino A.: Development of Computer Assisted Instruction (CAI) for Compiler Model: The Simulation of Stack on Code Generation. International Conference in Green and Ubiquitous Technology, GUT 2012, 2012. DOI: https://doi.org/10.1109/GUT.2012.6344164
[22] Serinelli B. M. et al.: Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System. Procedia Computer Science 175, 2020, 560–65. DOI: https://doi.org/10.1016/j.procs.2020.07.080
[23] Ullah S. et al.: TNN-IDS: Transformer Neural Network-Based Intrusion Detection System for MQTT-Enabled IoT Networks. Computer Networks 237, 2023, 110072. DOI: https://doi.org/10.1016/j.comnet.2023.110072
[24] Wang S. et al.: Res-TranBiLSTM: An Intelligent Approach for Intrusion Detection in the Internet of Things. Computer Networks 235, 2023, 109982. DOI: https://doi.org/10.1016/j.comnet.2023.109982
Article Details
Abstract views: 285

