THE UTILIZATION OF MACHINE LEARNING FOR NETWORK INTRUSION DETECTION SYSTEMS
Ahmad Sanmorino
sanmorino@uigm.ac.idUniversitas Indo Global Mandiri, Department of Information Systems (Indonesia)
https://orcid.org/0000-0002-4949-4377
Herri Setiawan
Universitas Indo Global Mandiri, Department of Informatics Engineering (Indonesia)
John Roni Coyanda
Universitas Indo Global Mandiri, Department of Information Systems (Indonesia)
Abstract
This study investigates the integration of Multilayer Perceptron (MLP) architecture in Network Intrusion Detection Systems (NIDS) to strengthen cyber defences against evolving threats. The goal is to explore the potential of MLP in learning complex patterns and adapting to dynamic attack vectors, thereby improving detection accuracy. Key results from 5-fold cross-validation demonstrate model consistency, achieving an average accuracy of 0.97 with minimal standard deviation. Further evaluation across multiple nodes per layer and train-test splits demonstrate model robustness, displaying high metrics such as AUC-ROC and F1-Score. Challenges, such as the scarcity of large labelled datasets and complex model interpretability, are acknowledged. This study provides a comprehensive foundation for future investigations, suggesting potential directions such as integrating advanced neural network architectures and assessing model transferability. In conclusion, this study contributes to the evolving intersection of machine learning and cyber security, offering insights into the strengths, limitations, and future directions of MLP-based NIDS. As cyber threats evolve, continued refinement of MLP methods is critical to effective network defences against sophisticated adversaries.
Keywords:
network intrusion, multilayer perceptrons, machine learningReferences
[1] Alazab M. et al.: An Effective Networks Intrusion Detection Approach Based on Hybrid Harris Hawks and Multi-Layer Perceptron. Egyptian Informatics Journal 25, 2024, 100423.
Google Scholar
[2] Anthi E. et al.: Hardening Machine Learning Denial of Service (DoS) Defences against Adversarial Attacks in IoT Smart Home Networks. Computers and Security 108, 2021, 102352.
Google Scholar
[3] Artur M.: Review the Performance of the Bernoulli Naïve Bayes Classifier in Intrusion Detection Systems Using Recursive Feature Elimination with Cross-Validated Selection of the Best Number of Features. Procedia Computer Science 190(2019), 2021, 564–70.
Google Scholar
[4] Bedi P. et al.: Siam-IDS: Handling Class Imbalance Problem in Intrusion Detection Systems Using Siamese Neural Network. Procedia Computer Science 171, 2020, 780–89.
Google Scholar
[5] Bukhari O. et al.: Anomaly Detection Using Ensemble Techniques for Boosting the Security of Intrusion Detection System. Procedia Computer Science 218, 2022, 1003–13.
Google Scholar
[6] Bukhari S. M. S. et al.: Secure and Privacy-Preserving Intrusion Detection in Wireless Sensor Networks: Federated Learning with SCNN-Bi-LSTM for Enhanced Reliability. Ad Hoc Networks 155, 2024, 103407.
Google Scholar
[7] Choudhary S., Nishtha K.: Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets Using Deep Learning in IoT. Procedia Computer Science 167, 2020, 1561–73.
Google Scholar
[8] Hnamte, V., Hussain J.: Dependable Intrusion Detection System Using Deep Convolutional Neural Network: A Novel Framework and Performance Evaluation Approach. Telematics and Informatics Reports 11, 2023, 100077.
Google Scholar
[9] Hossain M. A., Islam M. S.: Ensuring Network Security with a Robust Intrusion Detection System Using Ensemble-Based Machine Learning. Array 19, 2023, 100306.
Google Scholar
[10] Ishaque M. et al.: A Novel Hybrid Technique Using Fuzzy Logic, Neural Networks and Genetic Algorithm for Intrusion Detection System. Measurement: Sensors 30, 2023, 100933.
Google Scholar
[11] Khalil A. et al.: Artificial Intelligence-Based Intrusion Detection System for V2V Communication in Vehicular Adhoc Networks. Ain Shams Engineering Journal 15(4), 2024, 102616.
Google Scholar
[12] Layeghy S. et al.: DI-NIDS: Domain Invariant Network Intrusion Detection System. Knowledge-Based Systems 273, 2023, 110626.
Google Scholar
[13] Lin H. et al.: Internet of Things Intrusion Detection Model and Algorithm Based on Cloud Computing and Multi-Feature Extraction Extreme Learning Machine. Digital Communications and Networks 9(1), 2023, 111–24.
Google Scholar
[14] Manocchio L. D. et al.: FlowTransformer: A Transformer Framework for Flow-Based Network Intrusion Detection Systems. Expert Systems with Applications 241, 2024, 122564.
Google Scholar
[15] Muruganandam S. et al.: A Deep Learning Based Feed Forward Artificial Neural Network to Predict the K-Barriers for Intrusion Detection Using a Wireless Sensor Network. Measurement: Sensors 25, 2023, 100613.
Google Scholar
[16] Osa E. et al.: Design and Implementation of a Deep Neural Network Approach for Intrusion Detection Systems. E-Prime - Advances in Electrical Engineering, Electronics and Energy 7, 2024, 100434.
Google Scholar
[17] Palshikar A.: What Distinguishes Binary from Multi-Class Intrusion Detection Systems: Observations from Experiments. International Journal of Information Management Data Insights 2(2), 2022, 100125.
Google Scholar
[18] Patterson C. M. et al.: ‘I Don’t Think We’re There yet’: The Practices and Challenges of Organisational Learning from Cyber Security Incidents. Computers and Security 139, 2024, 103699.
Google Scholar
[19] Paya A. et al.: Apollon: A Robust Defense System against Adversarial Machine Learning Attacks in Intrusion Detection Systems. Computers and Security 136, 2024, 103546.
Google Scholar
[20] Sanmorino A., Isabella.: The Design a System of Retention and Control on Broiler Farms Based on the Flow of Data. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) 4, 2017.
Google Scholar
[21] Sanmorino A.: Development of Computer Assisted Instruction (CAI) for Compiler Model: The Simulation of Stack on Code Generation. International Conference in Green and Ubiquitous Technology, GUT 2012, 2012.
Google Scholar
[22] Serinelli B. M. et al.: Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System. Procedia Computer Science 175, 2020, 560–65.
Google Scholar
[23] Ullah S. et al.: TNN-IDS: Transformer Neural Network-Based Intrusion Detection System for MQTT-Enabled IoT Networks. Computer Networks 237, 2023, 110072.
Google Scholar
[24] Wang S. et al.: Res-TranBiLSTM: An Intelligent Approach for Intrusion Detection in the Internet of Things. Computer Networks 235, 2023, 109982.
Google Scholar
Authors
Ahmad Sanmorinosanmorino@uigm.ac.id
Universitas Indo Global Mandiri, Department of Information Systems Indonesia
https://orcid.org/0000-0002-4949-4377
Authors
Herri SetiawanUniversitas Indo Global Mandiri, Department of Informatics Engineering Indonesia
Authors
John Roni CoyandaUniversitas Indo Global Mandiri, Department of Information Systems Indonesia
Statistics
Abstract views: 52PDF downloads: 36