CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Advances in Intrusion Detection Systems: Integrating Machine Learning, Deep Learning, IoT, and Federated Learning

by Ziadul Amin Chowdhury, M.M. Rahman, Tanvir Azhar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 58
Year of Publication: 2024
Authors: Ziadul Amin Chowdhury, M.M. Rahman, Tanvir Azhar
10.5120/ijca2024924340

Ziadul Amin Chowdhury, M.M. Rahman, Tanvir Azhar . Advances in Intrusion Detection Systems: Integrating Machine Learning, Deep Learning, IoT, and Federated Learning. International Journal of Computer Applications. 186, 58 ( Dec 2024), 21-28. DOI=10.5120/ijca2024924340

@article{ 10.5120/ijca2024924340,
author = { Ziadul Amin Chowdhury, M.M. Rahman, Tanvir Azhar },
title = { Advances in Intrusion Detection Systems: Integrating Machine Learning, Deep Learning, IoT, and Federated Learning },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2024 },
volume = { 186 },
number = { 58 },
month = { Dec },
year = { 2024 },
issn = { 0975-8887 },
pages = { 21-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number58/advances-in-intrusion-detection-systems-integrating-machine-learning-deep-learning-iot-and-federated-learning/ },
doi = { 10.5120/ijca2024924340 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-12-27T02:46:14.171282+05:30
%A Ziadul Amin Chowdhury
%A M.M. Rahman
%A Tanvir Azhar
%T Advances in Intrusion Detection Systems: Integrating Machine Learning, Deep Learning, IoT, and Federated Learning
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 58
%P 21-28
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The integration of Machine Learning (ML) and Deep Learning (DL) techniques has ushered in a new era of Intrusion Detection Systems (IDS). These advanced approaches significantly enhance detection accuracy, enabling the identification of novel cyber threats and processing massive datasets to ensure robust and reliable network security. The synergy between IoT devices and Federated Learning empowers IDSs to handle distributed data sources and secure edge environments effectively. By leveraging diverse datasets, including network traffic, system logs, and user behavior, IDSs can construct comprehensive threat models and improve their overall effectiveness. This paper investigates cutting-edge methodologies and models based on ML, DL, IoT, and Federated Learning. The challenges associated with deploying DL and ML in IDS have been discussed, and potential avenues for future research have been proposed. This survey aims to guide researchers in adopting contemporary network security and intrusion detection techniques.

References
  1. Wagh, S.K., V.K. Pachghare, and S.R. Kolhe, Survey on intrusion detection system using machine learning techniques. International Journal of Computer Applications, 2013. 78(16): p. 30-37.
  2. Wei, J., et al., An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing. Concurrency and Computation: Practice and Experience, 2020. 32(24): p. e5922.
  3. Othman, S.M., et al., Survey on intrusion detection system types. International Journal of Cyber-Security and Digital Forensics, 2018. 7(4): p. 444-463.
  4. Anderson, J.P., Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, 1980.
  5. Denning, D.E., An intrusion-detection model. IEEE Transactions on software engineering, 1987(2): p. 222-232.
  6. Smaha, S.E. Haystack: An intrusion detection system. in Fourth Aerospace Computer Security Applications Conference. 1988. Orlando, FL, USA.
  7. Lunt, T.F. IDES: An intelligent system for detecting intruders. in Proceedings of the symposium: computer security, threat and countermeasures. 1990. Rome, Italy.
  8. Ryan, J., M.-J. Lin, and R. Miikkulainen, Intrusion detection with neural networks. Advances in neural information processing systems, 1997. 10.
  9. Peng, K., et al., Intrusion detection system based on decision tree over big data in fog environment. Wireless Communications and Mobile Computing, 2018. 2018.
  10. Schueller, Q., et al. A hierarchical intrusion detection system using support vector machine for SDN network in cloud data center. in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC). 2018. IEEE.
  11. Lo, C.-C., C.-C. Huang, and J. Ku. A cooperative intrusion detection system framework for cloud computing networks. in 2010 39th International Conference on Parallel Processing Workshops. 2010. IEEE.
  12. Deshpande, P., et al., HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management, 2018. 9: p. 567-576.
  13. Modi, C., et al., A survey of intrusion detection techniques in cloud. Journal of network and computer applications, 2013. 36(1): p. 42-57.
  14. Mohamed, T., et al. Intelligent Hand Gesture Recognition System Empowered With CNN. in 2022 International Conference on Cyber Resilience (ICCR). 2022. IEEE.
  15. Ghosh, P., et al. CS-PSO based intrusion detection system in cloud environment. in Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 1. 2019. Springer.
  16. Nguyen, M.T. and K. Kim, Genetic convolutional neural network for intrusion detection systems. Future Generation Computer Systems, 2020. 113: p. 418-427.
  17. Muneer, S., et al., A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis. Journal of Engineering, 2024. 2024(1): p. 3909173.
  18. Agrawal, S., et al., Federated learning for intrusion detection system: Concepts, challenges and future directions. Computer Communications, 2022. 195: p. 346-361.
  19. Suramwar, M.V. and S. Bansode, A Survey on different types of Intrusion Detection Systems. International Journal of Computer Applications, 2015. 122(16).
  20. Biermann, E., E. Cloete, and L.M. Venter, A comparison of intrusion detection systems. Computers & Security, 2001. 20(8): p. 676-683.
  21. Nasteski, V., An overview of the supervised machine learning methods. Horizons. b, 2017. 4(51-62): p. 56.
  22. Naeem, S., et al., An unsupervised machine learning algorithms: Comprehensive review. International Journal of Computing and Digital Systems, 2023.
  23. Van Engelen, J.E. and H.H. Hoos, A survey on semi-supervised learning. Machine learning, 2020. 109(2): p. 373-440.
  24. Qiang, W. and Z. Zhongli. Reinforcement learning model, algorithms and its application. in 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC). 2011. IEEE.
  25. Peng, C.-Y.J., K.L. Lee, and G.M. Ingersoll, An introduction to logistic regression analysis and reporting. The journal of educational research, 2002. 96(1): p. 3-14.
  26. Sathya, S.S., R.G. Ramani, and K. Sivaselvi, Discriminant analysis based feature selection in kdd intrusion dataset. International Journal of computer applications, 2011. 31(11): p. 1-7.
  27. Gupta, M. and S. Shrivastava, Intrusion detection system based on SVM and bee colony. International Journal of Computer Applications, 2015. 111(10).
  28. Quinlan, J.R., Induction of decision trees. Machine learning, 1986. 1: p. 81-106.
  29. Breiman, L., Random forests. Machine learning, 2001. 45: p. 5-32.
  30. O'shea, K. and R. Nash, An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458, 2015.
  31. Staudemeyer, R.C. and E.R. Morris, Understanding LSTM--a tutorial into long short-term memory recurrent neural networks. arXiv preprint arXiv:1909.09586, 2019.
  32. Qaddour, J. and N. Rajabi, LSTM Deep Recurrent Neural Network Model for Voltage Abnormality Detection at IoT Gateway. Int. J. Comput. Appl., 2019. 177(9): p. 9-13.
  33. Hinton, G., A Practical Guide to Training Restricted Boltzmann Machines. Neural Networks: Tricks of the Trade/Springer, 2012.
  34. Hinton, G.E., Deep belief networks. Scholarpedia, 2009. 4(5): p. 5947.
  35. Meyer, D., Introduction to autoencoders. 2015.
  36. 36. Creswell, A., et al., Generative adversarial networks: An overview. IEEE signal processing magazine, 2018. 35(1): p. 53-65.
  37. Liu, Y., et al., Transformer in convolutional neural networks. arXiv preprint arXiv:2106.03180, 2021. 3.
  38. Liu, G., et al., An enhanced intrusion detection model based on improved kNN in WSNs. Sensors, 2022. 22(4): p. 1407.
  39. Khammassi, C. and S. Krichen, A NSGA2-LR wrapper approach for feature selection in network intrusion detection. Computer Networks, 2020. 172: p. 107183.
  40. Choraś, M. and M. Pawlicki, Intrusion detection approach based on optimised artificial neural network. Neurocomputing, 2021. 452: p. 705-715.
  41. Pranto, M.B., et al., Performance of machine learning techniques in anomaly detection with basic feature selection strategy-a network intrusion detection system. J. Adv. Inf. Technol, 2022. 13(1).
  42. Bindra, N. and M. Sood, Detecting DDoS attacks using machine learning techniques and contemporary intrusion detection dataset. Automatic Control and Computer Sciences, 2019. 53(5): p. 419-428.
  43. Çavuşoğlu, Ü., A new hybrid approach for intrusion detection using machine learning methods. Applied Intelligence, 2019. 49: p. 2735-2761.
  44. Ren, J., et al., Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Security and communication networks, 2019. 2019(1): p. 7130868.
  45. Alqahtani, H., et al. Cyber intrusion detection using machine learning classification techniques. in Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers 1. 2020. Springer.
  46. Saranya, T., et al., Performance analysis of machine learning algorithms in intrusion detection system: A review. Procedia Computer Science, 2020. 171: p. 1251-1260.
  47. Kiran, K.S., et al., Building a intrusion detection system for IoT environment using machine learning techniques. Procedia Computer Science, 2020. 171: p. 2372-2379.
  48. Asif, M., et al., MapReduce based intelligent model for intrusion detection using machine learning technique. Journal of King Saud University-Computer and Information Sciences, 2022. 34(10): p. 9723-9731.
  49. Sarhan, M., et al. Netflow datasets for machine learning-based network intrusion detection systems. in Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings 10. 2021. Springer.
  50. Raghuvanshi, A., et al., Intrusion detection using machine learning for risk mitigation in IoT‐enabled smart irrigation in smart farming. Journal of Food Quality, 2022. 2022(1): p. 3955514.
  51. Logeswari, G., S. Bose, and T. Anitha, An intrusion detection system for sdn using machine learning. Intelligent Automation & Soft Computing, 2023. 35(1): p. 867-880.
  52. Singh, A., H. Kaur, and N. Kaur, A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network. Cluster Computing, 2024. 27(3): p. 3537-3557.
  53. Khan, F.A., et al., A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access, 2019. 7: p. 30373-30385.
  54. Ge, M., et al. Deep learning-based intrusion detection for IoT networks. in 2019 IEEE 24th pacific rim international symposium on dependable computing (PRDC). 2019. IEEE.
  55. Su, T., et al., BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access, 2020. 8: p. 29575-29585.
  56. Boukhalfa, A., et al., LSTM deep learning method for network intrusion detection system. International Journal of Electrical and Computer Engineering, 2020. 10(3): p. 3315.
  57. Mighan, S.N. and M. Kahani, A novel scalable intrusion detection system based on deep learning. International Journal of Information Security, 2021. 20(3): p. 387-403.
  58. Ashiku, L. and C. Dagli, Network intrusion detection system using deep learning. Procedia Computer Science, 2021. 185: p. 239-247.
  59. Akshay Kumaar, M., et al., A hybrid framework for intrusion detection in healthcare systems using deep learning. Frontiers in Public Health, 2022. 9: p. 824898.
  60. Abou El Houda, Z., B. Brik, and L. Khoukhi, “why should i trust your ids?”: An explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Open Journal of the Communications Society, 2022. 3: p. 1164-1176.
  61. Figueiredo, J., C. Serrão, and A.M. de Almeida, Deep learning model transposition for network intrusion detection systems. Electronics, 2023. 12(2): p. 293.
  62. Qazi, E.U.H., M.H. Faheem, and T. Zia, HDLNIDS: hybrid deep-learning-based network intrusion detection system. Applied Sciences, 2023. 13(8): p. 4921.
  63. Devendiran, R. and A.V. Turukmane, Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy. Expert Systems with Applications, 2024. 245: p. 123027.
  64. Chen, Z., et al., Intrusion detection for wireless edge networks based on federated learning. IEEE Access, 2020. 8: p. 217463-217472.
  65. Mothukuri, V., et al., Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet of Things Journal, 2021. 9(4): p. 2545-2554.
  66. Rey, V., et al., Federated learning for malware detection in IoT devices. Computer Networks, 2022. 204: p. 108693.
  67. Sarhan, M., et al., Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection. Journal of Network and Systems Management, 2023. 31(1): p. 3.
  68. Bukhari, S.M.S., et al., Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability. Ad Hoc Networks, 2024. 155: p. 103407.
  69. Liu, H. and B. Lang, Machine learning and deep learning methods for intrusion detection systems: A survey. applied sciences, 2019. 9(20): p. 4396.
Index Terms

Computer Science
Information Sciences
Intrusion Detection Techniques – IDS; IoT – Internet of Things
XAI – Explainable Artificial Intelligence; Federated Learning – FL

Keywords

IDS Deep Learning Machine Learning Federated Learning Cyber security IoT