CFP last date
21 April 2025
Reseach Article

An Enhanced Anomaly Detection in Networked Systems through Deep Learning Model

by Chaitali V. Chaudhary, S. Vanitha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 66
Year of Publication: 2025
Authors: Chaitali V. Chaudhary, S. Vanitha
10.5120/ijca2025924451

Chaitali V. Chaudhary, S. Vanitha . An Enhanced Anomaly Detection in Networked Systems through Deep Learning Model. International Journal of Computer Applications. 186, 66 ( Feb 2025), 1-6. DOI=10.5120/ijca2025924451

@article{ 10.5120/ijca2025924451,
author = { Chaitali V. Chaudhary, S. Vanitha },
title = { An Enhanced Anomaly Detection in Networked Systems through Deep Learning Model },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2025 },
volume = { 186 },
number = { 66 },
month = { Feb },
year = { 2025 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number66/an-enhanced-anomaly-detection-in-networked-systems-through-deep-learning-model/ },
doi = { 10.5120/ijca2025924451 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-02-25T22:57:53.860514+05:30
%A Chaitali V. Chaudhary
%A S. Vanitha
%T An Enhanced Anomaly Detection in Networked Systems through Deep Learning Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 66
%P 1-6
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the rapidly evolving digital landscape, the proliferation of interconnected devices and networks has introduced unprecedented security challenges. As cyber threats evolve in complexity there is a pressing need for robust intrusion detection systems (IDS) capable of safeguarding against a wide range of attacks. This paper explores the efficacy of utilizing deep learning techniques, specifically a multi-scale convolutional neural network (M-CNN) for detecting network intrusions using the CSE-CIC-IDS2018[9] dataset. The study focuses on meticulous data preprocessing techniques to enhance model performance and presents a streamlined approach for intrusion detection. Through comprehensive experimentation and evaluation, the proposed M-CNN model demonstrates high accuracy, precision, recall, and F1-score for detecting various types of network intrusions comapred to other studies, highlighting its effectiveness in mitigating cyber threats in modern networks.

References
  1. Numpy, the fundamental package for scientific computing with python. 2022.
  2. Pandas, a fast, powerful, flexible, and easy-to-use open-source data analysis and data manipulation library for python. 2022.
  3. Confusion matrix, accuracy, precision, recall, f1 score. https://medium.com/analytics-vidhya/ confusion-matrix-accuracy-precision-recall-f1-score-ade299cf63cd, 2023. Accessed: 2024-06-20.
  4. Datasets for data mining, 2023. Accessed: 2024-06-20.
  5. Tensorflow. https://www.tensorflow.org/, 2023. Accessed: 2024-06-20.
  6. KDD Cup 1999. Kdd cup 1999 data. http://kdd.ics.uci. edu/databases/kddcup99/kddcup99.html, 1999. Accessed: 2024-06-19.
  7. CrowdStrike. Crowdstrike 2024 global threat report. 2024.
  8. Communications Security Establishment. Cse. https:// www.cse-cst.gc.ca/en, 2024.
  9. Canadian Institute for Cybersecurity. Cicids 2018 dataset. https://www.unb.ca/cic/datasets/ids-2018.html, 2018.
  10. Canadian Institute for Cybersecurity. Canadian institute for cybersecurity. https://www.unb.ca/cic/, 2024.
  11. R. Gupta, Z. C. Kumar, and V. N. Patil. Design of deep neural network based anomaly detection system. In 2022 IEEE 7th International conference for Convergence in Technology (I2CT), pages 1–5, Mumbai, India, 2022.
  12. S. S. Kanumalli, L. K, R. A, S. P, and T. M. A scalable network intrusion detection system using bi-lstm and cnn. In 2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), pages 1–6, Coimbatore, India, 2023.
  13. G. Karatas, O. Demir, and O. K. Sahingoz. Increasing the performance of machine learning-based idss on an imbalanced and up-to-date dataset. IEEE Access, 8:32150–32162, 2020.
  14. R. Kavitha and S. Amutha. Performance analysis of deep neural network and lstm models for secure network intrusion detection system. In 2022 IEEE 4th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), pages 390–396, Goa, India, 2022.
  15. J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi. Cnn-based network intrusion detection against denial-of-service attacks. Electronics, 9(6):916, 2020.
  16. P. Kisanga, I. Woungang, I. Traore, and G. H. S. Carvalho. Network anomaly detection using a graph neural network. In 2023 International Conference on Computing, Networking and Communications (ICNC), pages 61–65, Honolulu, HI, USA, 2023.
  17. C. Lu. Research on the technical application of artificial intelligence in network intrusion detection system. In 2022 International Conference on Electronics and Devices, Computational Science (ICEDCS), pages 109–112, Marseille, France, 2022.
  18. A. Mezina, R. Burget, and C. M. Travieso-Gonz´alez. Network anomaly detection with temporal convolutional network and u-net model. IEEE Access, 9:143608–143622, 2021.
  19. S. N. Pakanzad and H. Monkaresi. Providing a hybrid approach for detecting malicious traffic on the computer networks using convolutional neural networks. In 2020 28th Iranian Conference on Electrical Engineering (ICEE), pages 1– 6, Tabriz, Iran, 2020.
  20. David M. W. Powers. Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation, 2020.
  21. Python Software Foundation. Python language reference, version 3.6. 2022.
  22. R. Ratti, S. Nandi, and S. R. Singh. Online network attack detection using statistical features. In 2021 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pages 125–130, Hyderabad, India, 2021.
  23. Amazon Web Services. Cicids 2018 dataset on aws. https: //registry.opendata.aws/cse-cic-ids2018/, 2024.
  24. S. U. Tapu, S. A. A. Shopnil, R. B. Tamanna, M. A. A. Dewan, and M. G. R. Alam. Malicious data classification in packet data network through hybrid meta deep learning. IEEE Access, 11:140609–140625, 2023.
  25. Amol D. Vibhute and Vikram Nakum. Deep learning-based network anomaly detection and classification in an imbalanced cloud environment. Procedia Computer Science, 232:1636–1645, 2024.
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly detection CSE-CIC-IDS2018 Deep learning MCNN NIDS Network Security