Cyber Security Intrusion Detection Using a Deep Learning Method
The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. Presently, billions of devices are connected and every hour 0.46 Million new devices ar...
Saved in:
Published in | Mehran University research journal of engineering and technology Vol. 44; no. 1; pp. 69 - 74 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Mehran University of Engineering and Technology
01.01.2025
|
Subjects | |
Online Access | Get full text |
ISSN | 0254-7821 2413-7219 |
DOI | 10.22581/muet1982.3170 |
Cover
Loading…
Abstract | The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. Presently, billions of devices are connected and every hour 0.46 Million new devices are connected to the web. Hence, due to this huge increase, the number of interconnections and the use of diverse protocols increases. Information and cyber security is a challenge worldwide and a big issue in business. One of the major aspects of information security is intrusion detection. It is important for cyber protection due an increasing number of cyber-attacks. Present methods to detect, predict and prevent malware still fall short of the desired level. The new techniques of deep learning are poised to succeed for detecting intrusion by employing different algorithms of detection and prevention. This paper proposes a deep neural network (DNN) for intrusion detection by the use of Kaggle NLS-KDD dataset with the highest attained accuracy of 92%. This detection method may prove to be very useful for ensuring cyber security of computers hence preventing data and economic loss. |
---|---|
AbstractList | The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. Presently, billions of devices are connected and every hour 0.46 Million new devices are connected to the web. Hence, due to this huge increase, the number of interconnections and the use of diverse protocols increases. Information and cyber security is a challenge worldwide and a big issue in business. One of the major aspects of information security is intrusion detection. It is important for cyber protection due an increasing number of cyber-attacks. Present methods to detect, predict and prevent malware still fall short of the desired level. The new techniques of deep learning are poised to succeed for detecting intrusion by employing different algorithms of detection and prevention. This paper proposes a deep neural network (DNN) for intrusion detection by the use of Kaggle NLS-KDD dataset with the highest attained accuracy of 92%. This detection method may prove to be very useful for ensuring cyber security of computers hence preventing data and economic loss. The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need for security increasing daily. Presently, billions of devices are connected and approximately 0.46 million new devices connect to the internet every hour, contributing to an estimated 17 billion connected devices worldwide by 2024. Hence, this huge increase increases the number of interconnections and the use of diverse protocols. Information and cyber security is a global challenge and a big business issue. One of the major aspects of information security is intrusion detection. It is important for cyber protection due to an increasing number of cyber-attacks. Present methods to detect, predict, and prevent malware still fall short of the desired level. The new techniques of deep learning are poised to succeed in detecting intrusion by employing different algorithms of detection and prevention. This study evaluates the effectiveness of deep learning in intrusion detection, comparing DNN with other algorithms. Despite the use of the NSL-KDD dataset, the methodology provides a foundation for the future adoption of modern datasets. This paper proposes a deep neural network (DNN) for intrusion detection by the use of the Kaggle NLS-KDD dataset with the highest attained accuracy of 92%. This detection method may prove to be very useful for ensuring the cyber security of computers hence preventing data and economic loss. KEYWORDS Deep Neural Network Intrusion Detection Cyber Security Information Technology Knowledge Discovery in Databases (KDD |
Audience | Academic |
Author | Rehman, M. Abdul Massan, Shafiq-ur-Rehman Ullah, Basheer Khan, Rabia Ali |
Author_xml | – sequence: 1 givenname: Basheer orcidid: 0000-0001-9171-994X surname: Ullah fullname: Ullah, Basheer – sequence: 2 givenname: Shafiq-ur-Rehman orcidid: 0000-0001-6548-6513 surname: Massan fullname: Massan, Shafiq-ur-Rehman – sequence: 3 givenname: M. Abdul surname: Rehman fullname: Rehman, M. Abdul – sequence: 4 givenname: Rabia Ali surname: Khan fullname: Khan, Rabia Ali |
BookMark | eNpFkE1PwzAMhiMEEgN25dw_0BHHSZqcEBpfk4Y4wM6VmyYjiLUozQ7793TjSz7Y7yv7lfWcseOu7zxjl8BnQigDV5utz2CNmCFU_IhNhAQsKwH2mE24ULKsjIBTNh2Gd845aCU14oRdz3eNT8WLd9sU865YdDlth9h3xa3P3uX9tBpity5odPxnsfSUur1-8vmtby_YSaCPwU9_-jlb3d-9zh_L5fPDYn6zLB0i5tKKhgw1qDRQaxV5pzGAwwZIt1ppY63lKJULwsqAFEBVQgUZGumtQY_nbPGd2_b0Xn-muKG0q3uK9cHo07qmlKP78LVwzhlOOhgrZaNaC4YqFMgrbDU0YcyafWetaVyPXehzIjdW6zfRjVxDHP0bI6SWoBT8H7jUD0Py4e8B4PUBf_2Lv97jxy9hjHjD |
ContentType | Journal Article |
Copyright | COPYRIGHT 2025 Mehran University of Engineering and Technology |
Copyright_xml | – notice: COPYRIGHT 2025 Mehran University of Engineering and Technology |
DBID | AAYXX CITATION DOA |
DOI | 10.22581/muet1982.3170 |
DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2413-7219 |
EndPage | 74 |
ExternalDocumentID | oai_doaj_org_article_2ccc80a6f8944b5d918a7323073d61bf A824641551 10_22581_muet1982_3170 |
GroupedDBID | 188 5VS AAYXX ADBBV AINHJ ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ IAO ITC KQ8 OK1 RIG |
ID | FETCH-LOGICAL-c333t-92ba8ab3561ad95aec63f1c3b1a6d65689990345cf294f3af15725f4fb4e983e3 |
IEDL.DBID | DOA |
ISSN | 0254-7821 |
IngestDate | Wed Aug 27 01:20:33 EDT 2025 Sat Mar 08 18:48:15 EST 2025 Tue Jul 01 00:21:04 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | http://creativecommons.org/licenses/by-nc-nd/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c333t-92ba8ab3561ad95aec63f1c3b1a6d65689990345cf294f3af15725f4fb4e983e3 |
ORCID | 0000-0001-6548-6513 0000-0001-9171-994X |
OpenAccessLink | https://doaj.org/article/2ccc80a6f8944b5d918a7323073d61bf |
PageCount | 6 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_2ccc80a6f8944b5d918a7323073d61bf gale_infotracacademiconefile_A824641551 crossref_primary_10_22581_muet1982_3170 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2025-01-01 |
PublicationDateYYYYMMDD | 2025-01-01 |
PublicationDate_xml | – month: 01 year: 2025 text: 2025-01-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Mehran University research journal of engineering and technology |
PublicationYear | 2025 |
Publisher | Mehran University of Engineering and Technology |
Publisher_xml | – name: Mehran University of Engineering and Technology |
SSID | ssj0001654633 |
Score | 2.2785792 |
Snippet | The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes... |
SourceID | doaj gale crossref |
SourceType | Open Website Aggregation Database Index Database |
StartPage | 69 |
SubjectTerms | Algorithms Cyberterrorism Data security Innovations Methods Neural networks Security management Spyware |
Title | Cyber Security Intrusion Detection Using a Deep Learning Method |
URI | https://doaj.org/article/2ccc80a6f8944b5d918a7323073d61bf |
Volume | 44 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxgQT1Fe8oDEFLWOncSeUClUBaksUKmbdX4xEaoqDPx7zk6KsrGwWlZsfef47rPuviPkpjLcADMyE8J4JChOZQZAZFA5KJnjQYpYjbx4KedL8bwqVr1WXzEnrJUHboEb5dZaOYYySIWfK5xiEioe05e5K5kJ8fZFn9cjU-l1JdbotH3kkQFl6AZZq9iIx1ey0ceXb5Bt58hYY5finkdKwv3d9dxzNLMDst9FiHTS7uyQ7Pj6iOz1dAOPyd302_gNfe16z9GnOpZOIML0wTcpt6qmKReAAo74Ne1UVN_pIjWMPiHL2ePbdJ51nRAyyzlvMpUbkGA4BjvgVAHeljwwyw2D0mFEhqRJjbkobMiVCBwCK6q8CCIY4ZXknp-SQf1Z-zNCjakinMxUHrmUMkogA8NplXBg_dgNye0WDb1uBS80EoWEm97ipiNuQ3IfwfqdFYWq0wCaT3fm03-ZD5eLUOv4OzUbsNBVBeBmozCVnshclDHoYef_sdwF2c1jA9_0hnJJBmgdf4VRRWOu0wH6AZ4rx4c |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+security+intrusion+detection+using+a+deep+learning+method&rft.jtitle=Mehran+University+research+journal+of+engineering+and+technology&rft.au=Ullah%2C+Basheer&rft.au=Massan%2C+Shafiq-ur-Rehman&rft.au=Rehman%2C+M.+Abdul&rft.au=Khan%2C+Rabia+Ali&rft.date=2025-01-01&rft.pub=Mehran+University+of+Engineering+and+Technology&rft.issn=0254-7821&rft.volume=44&rft.issue=1&rft.spage=69&rft_id=info:doi/10.22581%2Fmuet1982.3170&rft.externalDocID=A824641551 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0254-7821&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0254-7821&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0254-7821&client=summon |