Cyber Security Intrusion Detection Using a Deep Learning Method

The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. Presently, billions of devices are connected and every hour 0.46 Million new devices ar...

Full description

Saved in:
Bibliographic Details
Published inMehran University research journal of engineering and technology Vol. 44; no. 1; pp. 69 - 74
Main Authors Ullah, Basheer, Massan, Shafiq-ur-Rehman, Rehman, M. Abdul, Khan, Rabia Ali
Format Journal Article
LanguageEnglish
Published Mehran University of Engineering and Technology 01.01.2025
Subjects
Online AccessGet full text
ISSN0254-7821
2413-7219
DOI10.22581/muet1982.3170

Cover

Loading…
Abstract The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. Presently, billions of devices are connected and every hour 0.46 Million new devices are connected to the web. Hence, due to this huge increase, the number of interconnections and the use of diverse protocols increases. Information and cyber security is a challenge worldwide and a big issue in business. One of the major aspects of information security is intrusion detection. It is important for cyber protection due an increasing number of cyber-attacks. Present methods to detect, predict and prevent malware still fall short of the desired level. The new techniques of deep learning are poised to succeed for detecting intrusion by employing different algorithms of detection and prevention. This paper proposes a deep neural network (DNN) for intrusion detection by the use of Kaggle NLS-KDD dataset with the highest attained accuracy of 92%. This detection method may prove to be very useful for ensuring cyber security of computers hence preventing data and economic loss.
AbstractList The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. Presently, billions of devices are connected and every hour 0.46 Million new devices are connected to the web. Hence, due to this huge increase, the number of interconnections and the use of diverse protocols increases. Information and cyber security is a challenge worldwide and a big issue in business. One of the major aspects of information security is intrusion detection. It is important for cyber protection due an increasing number of cyber-attacks. Present methods to detect, predict and prevent malware still fall short of the desired level. The new techniques of deep learning are poised to succeed for detecting intrusion by employing different algorithms of detection and prevention. This paper proposes a deep neural network (DNN) for intrusion detection by the use of Kaggle NLS-KDD dataset with the highest attained accuracy of 92%. This detection method may prove to be very useful for ensuring cyber security of computers hence preventing data and economic loss.
The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need for security increasing daily. Presently, billions of devices are connected and approximately 0.46 million new devices connect to the internet every hour, contributing to an estimated 17 billion connected devices worldwide by 2024. Hence, this huge increase increases the number of interconnections and the use of diverse protocols. Information and cyber security is a global challenge and a big business issue. One of the major aspects of information security is intrusion detection. It is important for cyber protection due to an increasing number of cyber-attacks. Present methods to detect, predict, and prevent malware still fall short of the desired level. The new techniques of deep learning are poised to succeed in detecting intrusion by employing different algorithms of detection and prevention. This study evaluates the effectiveness of deep learning in intrusion detection, comparing DNN with other algorithms. Despite the use of the NSL-KDD dataset, the methodology provides a foundation for the future adoption of modern datasets. This paper proposes a deep neural network (DNN) for intrusion detection by the use of the Kaggle NLS-KDD dataset with the highest attained accuracy of 92%. This detection method may prove to be very useful for ensuring the cyber security of computers hence preventing data and economic loss. KEYWORDS Deep Neural Network Intrusion Detection Cyber Security Information Technology Knowledge Discovery in Databases (KDD
Audience Academic
Author Rehman, M. Abdul
Massan, Shafiq-ur-Rehman
Ullah, Basheer
Khan, Rabia Ali
Author_xml – sequence: 1
  givenname: Basheer
  orcidid: 0000-0001-9171-994X
  surname: Ullah
  fullname: Ullah, Basheer
– sequence: 2
  givenname: Shafiq-ur-Rehman
  orcidid: 0000-0001-6548-6513
  surname: Massan
  fullname: Massan, Shafiq-ur-Rehman
– sequence: 3
  givenname: M. Abdul
  surname: Rehman
  fullname: Rehman, M. Abdul
– sequence: 4
  givenname: Rabia Ali
  surname: Khan
  fullname: Khan, Rabia Ali
BookMark eNpFkE1PwzAMhiMEEgN25dw_0BHHSZqcEBpfk4Y4wM6VmyYjiLUozQ7793TjSz7Y7yv7lfWcseOu7zxjl8BnQigDV5utz2CNmCFU_IhNhAQsKwH2mE24ULKsjIBTNh2Gd845aCU14oRdz3eNT8WLd9sU865YdDlth9h3xa3P3uX9tBpity5odPxnsfSUur1-8vmtby_YSaCPwU9_-jlb3d-9zh_L5fPDYn6zLB0i5tKKhgw1qDRQaxV5pzGAwwZIt1ppY63lKJULwsqAFEBVQgUZGumtQY_nbPGd2_b0Xn-muKG0q3uK9cHo07qmlKP78LVwzhlOOhgrZaNaC4YqFMgrbDU0YcyafWetaVyPXehzIjdW6zfRjVxDHP0bI6SWoBT8H7jUD0Py4e8B4PUBf_2Lv97jxy9hjHjD
ContentType Journal Article
Copyright COPYRIGHT 2025 Mehran University of Engineering and Technology
Copyright_xml – notice: COPYRIGHT 2025 Mehran University of Engineering and Technology
DBID AAYXX
CITATION
DOA
DOI 10.22581/muet1982.3170
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2413-7219
EndPage 74
ExternalDocumentID oai_doaj_org_article_2ccc80a6f8944b5d918a7323073d61bf
A824641551
10_22581_muet1982_3170
GroupedDBID 188
5VS
AAYXX
ADBBV
AINHJ
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
IAO
ITC
KQ8
OK1
RIG
ID FETCH-LOGICAL-c333t-92ba8ab3561ad95aec63f1c3b1a6d65689990345cf294f3af15725f4fb4e983e3
IEDL.DBID DOA
ISSN 0254-7821
IngestDate Wed Aug 27 01:20:33 EDT 2025
Sat Mar 08 18:48:15 EST 2025
Tue Jul 01 00:21:04 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License http://creativecommons.org/licenses/by-nc-nd/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c333t-92ba8ab3561ad95aec63f1c3b1a6d65689990345cf294f3af15725f4fb4e983e3
ORCID 0000-0001-6548-6513
0000-0001-9171-994X
OpenAccessLink https://doaj.org/article/2ccc80a6f8944b5d918a7323073d61bf
PageCount 6
ParticipantIDs doaj_primary_oai_doaj_org_article_2ccc80a6f8944b5d918a7323073d61bf
gale_infotracacademiconefile_A824641551
crossref_primary_10_22581_muet1982_3170
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2025-01-01
PublicationDateYYYYMMDD 2025-01-01
PublicationDate_xml – month: 01
  year: 2025
  text: 2025-01-01
  day: 01
PublicationDecade 2020
PublicationTitle Mehran University research journal of engineering and technology
PublicationYear 2025
Publisher Mehran University of Engineering and Technology
Publisher_xml – name: Mehran University of Engineering and Technology
SSID ssj0001654633
Score 2.2785792
Snippet The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes...
SourceID doaj
gale
crossref
SourceType Open Website
Aggregation Database
Index Database
StartPage 69
SubjectTerms Algorithms
Cyberterrorism
Data security
Innovations
Methods
Neural networks
Security management
Spyware
Title Cyber Security Intrusion Detection Using a Deep Learning Method
URI https://doaj.org/article/2ccc80a6f8944b5d918a7323073d61bf
Volume 44
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxgQT1Fe8oDEFLWOncSeUClUBaksUKmbdX4xEaoqDPx7zk6KsrGwWlZsfef47rPuviPkpjLcADMyE8J4JChOZQZAZFA5KJnjQYpYjbx4KedL8bwqVr1WXzEnrJUHboEb5dZaOYYySIWfK5xiEioe05e5K5kJ8fZFn9cjU-l1JdbotH3kkQFl6AZZq9iIx1ey0ceXb5Bt58hYY5finkdKwv3d9dxzNLMDst9FiHTS7uyQ7Pj6iOz1dAOPyd302_gNfe16z9GnOpZOIML0wTcpt6qmKReAAo74Ne1UVN_pIjWMPiHL2ePbdJ51nRAyyzlvMpUbkGA4BjvgVAHeljwwyw2D0mFEhqRJjbkobMiVCBwCK6q8CCIY4ZXknp-SQf1Z-zNCjakinMxUHrmUMkogA8NplXBg_dgNye0WDb1uBS80EoWEm97ipiNuQ3IfwfqdFYWq0wCaT3fm03-ZD5eLUOv4OzUbsNBVBeBmozCVnshclDHoYef_sdwF2c1jA9_0hnJJBmgdf4VRRWOu0wH6AZ4rx4c
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+security+intrusion+detection+using+a+deep+learning+method&rft.jtitle=Mehran+University+research+journal+of+engineering+and+technology&rft.au=Ullah%2C+Basheer&rft.au=Massan%2C+Shafiq-ur-Rehman&rft.au=Rehman%2C+M.+Abdul&rft.au=Khan%2C+Rabia+Ali&rft.date=2025-01-01&rft.pub=Mehran+University+of+Engineering+and+Technology&rft.issn=0254-7821&rft.volume=44&rft.issue=1&rft.spage=69&rft_id=info:doi/10.22581%2Fmuet1982.3170&rft.externalDocID=A824641551
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0254-7821&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0254-7821&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0254-7821&client=summon