Log in

A Novel Cyber Security Model Using Deep Transfer Learning

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Preventing attackers from interrupting or totally stop** critical services in cloud systems is a vital and challenging task. Today, machine learning-based algorithms and models are widely used, especially for the intelligent detection of zero-day attacks. Recently, deep learning methods that provide automatic feature extraction are designed to detect attacks automatically. In this study, we constructed a new deep learning model based on transfer learning for detecting and protecting cloud systems from malicious attacks. The developed deep transfer learning-based IDS converts network traffic into 2D preprocessed feature maps.Then the feature maps are processed with the transferred and fine-tuned convolutional layers of the deep learning model before the dense layer for detection and classification of traffic data. The results computed using the NSL-KDD test dataset reveal that the developed models achieve 89.74% multiclass and 92.58% binary classification accuracy. We performed another evaluation using only 20% of the training dataset as test data, and 80% for training. In this case, the model achieved 99.83% and 99.85% multiclass and binary classification accuracy, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Canada)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availibility

The NSL-KDD dataset is accessible at: https://www.unb.ca/cic/datasets/nsl.html.

References

  1. Zhang, X.; Chen, J.; Zhou, Y.; Han, L.; Lin, J.: A multiple-layer representation learning model for network-based attack detection. IEEE Access 7, 91992 (2019)

    Article  Google Scholar 

  2. Li, Y.; Xu, Y.; Liu, Z.; Hou, H.; Zheng, Y.; **n, Y.; Zhao, Y.; Cui, L.: Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154, 107450 (2020)

    Article  Google Scholar 

  3. Roy, B.; Cheung, H.: A deep learning approach for intrusion detection in internet of things using bi-directional long short-term memory recurrent neural network. In: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC) (IEEE, 2018), pp. 1–6

  4. Lin, S.Z.; Shi, Y.; Xue, Z.: Character-level intrusion detection based on convolutional neural networks. In: 2018 International Joint Conference on Neural Networks (IJCNN) (IEEE, 2018), pp. 1–8

  5. Zhang, Y.; Zhang, H.; Zhang, X.; Qi, D.: Deep learning intrusion detection model based on optimized imbalanced network data. In: 2018 IEEE 18th International Conference on Communication Technology (ICCT) IEEE, pp. 1128–1132 (2018)

  6. Naseer, S.; Saleem, Y.; Khalid, S.; Bashir, M.K.; Han, J.; Iqbal, M.M.; Han, K.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231 (2018)

    Article  Google Scholar 

  7. **n, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365 (2018)

    Article  Google Scholar 

  8. Manimaran, A.; Chandramohan, D.; Shrinivas, S.; Arulkumar, N.: A comprehensive novel model for network speech anomaly detection system using deep learning approach. Int. J. Speech Technol. 23(2), 305 (2020)

    Article  Google Scholar 

  9. Shone, N.; Ngoc, T.N.; Phai, V.D.; Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Topic. Comput. Intell. 2(1), 41 (2018)

    Article  Google Scholar 

  10. Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A.: 2009 IEEE Symposium On Computational Intelligence for Security and Defense Applications IEEE, pp. 1–6 (2009)

  11. Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A.: Tavallaee, Mahbod and Bagheri, Ebrahim and Lu, Wei and Ghorbani, Ali A. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications , pp. 1–6 (2009)

  12. Jo, W.; Kim, S.; Lee, C.; Shon, T.: Packet preprocessing in CNN-based network intrusion detection system. Electronics 9(7), 1151 (2020)

    Article  Google Scholar 

  13. Lopez-Martin, M.; Carro, B.; Sanchez-Esguevillas, A.: Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst. Appl. 141, 112963 (2020)

    Article  Google Scholar 

  14. Kasongo, S.M.; Sun, Y.: A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access 7, 38597 (2019)

    Article  Google Scholar 

  15. Kasongo, S.M.; Sun, Y.: A deep long short-term memory based classifier for wireless intrusion detection system. ICT Express 6(2), 98 (2020)

    Article  Google Scholar 

  16. Yin, C.; Zhu, Y.; Fei, J.; He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954 (2017)

    Article  Google Scholar 

  17. Zhiqiang, L.; Mohi-Ud-Din, G.; Bing, L.; Jianchao, L.; Ye, Z.; Zhijun, L.: Modeling network intrusion detection system using feed-forward neural network using UNSW-NB15 Dataset. In: 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE) IEEE, pp. 299–303 (2019)

  18. Wang, Z.: Deep learning-based intrusion detection with adversaries. IEEE Access 6, 38367 (2018)

    Article  Google Scholar 

  19. Parampottupadam, S.; Moldovann, A.N.: Cloud-based real-time network intrusion detection using deep learning. In: 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) IEEE, pp. 1–8 (2018)

  20. Vinayakumar, R.; Alazab, M.; Soman, K.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525 (2019)

    Article  Google Scholar 

  21. Zhang, C.; Ruan, F.; Yin, L.; Chen, X.; Zhai, L.; Liu, F.: A deep learning approach for network intrusion detection based on NSL-KDD dataset. In: 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID) IEEE, pp. 41–45 (2019)

  22. Zhang, Y.; Li, P.; Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711 (2019)

    Article  Google Scholar 

  23. Su, T.; Sun, H.; Zhu, J.; Wang, S.; Li, Y.: BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8, 29575 (2020)

    Article  Google Scholar 

  24. Zhang, J.; Li, F.; Ye, F.: An ensemble-based network intrusion detection scheme with bayesian deep learning. In: ICC 2020-2020 IEEE International Conference on Communications (ICC) IEEE, pp. 1–6 (2020)

  25. Ujjan, R.M.A.; Pervez, Z.; Dahal, K.; Bashir, A.K.; Mumtaz, R.; González, J.: Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Futur. Gener. Comput. Syst. 111, 763 (2020)

    Article  Google Scholar 

  26. Hassan, M.M.; Gumaei, A.; Alsanad, A.; Alrubaian, M.; Fortino, G.: A hybrid deep learning model for efficient intrusion detection in big data environment. Inf. Sci. 513, 386 (2020)

    Article  Google Scholar 

  27. Parra, G.D.L.T.; Rad, P.; Choo, K.K.R.; Beebe, N.: Detecting Internet of Things attacks using distributed deep learning. J. Netw. Comput. Appl. 163, 102662 (2020)

    Article  Google Scholar 

  28. Gamage, S.; Samarabandu, J.: Deep learning methods in network intrusion detection: a survey and an objective comparison. J. Netw. Comput. Appl. 169, 102767 (2020)

    Article  Google Scholar 

  29. Priyadarshini, R.; Barik, R.K.: A deep learning based intelligent framework to mitigate DDoS attack in fog environment, J. King Saud Univ.-Comput. Inform. Sci. (2019)

  30. Kasim, O.: An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks. Comput. Netw. 180, 107390 (2020)

    Article  Google Scholar 

  31. Çavuşoğlu, Ü.: A new hybrid approach for intrusion detection using machine learning methods. Appl. Intell. 49(7), 2735 (2019)

    Article  Google Scholar 

  32. Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inform. Secur. Appl. 50, 102419 (2020)

    Google Scholar 

  33. Elmasry, W.; Akbulut, A.; Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput. Netw. 168, 107042 (2020)

    Article  Google Scholar 

  34. Kasongo, S.M.; Sun, Y.: A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 92, 101752 (2020)

    Article  Google Scholar 

  35. Zhang, J.; Li, F.; Zhang, H.; Li, R.; Li, Y.: Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Netw. 95, 101974 (2019)

    Article  Google Scholar 

  36. Binbusayyis, A.; Vaiyapuri, T.: Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM, Applied Intelligence pp. 1–15 (2021)

  37. Tian, Q.; Han, D.; Li, K.C.; Liu, X.; Duan, L.; Castiglione, A.: An intrusion detection approach based on improved deep belief network. Appl. Intell. 50, 3162 (2020)

    Article  Google Scholar 

  38. Al-Qatf, M.; Lasheng, Y.; Al-Habib, M.; Al-Sabahi, K.: Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6, 52843 (2018)

    Article  Google Scholar 

  39. Yang, H.; Qin, G.; Ye, L.: Combined wireless network intrusion detection model based on deep learning. IEEE Access 7, 82624 (2019)

    Article  Google Scholar 

  40. Mushtaq, E.; Zameer, A.; Umer, M.; Abbasi, A.A.: A two-stage intrusion detection system with auto-encoder and LSTMs. Appl. Soft Comput. 121, 108768 (2022)

    Article  Google Scholar 

  41. Rani, M.; et al.: Effective network intrusion detection by addressing class imbalance with deep neural networks multimedia tools and applications. Multimedia Tools Appl. 81(6), 8499 (2022)

    Article  Google Scholar 

  42. Naseri, T.S.; Gharehchopogh, F.S.: A feature selection based on the farmland fertility algorithm for improved intrusion detection systems. J. Netw. Syst. Manage. 30(3), 1 (2022)

    Article  Google Scholar 

  43. Ding, Q.; Li, J.: AnoGLA: an efficient scheme to improve network anomaly detection. J. Inform. Secur. Appl. 66, 103149 (2022)

    Google Scholar 

  44. Ahmad, R.; Alsmadi, I.; Alhamdani, W.; Tawalbeh, L.: A deep learning ensemble approach to detecting unknown network attacks. J. Inform. Secur. Appl 67, 103196 (2022)

    Google Scholar 

  45. Simonyan, K.; Zisserman, A.: ar**v preprint ar**v:1409.1556 (2014)

  46. He, K.; Zhang, X.; Ren, S.; Sun, J.: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778 (2016)

  47. Szegedy, C.; Vanhoucke, V.; Ioffe, S.; Shlens, J.; Wojna, Z.: Proceedings of the IEEE conference on computer vision and pattern recognition , pp. 2818–2826 (2016)

  48. Masum, M.; Shahriar, H.; Haddad, H.M.: A transfer learning with deep neural network approach for network intrusion detection. Int. J. Intell. Comput. Res. (2021)

  49. Xu, C.; Shen, J.; Du, X.; Zhang, F.: An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access 6, 48697 (2018)

    Article  Google Scholar 

  50. Yan, B.; Han, G.: Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system. IEEE Access 6, 41238 (2018)

    Article  Google Scholar 

  51. Kasongo, S.M.; Sun, Y.: A deep gated recurrent unit based model for wireless intrusion detection system. ICT Express 7(1), 81 (2021)

    Article  Google Scholar 

  52. Jiang, F.; Fu, Y.; Gupta, B.B.; Liang, Y.; Rho, S.; Lou, F.; Meng, F.; Tian, Z.: Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans. Sustain. Comput. 5(2), 204 (2018)

    Article  Google Scholar 

  53. Abeshu, A.; Chilamkurti, N.: Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag. 56(2), 169 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This work was not supported by any institution or organization.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ünal Çavuşoğlu.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical Approval

This article does not contain any studies with animals performed by any of the authors.

Informed Consent

Informed Consent was obtained from all individual participants included in the study.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Çavuşoğlu, Ü., Akgun, D. & Hizal, S. A Novel Cyber Security Model Using Deep Transfer Learning. Arab J Sci Eng 49, 3623–3632 (2024). https://doi.org/10.1007/s13369-023-08092-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-023-08092-1

Keywords

Navigation