Machine Learning and Deep Learning Approaches For CyberSecurity A Review
Machine Learning and Deep Learning Approaches For CyberSecurity A Review
ABSTRACT The rapid evolution and growth of the internet through the last decades led to more concern
about cyber-attacks that are continuously increasing and changing. As a result, an effective intrusion
detection system was required to protect data, and the discovery of artificial intelligence’s sub-fields, machine
learning, and deep learning, was one of the most successful ways to address this problem. This paper reviewed
intrusion detection systems and discussed what types of learning algorithms machine learning and deep
learning are using to protect data from malicious behavior. It discusses recent machine learning and deep
learning work with various network implementations, applications, algorithms, learning approaches, and
datasets to develop an operational intrusion detection system.
INDEX TERMS Cybersecurity, machine learning, deep learning, intrusion detection system.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
19572 VOLUME 10, 2022
A. Halbouni et al.: Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
principles in software development. These names all indicate learning by analyzing data like text, images, and audio [4].
the same thing: a machine programmed to learn and find In contrast to deep learning models, which feature multiple
the best solution to a problem. DL is a subfield of machine connected layers, shallow learning models are built up of
learning, whereas machine learning is a subfield of AI. As a a few hidden layers. By stacking layers on top of layers,
result, ML and DL are employed to create an efficient and DL will be able to express increasing complexity functions
effective intrusion detection system. This paper provides an more effectively. DL is used to learn representations with
overview of machine learning and deep learning applications many abstraction levels [5]. Deep neural networks are capable
and approaches in intrusion detection systems by concen- of finding and learning representations from raw data and
trating on network security technologies, methodologies, and performing feature learning and classification [6]. Machine
implementation. learning methodologies are also utilized in deep learning.
Alan Turing stated that general use computers could learn However, other ways are employed in deep learning, such as
and qualify originality, which has paved the way to whether Transfer Learning, as shown in Figure 3.
computers should look at data to develop rules rather than
allow humans to do it. Machine learning algorithms are
algorithms that can learn and adapt based on data. Machine
learning algorithms are designed to generate output based
on what is learned from data and examples. For example,
such algorithms will allow a computer to choose and perform
a particular task on novel traffic detection without explicit
information [2].
Automatic analyses of attacks and security events, such
as spam mail, user identification, social media analytics,
and attack detection may be performed efficiently using
machine learning [1]. As indicated in Figure 2, there are three FIGURE 3. Deep learning approaches.
main techniques to machine learning: supervised, unsuper-
vised, semi-supervised, and reinforcement learning. Super-
vised learning is based on labeled data, unsupervised learning The remainder of the paper is organized as follows:
is based on unlabelled data, and semi-supervised learning is Section 2 discusses the intrusion detection system concept.
based on both. Section 3 summarises the most frequently utilized datasets
for the intrusion detection system. Section 4 discusses
recent advances in machine learning and deep learning-
based intrusion detection systems, while Section 5 concludes
this paper.
C. EVALUATION METRICS
Some indications are used to assess an intrusion detec-
tion system’s performance, either machine learning or deep
learning-based. These indicators are based on the confusion
matrix component that contains four metrics: True Positive
FIGURE 4. NIDS versus HIDS. (TP), True Negative (TN), False Positive (FP), and False Neg-
ative (FN), and the assessment indicators are as follows [1]:
• Accuracy - The ratio of correct predictions to records; a
1) ANOMALY DETECTION
higher accuracy indicates a more accurate prediction by
This model assumes that specific abnormal traffic has a low the learning model.
probability and can be distinguished from regular traffic with • Recall - The model’s capacity to locate all positive
a high probability [9]. Unsupervised learning and statisti- records is the detection rate, as it quantifies the correctly
cal learning-based anomaly detection algorithms can detect predicted records.
unique and undiscovered assaults. • Precision - The capacity to avoid mislabeling negative
records as positive; a high precision rate equates to a low
2) MISUSE DETECTION rate of false positives.
This approach is a signature-based technique. While moni- • F1-Score (F1) - The sum of Precision and Recall; a
toring threats in an IDS, detection can occur based on known higher F1 indicates a more effective learning model.
attack signatures [1]. This strategy is based on supervised • False Positive Rate (FPR) - To compute the False Alarm
learning and can detect illegal or suspicious behaviors that Rate, divide the total number of normal records identi-
can be used to defend against similar assault behaviors. fied as attacks by the total number of normal records.
B. UNSW-IDS15
Founded in 2015 by Australian Centre for Cyber Secu-
rity (ACCS). Samples in this dataset contain normal and
malicious traffic [12], and it has been collected from three
real-world websites; BID (Symantec Corporation), CVE
(Common Vulnerabilities and Exposures), and MSD
(Microsoft Security Bulletin) and then to generate the dataset,
it emulated in a laboratory environment. This dataset has nine
attack families, such as worms, DoS, and fuzzers [9].
C. CIC-IDS2017
The dataset was generated in 2017 by the Canadian Institute
for Cybersecurity. This dataset contains normal and attack
scenarios and includes an abstract behavior for 25 users based
on SSH, HTTPS, HTTP, FTP, and email protocols [8], [13].
D. NSL-KDD
It is the improved KDD dataset, where a large amount of
redundancy has been removed, and an advanced sub-dataset
has been created [10]. This dataset utilizes the same KDD99
attributes and belongs to four attack categories: DoS, U2R,
R2L, and Probe [8].
E. PU-IDS
A derivative dataset from NSL-KDD is generated to extract
a statistic from an input data and then utilized to create Table 6 shows a comparison of several deep learning meth-
new synthetic instances. The traffic generator of this dataset ods, the year the dataset was created, whether it was publicly
obtained the same format and attributes as the NSL-KDD available, the number of characteristics that were utilized for
dataset [8]. analysis, and lastly, how much traffic the data handled.
TABLE 6. Comparison between datasets. raw data. While in machine learning, the expert must
determine the necessary representations, in deep learn-
ing, the representations are identified automatically
through the use of deep learning algorithms.
• Interpretability – This is described as a model’s capacity
to comprehend human language. An interpretable model
can be understood without extra tools or procedures.
On the other hand, it is difficult to specify how neurons
should be modeled and how the layers should interact
in deep learning, making it difficult to explain how the
result was obtained.
IV. INTRUSION DETECTION SYSTEMS IN RECENT WORKS • Problem-solving – In conventional machine learning, the
USING MACHINE LEARNING AND DEEP LEARNING problem is divided into sub-problems, each of which
Methodologies and algorithms have undergone significant is solved independently, and then the final answer is
change and evolution to produce the most acceptable intru- obtained. On the other hand, deep learning will resolve
sion detection system in many applications that attempt to the issue completely [4].
identify constantly changing threats and attacks. Initially,
classification was based on machine learning, but as per- The following subsections describe how researchers
formance needed to be further improved, deep learning employed machine learning and deep learning to create an
was utilized to produce higher accuracy and a lower false intrusion detection system.
alarm rate.
A. MACHINE LEARNING IDS ALGORITHM
This subsection discusses recent research into IDS imple-
mentations that utilize a variety of machine learning
algorithms. Machine learning algorithms, such as support
vector machine (SVM) and random forest (RF), have been
used to investigate the binary categorization of IDS using a
supervised learning approach [14]. SVM outperformed RF
throughout the training process, whereas RF outperformed
SVM during the test procedure. Additionally, they concluded
that a classifier’s performance would vary based on the
dataset and attributes.
An IDS model based on a decision tree, naïve Bayes, and
the random forest was proposed by [15] to classify Probe,
R2L, and U2R on the NSL-KDD dataset. It is discovered that
FIGURE 5. Machine learning Vs. deep learning.
the highest accuracy was achieved in detecting DOS attacks
using the RF algorithm. Additionally, when they compared
The primary distinction between machine learning and their hybrid model with its 14 features to other hybrid models
deep learning is illustrated in Figure 5, and it is based on the with varying features, the hybrid model had a greater accu-
method by which the system gets input. It depends on how racy for DOS, Probe, and U2R and a nearly identical accuracy
the data is trained by machine learning, but it depends on the for R2L.
connections between artificial neural networks in deep learn- In order to increase the performance of the attack detection
ing to train data without requiring many human interactions. model, an intrusion detection strategy utilizing SVM ensem-
Additional differences between machine learning and deep ble with the feature was presented in [16]. They examined
learning are summarised here and in Table 7. validated training data and discovered that it might be used
• Data dependencies – This metric indicates the volume to improve the detection process resulting in the fast train-
of data. In traditional machine learning, based on rules, ing time, high accuracy, and low false alarm rate. However,
performance is improved when the data set is limited. because this strategy trains classifiers independently of fea-
In comparison, deep learning performs better with a vast ture spaces and then combines judgments via an ensemble,
number of data since a significant amount is required for some correlations across feature spaces will be missed during
accurate interpretation and understanding. classifier learning, lowering the model’s accuracy.
• Feature processing – This is a method of extracting Three datasets comprising high-level network features
features to generate patterns that contribute to the imple- were explicitly created for non-payload-based network intru-
mentation of learning algorithms and reduce the com- sion detection systems in [17] by enabling machine learn-
plexity of the data. In other words, the feature process ing classifiers to use Advanced Security Network Metrics
is used to do categorization and feature detection on (ASNM) features. It was the first dataset to include
data to an image data format, which aids in resolving the the critical nature of the datasets needed to construct an IDS
unbalanced dataset issue by computing the cost function for and the efficacy of Autoencoder for anomaly detection.
each class from the training sample. As a result, they were To enhance detection accuracy in IDS, the author incor-
able to reduce the number of computing parameters in their porated big data, deep learning approaches, and natural lan-
model, but their model’s accuracy was low compared to other guage processing in [28]. They worked with KDD CUP99
machine learning and neural network models. Table 9 sum- and achieved an accuracy of 94.32 % with their model.
marizes various deep learning algorithms for IDS. In addition, another deep neural network method was intro-
duced in [29] to detect risks and attacks in the cloud envi-
ronment. Their approach used Simulated Annealing and
Improved Genetic Algorithms to create the hybrid optimiza-
tion framework IGASAA using the datasets NSL-KDD2015,
CIC-IDS2017, and CIDDS-001. Compared to the Simulated
Annealing Algorithm (SAA), their model demonstrated a
higher detection rate, increased accuracy, and a lower false
alarm rate.
Web application security is highly reliant on detecting
malicious HTTP traffic, which needs a significant invest-
FIGURE 9. Stacked NDAE classification model. ment in training data gathering and a large dataset. To detect
malicious HTTP traffic, the authors in [29] introduced the
DeepPTSD method based on a deep transfer semi-supervised
learning methodology. The construction of their model is
given in Figure 11. They used two raw public datasets from
FSecurify and another from their lab via a honeypot server.
When a little training dataset is available, their model exceeds
other existing baselines, with a precision of 93.33% compared
to 86.67 % and 86.61 % for CNN and RNN, respectively.
D2H-IDS [41] is an intrusion detection system that was devel- Neural Network (DNN), and Gradient Boosting Tree (GBT).
oped to ensure the security of connections between connected The authors evaluated their strategy using the CIC-IDS2017
smart vehicles. This model is built on a framework for con- and UNSW-NB15 datasets. DNN has the highest accuracy
tinuous automated secure service availability and utilises a at 99.19 % based on UNSW-NB15 and 99.99 % based on
decision tree and deep belief network to classify attacks and CIC-IDS2017. Although all three classifiers achieved good
reduce their dimensionality. accuracy, training the model was difficult due to the features’
wide variety of numerical data.
In wireless sensor networks, IDS was performed using
a combination of machine learning and deep learning [43].
The authors proposed the Restricted Boltzmann machine-
based clustered RBC-IDS approach as a deep learning tech-
nique. They used the KDD Cup99 dataset and Network
Simulator-3 to compare their model against adaptive machine
learning-based IDS (NS-3). While RBC-IDS has high accu-
racy, the detection time was comparable to that of the adap-
tive machine learning model, resulting in overhead expenses.
A hybrid network IDS was utilized in [6] using the UNSW-
15 dataset that utilized the CNN-LSTM algorithm. When
applied to real-world devices, they employed a transfer learn-
ing approach to optimise the IDS model’s efficiency. Their
model was 98.43 % accurate.
CBR-CNN (Channel Boosted and Residual Learning)
was created in [44], employing deep Convolutional Neu-
ral Networks for intrusion detection using the NSL-KDD
dataset. Training is carried out using an unsupervised learn-
FIGURE 13. Hierarchy of HAST-IDS. ing approach, and normal traffic is modeled using stacked
autoencoders (SAE). Their model had an accuracy of 89.41 %
Security attacks in smart connected vehicles an intrusion for KDD-Test+ and 80.36 % for KDD-Test-21, respectively.
detection system based on continuous automated secure ser- Table 10 analyses the learning method, performance metric,
vice availability framework was proposed in [41]. The model dataset, attack type, strengths, and limits of hybrid learning
classifies attacks and reduces their dimensionality using a algorithms based on intrusion detection systems.
decision tree and deep belief machine learning. A model
for enhancing IDS performance was provided by [42] by D. DISCUSSION AND OPEN CHALLENGES
integrating three classifiers with big data. The methods uti- Intrusion detection systems are now considered a neces-
lized were a combination of machine learning and deep sary component of our daily lives. However, developing an
learning techniques, including Random Forest (RF), Deep intrusion detection system capable of detecting and
responding to a wide range of attacks and threats is a difficult asserted that datasets not based on reality might result in
task. As a result, hundreds of studies in the field of intrusion mistaken studies in their conclusions. Employing ESR-NID
detection systems have been carried out for various appli- computation approaches, they provided in [45] a model for
cations by academic researchers. Some academics believe searching for a solution to automatically generate rulesets for
that deep learning, through a neural network, will enable network intrusion detection by using computation techniques
greater flexibility in IDS, allowing it to detect and classify (Evolving Statistical Rulesets for Network Intrusion Detec-
harmful threats more effectively. This flexibility is because tion). The model outperforms other existing models and is
its algorithms have hidden layers with a high-dimensional capable of dealing with a variety of various types of attacks.
feature representation of the data. To summarize, some researchers were concentrating on
A comprehensive assessment of network-based intrusion whatever algorithm would provide the best performance, such
detection systems was offered in [10], in which they stressed as [14], [15], [21]–[23], [33], [39]. A comparison between
the need for labeling data when doing evaluation and training different types of algorithms used for IDS is presented in
on anomaly-based intrusion detection systems. Moreover, Table 11, in terms of the learning approach, advantages, and
in [45], the author investigated the possibility of improving disadvantages.
model optimization, and they concluded that the supervised As a means of increasing accuracy and improving model
learning approach is more successful than the unsupervised implementation, some researchers investigated combining
learning approach. After all, it can achieve higher perfor- algorithms in order to achieve higher accuracy or a lower
mance in terms of the algorithms used because it uses labeled false alarm rate, as in [40], [41], while others com-
data to train the models. NADS implementation with various bined methods in machine learning and deep learning,
applications, data centers, fog, cloud computing, and the as in [43], [44], [46]. Some researchers experimented to
Internet of Things (IoT) was a priority [13]. The authors see which dataset could provide a more stable model,
as in [15], [21], [25], [35], [38], [43], while others created Selecting a good dataset to train and test an intrusion
their dataset to use in IDS development, as in [17], [24], [47]. detection system is a crucial parameter, and it was clear that
Each dataset contains a different range of threats and attacks, datasets have an impact on research in this sector, as some
so some researchers experimented to see which dataset could deem it out of date or contains redundant information. As a
provide a more stable model. result, the most frequent datasets used to detect threats over
The intrusion detection system field has many challenges, the last decade are compared in the research.
represented by: The final step in this project was to look into what other
people did to save their data. Recent research has revealed
1) UNAVAILABILITY OF UP-TO-DATE DATASET that there are numerous data protection implementations.
A highly effective IDS must be trained and tested against They employed machine learning for several purposes at
a dataset of new and old threats and attacks. When more first, and many studies were conducted to determine which
patterns and types of attacks are discovered in a dataset, the algorithm would provide higher accuracy or which datasets
model becomes more resistant to various attack types. Thus, would produce a lower false alarm rate. Finally, they arrived
one of the challenges for IDS is to maintain an up-to-date at deep learning after extensive investigation and testing.
dataset with sufficient records to cover the majority of attack Many studies and experiments have shown that deep learning
types. is superior to machine learning because it can handle more
complicated problems with greater accuracy and lower false
2) HYPERPARAMETER TUNING alarm rates. Previous work has been used in a variety of
The deep structure of an IDS model requires that the hyper- applications. They employed various datasets, architectures,
parameters be specified. The activation function and opti- learning methodologies, and learning algorithms to secure
mization method, the number of nodes per layer, and the data from attacks and dangers each time.
total number of layers in a network are all hyperparameters.
Hyperparameters affect training and model building, with REFERENCES
the ability to increase or decrease the IDS model’s accuracy [1] D. I. Edeh, ‘‘Network intrusion detection system using deep learning
and detection rate. Hyperparameters can be tuned manually, technique,’’ M.S. thesis, Dept. Comput., Univ. Turku, Turku, Finland,
2021.
which will take a significant amount of time, or automated to [2] G. C. Fernandez, ‘‘Deep learning approaches for network intrusion detec-
improve the performance of the IDS model. tion,’’ M.S. thesis, Dept. Comput. Sci., Univ. Texas at San Antonio, San
Antonio, TX, USA, 2019.
[3] H. Benmeziane, ‘‘Comparison of deep learning frameworks and compil-
3) IMBALANCED DATASET
ers,’’ M.S. thesis Comput. Sci., Inst. Nat. Formation Informatique, École
Existing datasets contain varying numbers of records for nationale Supérieure d’Informatique, Oued Smar, Algeria, 2020.
various types of attacks. These differences will affect the [4] Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, and M. Gao, ‘‘Machine
learning and deep learning methods for cybersecurity,’’ IEEE Access,
accuracy and detection rate of various types of attacks. A low- vol. 6, pp. 35365–35381, 2018, doi: 10.1109/ACCESS.2018.2836950.
record attack will have a lower detection rate than a high- [5] I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning. Cambridge,
record attack. This issue can be resolved by either balancing MA, USA: MIT Press, 2016.
the dataset or by increasing the number of minority attack [6] H. Dhillon, ‘‘Building effective network security frameworks using deep
transfer learning techniques,’’ M.S. thesis, Dept. Comput. Sci., Western
records. Univ., London, ON, Canada, 2021.
[7] M. Labonne, ‘‘Anomaly-based network intrusion detection using machine
4) PERFORMANCE IN REAL-WORLD learning,’’ Ph.D. dissertation, Inst. Polytechnique de Paris, Palaiseau,
France, 2020.
When researchers attempt to develop an intrusion detection [8] A. Kim, M. Park, and D. H. Lee, ‘‘AI-IDS: Application of deep learning to
system, they train and test the model in laboratories, with real-time web intrusion detection,’’ IEEE Access, vol. 8, pp. 70245–70261,
the majority of the data coming from public sources. Thus, 2020.
[9] P. Wu, ‘‘Deep learning for network intrusion detection: Attack recognition
an IDS model faces a challenge when it is implemented in with computational intelligence,’’ M.S. thesis, School Comput. Sci. Eng.,
a real-world environment, as the model developed in the lab Univ. New South Wales, Sydney NSW, Australia, 2020.
should be validated in a real-world environment to ensure its [10] M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, ‘‘A survey
of network-based intrusion detection data sets,’’ Comput. Secur., vol. 86,
efficiency. pp. 147–167, Sep. 2019.
[11] M. Alkasassbeh and M. Almseidin, ‘‘Machine learning methods for net-
V. CONCLUSION work intrusion detection,’’ 2018, arXiv:1809.02610.
[12] T. Hamed, R. Dara, and S. C. Kremer, ‘‘Network intrusion detection system
One of the essential subjects in the cybersecurity area was based on recursive feature addition and bigram technique,’’ Comput. Secur.,
intrusion detection systems. Many researchers are develop- vol. 73, pp. 137–155, Mar. 2018.
ing a system that will secure data against malicious con- [13] N. Moustafa, J. Hu, and J. Slay, ‘‘A holistic review of network anomaly
duct. However, research into other applications of learning detection systems: A comprehensive survey,’’ J. Netw. Comput. Appl.,
vol. 128, pp. 33–55, Feb. 2019.
algorithms, such as establishing a new dataset or merging [14] L. Arnroth and J. Fiddler Dennis, ‘‘Supervised learning techniques: A
algorithms, is currently ongoing. As a result, we explain the comparison of the random forest and the support vector machine,’’ Uppsala
concept of an intrusion detection system, types of attacks, and Univ., Uppsala, Sweden, 2016.
[15] D. H. Lakshminarayana, ‘‘Intrusion detection using machine learning algo-
how to determine whether or not we have an effective system rithms,’’ M.S. thesis, Dept. Comput. Sci., East Carolina Univ., Greenville,
in this work. NC, USA, 2019.
[16] J. Gu, L. Wang, H. Wang, and S. Wang, ‘‘A novel approach to intru- [39] M. K. Putchala, ‘‘Deep learning approach for intrusion detection sys-
sion detection using SVM ensemble with feature augmentation,’’ Comput. tem (IDS) in the Internet of Things (IoT) network using gated recurrent
Secur., vol. 86, pp. 53–62, Sep. 2019. neural networks (GRU),’’ M.S. thesis, Dept. Comput. Sci. Eng., Wright
[17] I. Homoliak, K. Malinka, and P. Hanacek, ‘‘ASNM datasets: A collec- State Univ., Dayton, OH, USA, 2017.
tion of network attacks for testing of adversarial classifiers and intru- [40] W. Wang, Y. Sheng, J. Wang, X. Zeng, and X. Ye, ‘‘HAST-IDS: Learn-
sion detectors,’’ IEEE Access, vol. 8, pp. 112427–112453, 2020, doi: ing hierarchical spatial-temporal features using deep neural networks to
10.1109/ACCESS.2020.3001768. improve intrusion detection,’’ IEEE Access, vol. 6, pp. 1792–1806, 2018.
[18] A. Shenfield, D. Day, and A. Ayesh, ‘‘Intelligent intrusion detection sys- [41] M. Aloqaily, S. Otoum, I. A. Ridhawi, and Y. Jararweh, ‘‘An intrusion
tems using artificial neural networks,’’ ICT Exp., vol. 4, no. 2, pp. 95–99, detection system for connected vehicles in smart cities,’’ Ad Hoc Netw.,
Jun. 2018. vol. 90, Jul. 2019, Art. no. 101842, doi: 10.1016/j.adhoc.2019.02.001.
[19] N. Farnaaz and M. A. Jabbar, ‘‘Random forest modeling for network [42] O. Faker and E. Dogdu, ‘‘Intrusion detection using big data and deep
intrusion detection system,’’ Proc. Comput. Sci., vol. 89, pp. 213–217, learning techniques,’’ presented at the ACM Southeast Conf., 2019.
May 2016. [43] S. Otoum, B. Kantarci, and H. T. Mouftah, ‘‘On the feasibility of deep
[20] B. B. Rao and K. Swathi, ‘‘Fast kNN classifiers for network intrusion learning in sensor network intrusion detection,’’ IEEE Netw. Lett., vol. 1,
detection system,’’ Indian J. Sci. Technol., vol. 10, no. 14, pp. 1–10, no. 2, pp. 68–71, Jun. 2019, doi: 10.1109/LNET.2019.2901792.
Apr. 2017. [44] N. Chouhan, A. Khan, and H.-U.-R. Khan, ‘‘Network anomaly detection
[21] C. Khammassi and S. Krichen, ‘‘A GA-LR wrapper approach for fea- using channel boosted and residual learning based deep convolutional
ture selection in network intrusion detection,’’ Comput. Secur., vol. 70, neural network,’’ Appl. Soft Comput., vol. 83, Oct. 2019, Art. no. 105612,
pp. 255–277, Sep. 2017. doi: 10.1016/j.asoc.2019.105612.
[22] A. Verma and V. Ranga, ‘‘Statistical analysis of CIDDS-001 dataset for net- [45] S. Rastegari, ‘‘Intelligent network intrusion detection using an evolutionary
work intrusion detection systems using distance-based machine learning,’’ computation approach,’’ Ph.D. dissertation, School Comput. Secur. Sci.,
Proc. Comput. Sci., vol. 125, pp. 709–716, Jan. 2018. Edith Cowan Univ., Joondalup WA, Australia, 2015.
[23] M. Belouch, S. El Hadaj, and M. Idhammad, ‘‘Performance evaluation of [46] J. Yang, J. Deng, S. Li, and Y. Hao, ‘‘Improved traffic detection with
intrusion detection based on machine learning using apache spark,’’ Proc. support vector machine based on restricted Boltzmann machine,’’ Soft
Comput. Sci., vol. 127, pp. 1–6, Jan. 2018. Comput., vol. 21, no. 11, pp. 3101–3112, 2017.
[24] X. Wang, S. Chen, and J. Su, ‘‘Real network traffic collection and deep [47] N. Chaabouni, ‘‘Intrusion detection and prevention for IoT systems using
learning for mobile app identification,’’ Wireless Commun. Mobile Com- machine learning,’’ Ph.D. dissertation, School Math. Comput. Sci., Uni-
put., vol. 2020, pp. 1–14, Feb. 2020, doi: 10.1155/2020/4707909. versité de Bordeaux, Bordeaux, France, 2020.
[25] G. Thamilarasu and S. Chawla, ‘‘Towards deep-learning-driven intrusion
detection for the Internet of Things,’’ Sensors, vol. 19, no. 9, p. 1977,
Apr. 2019, doi: 10.3390/s19091977.
[26] N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, ‘‘A deep learning approach to
network intrusion detection,’’ IEEE Trans. Emerg. Topics Comput. Intell.,
vol. 2, no. 1, pp. 41–50, Feb. 2018.
[27] R. Vinayakumar, M. Alazab, K. Soman, P. Poornachandran, A. Al-Nemrat, ASMAA HALBOUNI (Graduate Student Member,
and S. Venkatraman, ‘‘Deep learning approach for intelligent intrusion IEEE) received the bachelor’s degree in telecom-
detection system,’’ IEEE Access, vol. 7, pp. 41525–41550, 2019, doi: munication engineering from An-Najah National
10.1109/ACCESS.2019.2895334. University, Palestine. She is currently pursuing
[28] Y. Dong, R. Wang, and J. He, ‘‘Real-time network intrusion detection the M.S. degree in computer and information
system based on deep learning,’’ in Proc. IEEE 10th Int. Conf. Softw. Eng. engineering with International Islamic University
Service Sci. (ICSESS), Oct. 2019, pp. 1–4. Malaysia, Malaysia. Her research interests include
[29] T. Chen, Y. Chen, M. Lv, G. He, T. Zhu, T. Wang, and Z. Weng, intrusion detection, network security, and deep
‘‘A payload based malicious HTTP traffic detection method using transfer learning.
semi-supervised learning,’’ Appl. Sci., vol. 11, no. 16, p. 7188, 2021, doi:
10.3390/app11167188.
[30] G. Liu and J. Zhang, ‘‘CNID: Research of network intrusion detection
based on convolutional neural network,’’ Discrete Dyn. Nature Soc.,
vol. 2020, pp. 1–11, May 2020.
[31] C. Yin, Y. Zhu, J. Fei, and X. He, ‘‘A deep learning approach for intru-
sion detection using recurrent neural networks,’’ IEEE Access, vol. 5,
pp. 21954–21961, 2017. TEDDY SURYA GUNAWAN (Senior Member,
[32] S. Naseer, Y. Saleem, S. Khalid, M. K. Bashir, and J. Han, ‘‘Enhanced IEEE) received the B.Eng. degree (cum laude) in
network anomaly detection based on deep neural networks,’’ IEEE Access, electrical engineering from the Institut Teknologi
vol. 6, pp. 48231–48246, 2018, doi: 10.1109/ACCESS.2018.2863036. Bandung (ITB), Indonesia, in 1998, the M.Eng.
[33] Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, ‘‘An intrusion detection model degree from the School of Computer Engineering,
based on feature reduction and convolutional neural networks,’’ IEEE Nanyang Technological University, Singapore,
Access, vol. 7, pp. 42210–42219, 2019. in 2001, and the Ph.D. degree from the School of
[34] D. Papamartzivanos, F. G. Mármol, and G. Kambourakis, ‘‘Introducing Electrical Engineering and Telecommunications,
deep learning self-adaptive misuse network intrusion detection systems,’’ The University of New South Wales, Australia,
IEEE Access, vol. 7, pp. 13546–13560, 2019. in 2007.
[35] M. Mayuranathan, M. Murugan, and V. Dhanakoti, ‘‘Best features based He was the Head of the Department of Electrical and Computer Engi-
intrusion detection system by RBM model for detecting DDoS in neering, from 2015 to 2016, and the Head of Programme Accreditation and
cloud environment,’’ J. Ambient Intell. Hum. Comput., vol. 12, no. 3, Quality Assurance with the Faculty of Engineering, International Islamic
pp. 3609–3619, 2019.
University Malaysia, from 2017 to 2018. He has been a Chartered Engineer
[36] F. Jiang, Y. Fu, B. B. Gupta, Y. Liang, S. Rho, F. Lou, F. Meng, and
at IET, U.K., since 2016, an Insinyur Profesional Utama at PII, Indonesia,
Z. Tian, ‘‘Deep learning based multi-channel intelligent attack detec-
tion for data security,’’ IEEE Trans. Sustain. Comput., vol. 5, no. 2,
since 2021, and a Registered ASEAN Engineer, since 2018. He has been
pp. 204–212, Apr. 2020. a Professor, since 2019, and has been an ASEAN Chartered Professional
[37] Q. Tian, D. Han, K.-C. Li, X. Liu, L. Duan, and A. Castiglione, ‘‘An Engineer, since 2020. His research interests include speech and audio pro-
intrusion detection approach based on improved deep belief network,’’ cessing, biomedical signal processing and instrumentation, image and video
Appl. Intell., vol. 50, pp. 3162–3178, May 2020. processing, and parallel computing. He was awarded the Best Researcher
[38] C. Zhang, X. Costa-Pérez, and P. Patras, ‘‘Tiki-taka: Attacking and defend- Award at IIUM, in 2018. He was the Chairperson of IEEE Instrumentation
ing deep learning-based intrusion detection systems,’’ in Proc. ACM and Measurement Society—Malaysia Section, in 2013, 2014, 2021, and
SIGSAC Conf. Cloud Comput. Secur. Workshop, 2020, pp. 27–39. 2022.
MOHAMED HADI HABAEBI (Senior Member, MIRA KARTIWI (Member, IEEE) is currently
IEEE) is currently a Professor with the Depart- a Professor with the Department of Informa-
ment of Electrical and Computer Engineering, tion Systems, Kulliyyah of Information and
International Islamic University Malaysia (IIUM). Communication Technology, and currently the
His research interests include the IoT, mobile app Deputy Director of E-learning with the Centre for
development, networking, blockchain, AI appli- Professional Development, International Islamic
cations in image processing, cyber-physical secu- University Malaysia (IIUM). She was one of a
rity, wireless communications, small antennas, and recipients of the Australia Postgraduate Award
channel propagation modeling. (APA), in 2004. For her achievement in research,
she was awarded the Higher Degree Research
Award for Excellence, in 2007. She has also been appointed as an Edi-
torial Board Member in local and international journals to acknowledge
her expertise. She is also an experienced consultant specializing in the
health, financial, and manufacturing sectors. Her research interests include
health informatics, e-commerce, data mining, information systems strategy,
business process improvement, product development, marketing, delivery
strategy, workshop facilitation, training, and communications.