Improving intrusion detection using LSTM-RNN to protect drones’ networks

IF 5 3区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Egyptian Informatics Journal Pub Date : 2024-07-08 DOI:10.1016/j.eij.2024.100501
Menna Gamal , Mohamed Elhamahmy , Sanaa Taha , Hesham Elmahdy
{"title":"Improving intrusion detection using LSTM-RNN to protect drones’ networks","authors":"Menna Gamal ,&nbsp;Mohamed Elhamahmy ,&nbsp;Sanaa Taha ,&nbsp;Hesham Elmahdy","doi":"10.1016/j.eij.2024.100501","DOIUrl":null,"url":null,"abstract":"<div><p>The expanding use of Unmanned Aerial Vehicle (UAVs)/drones has been noticeable in recent years. Drones have several uses in a wide range of industries, including the military, delivery, agricultural, and surveillance. This led to a visible increase in malicious activities targeting drones’ network. Consequently, it has become imperative to develop intrusion detection systems. The network intrusion detection system (NIDS) uses deep learning to identify network anomalies. In this paper, a new approach is proposed to enhance IDS in drone communications. The proposed model utilizes the Recurrent Neural Network (RNN) with a Long Short-Term Memory Network (LSTM) combined with pre-processing algorithms. Simulating real network traffic was necessary to do benchmark datasets to evaluate the IDS performance. Due to the artificial part in datasets, there is unbalancing between the normal and attack traffic. Training models on high-dimensional datasets with redundant features can be computationally expensive, need more storage, and lead to low performance. The cleaning of the dataset is accompanied by the most effective pre-processing techniques. SMOTE for unbalancing, one-hot encoding, and min–max scaling techniques are used to mitigate the dataset issues. The model is evaluated using the most up-to-date version of the dataset CICIDS2017 (13 May 2023). The model successfully achieves 99.84 % classification accuracy, 99.84 % F1-score, 99.99 % Precision, and 99.70 % recall. The proposed model outperformed the Naïve Bayes and five other legacy protocols in accuracy and False Positive rate.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0000,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524000641/pdfft?md5=cf102b39e8cb9e5585b6bed51ef13f17&pid=1-s2.0-S1110866524000641-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866524000641","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

The expanding use of Unmanned Aerial Vehicle (UAVs)/drones has been noticeable in recent years. Drones have several uses in a wide range of industries, including the military, delivery, agricultural, and surveillance. This led to a visible increase in malicious activities targeting drones’ network. Consequently, it has become imperative to develop intrusion detection systems. The network intrusion detection system (NIDS) uses deep learning to identify network anomalies. In this paper, a new approach is proposed to enhance IDS in drone communications. The proposed model utilizes the Recurrent Neural Network (RNN) with a Long Short-Term Memory Network (LSTM) combined with pre-processing algorithms. Simulating real network traffic was necessary to do benchmark datasets to evaluate the IDS performance. Due to the artificial part in datasets, there is unbalancing between the normal and attack traffic. Training models on high-dimensional datasets with redundant features can be computationally expensive, need more storage, and lead to low performance. The cleaning of the dataset is accompanied by the most effective pre-processing techniques. SMOTE for unbalancing, one-hot encoding, and min–max scaling techniques are used to mitigate the dataset issues. The model is evaluated using the most up-to-date version of the dataset CICIDS2017 (13 May 2023). The model successfully achieves 99.84 % classification accuracy, 99.84 % F1-score, 99.99 % Precision, and 99.70 % recall. The proposed model outperformed the Naïve Bayes and five other legacy protocols in accuracy and False Positive rate.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用 LSTM-RNN 改进入侵检测,保护无人机网络
近年来,无人驾驶飞行器(UAV)/无人机的使用范围明显扩大。无人机在军事、快递、农业和监控等多个行业都有多种用途。这导致针对无人机网络的恶意活动明显增加。因此,开发入侵检测系统势在必行。网络入侵检测系统(NIDS)利用深度学习来识别网络异常。本文提出了一种新方法来增强无人机通信中的 IDS。所提出的模型利用了具有长短期记忆网络(LSTM)的循环神经网络(RNN),并结合了预处理算法。为了评估 IDS 性能,有必要模拟真实的网络流量来制作基准数据集。由于数据集中的人工部分,正常流量和攻击流量之间存在不平衡。在具有冗余特征的高维数据集上训练模型的计算成本会很高,需要更多存储空间,并导致性能低下。数据集的清理需要采用最有效的预处理技术。为减轻数据集的问题,我们使用了 SMOTE 来消除不平衡、单次热编码和最小-最大缩放技术。该模型使用最新版本的数据集 CICIDS2017(2023 年 5 月 13 日)进行了评估。该模型成功实现了 99.84 % 的分类准确率、99.84 % 的 F1 分数、99.99 % 的精确率和 99.70 % 的召回率。在准确率和误报率方面,所提出的模型优于 Naïve Bayes 和其他五个传统协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Egyptian Informatics Journal
Egyptian Informatics Journal Decision Sciences-Management Science and Operations Research
CiteScore
11.10
自引率
1.90%
发文量
59
审稿时长
110 days
期刊介绍: The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.
期刊最新文献
HD-MVCNN: High-density ECG signal based diabetic prediction and classification using multi-view convolutional neural network A hybrid encryption algorithm based approach for secure privacy protection of big data in hospitals A new probabilistic linguistic decision-making process based on PL-BWM and improved three-way TODIM methods Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function Intelligent SDN to enhance security in IoT networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1