Home > Published Issues > 2024 > Volume 15, No. 9, 2024 >
JAIT 2024 Vol.15(9): 1070-1078
doi: 10.12720/jait.15.9.1070-1078

Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks

Chadia El Asry 1,*, Ibtissam Benchaji 1, Samira Douzi 2, and Bouabid El Ouahidi 1
1. Intelligent Processing and Security of Systems (IPSS), Faculty of Sciences, Mohammed V University, Rabat, Morocco
2. Faculty of Medicine and pharmacy FMPR, Mohammed V University in Rabat, Morocco
Email: chadia.elasry@um5r.ac.ma (C.E.A.); ibtissam.benchajy@um5s.net (I.B.); s.douzi@um5r.ac.ma (S.D.); b.elouahidi@um5r.ac.ma (B.E.O.)
*Corresponding author

Manuscript received March 6, 2024; revised May 9, 2024; accepted June 3, 2024; published September 25, 2024.

Abstract—This paper presents a new approach to improve the detection of network security by combining feature selection with Long-Short-Term-Memory (LSTM) approaches. The SHapley Additive exPlanations (SHAP) values approach is utilized for feature selection, in conjunction with cross-validation, to identify the most effective set of features that improve model recall for each specific sort of assault. We employ the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset to train and assess the efficacy of our model. The suggested model exhibits greater performance in comparison to standard LSTM models when utilizing all features. Furthermore, it surpasses current leading models with an accuracy of 99.74%, precision of 95.42%, recall of 94.92%, and F1-Score of 94.90%. In addition, the model demonstrates outstanding aptitude in precisely detecting Remote-to-Local (R2L) and User-to-Root (U2R) attacks, which are complex forms of intrusions that exploit vulnerabilities to gain unauthorized access to systems or networks. Although infrequent, these assaults provide a substantial risk because they have the ability to do substantial harm and compromise confidential data.
 
Keywords—intrusion detection systems, deep learning, SHapley Additive exPlanations (SHAP) values, Long-Short-Term-Memory (LSTM), feature selection

Cite: Chadia El Asry, Ibtissam Benchaji, Samira Douzi, and Bouabid El Ouahidi, "Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks," Journal of Advances in Information Technology, Vol. 15, No. 9, pp. 1070-1078, 2024.

Copyright © 2024 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.