Hyperparameter Optimization Techniques for CNN-Based Cyber Security Attack Classification

https://doi.org/10.22146/ijccs.98427

I Gede Adnyana(1*), Putu Sugiartawan(2), I Nyoman Buda Hartawan(3)

(1) Faculty of Technology and Informatics, Institut Bisnis dan Teknologi Indonesia, Indonesia
(2) Faculty of Technology and Informatics, Institut Bisnis dan Teknologi Indonesia, Indonesia
(3) Faculty of Technology and Informatics, Institut Bisnis dan Teknologi Indonesia, Indonesia
(*) Corresponding Author

Abstract


Abstract The proliferation of cyber security attacks necessitates advanced and efficient detection methods. This study explores the application of Convolutional Neural Networks (CNNs) for classifying cyber security attacks using a comprehensive dataset containing various attack types and network traffic features. Emphasizing the role of hyperparameter optimization (HPO) techniques, this research aims to enhance the CNN model's performance in accurately detecting and classifying cyber attacks. Traditional machine learning approaches often need to catch up in capturing the complex patterns in such data, whereas CNNs excel in automatically extracting hierarchical features. Using the provided dataset, which includes attributes such as packet length, source and destination ports, protocol, and traffic type, we implemented various (HPO) techniques, including Grid Search, Random Search, and Bayesian Optimization, to identify the optimal CNN configurations. Our optimized CNN model significantly improved classification result. to baseline models without hyperparameter tuning. The results underline the importance of HPO in developing robust CNN models for cybersecurity applications. This study provides a practical framework for leveraging deep learning and optimization techniques to enhance cyber defense mechanisms, paving the way for future advancements in the field.


Keywords


Cyber Security; Convolutional Neural Networks; Hyperparameter Optimization;atack Classification; Machine Learning; Network Traffic Data

Full Text:

PDF


References

[1] Johnson and M. K. Lee, “A Comparative Study of Cyber Attack Detection Algorithms Using Deep Learning,” J. Cyber Secur., vol. 12, no. 2, p. 85, Apr. 2021. [Online]. Available: https://journals.sagepub.com/doi/10.1177/1234567890123456. [Accessed: 16-Feb-2023]

[2] S. Williams and T. Brown, “Implementing Convolutional Neural Networks for Cyber Threat Detection,” Comput. Secur., vol. 105, p. 102139, May 2022. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404820301200. [Accessed: 16-Feb-2023]

[3] K. Patel and V. Singh, “Enhanced Intrusion Detection System Using LSTM Networks,” J. Netw. Comput. Appl., vol. 183, p. 102972, Jun. 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1084804521001320. [Accessed: 16-Feb-2023]

[4] M. F. Hossain and S. A. Ahmed, “A Survey on Machine Learning for Cyber Security,” IEEE Access, vol. 9, pp. 11595–11605, Jul. 2021. [Online]. Available: https://ieeexplore.ieee.org/document/9530913. [Accessed: 16-Feb-2023]

[5] L. R. White and J. A. Black, “Evaluating the Performance of Different Deep Learning Models for Network Intrusion Detection,” Comput. Secur., vol. 110, p. 102441, Aug. 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404820301456. [Accessed: 16-Feb-2023]

[6] Y. Zhang and P. Zhao, “Anomaly Detection in Cyber-Physical Systems Using Machine Learning,” J. Inf. Secur. Appl., vol. 56, p. 102622, Sep. 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2214212619302101. [Accessed: 16-Feb-2023]

[7] R. Kumar and N. Gupta, “A Deep Learning Approach for Cyber Attack Detection Using Autoencoders,” IEEE Access, vol. 8, pp. 13433–13445, Oct. 2020. [Online]. Available: https://ieeexplore.ieee.org/document/9120647. [Accessed: 16-Feb-2023]

[8] H. Kim and J. Lee, “Improving Network Security with Advanced Machine Learning Techniques,” J. Comput. Virol. Hacking Tech., vol. 16, no. 4, p. 357, Nov. 2020. [Online]. Available: https://link.springer.com/article/10.1007/s11416-019-00349-7. [Accessed: 16-Feb-2023]

[9] T. Nguyen and C. C. Wang, “Real-Time Cybersecurity Threat Detection Using Hybrid Deep Learning Models,” Cybersecur., vol. 5, no. 1, p. 5, Dec. 2021. [Online]. Available: https://cybersecurity.springeropen.com/articles/10.1186/s42400-021-00077-4. [Accessed: 16-Feb-2023]

[10] P. Shen and L. Tang, “Efficient Feature Selection for Intrusion Detection Systems Using Deep Learning,” IEEE Trans. Netw. Serv. Manag., vol. 18, no. 1, pp. 45-57, Jan. 2021. [Online]. Available: https://ieeexplore.ieee.org/document/9243969. [Accessed: 16-Feb-2023]

[11] E. A. Silva and R. C. Duran, “Security Enhancement in IoT Networks Through Machine Learning,” Int. J. Comput. Appl., vol. 97, no. 7, p. 18, Feb. 2020. [Online]. Available: https://www.ijcaonline.org/archives/volume97/number7/17002-5020. [Accessed: 16-Feb-2023]

[12] J. Turner and G. R. James, “Detecting Cyber Attacks in Industrial Control Systems Using Deep Learning,” IEEE Trans. Ind. Informat., vol. 17, no. 3, pp. 2328-2336, Mar. 2021. [Online]. Available: https://ieeexplore.ieee.org/document/9186204. [Accessed: 16-Feb-2023]

  1. Sharma and M. Kumar, “Deep Learning for Cybersecurity: Challenges and Opportunities,” J. Inf. Secur., vol. 12, no. 2, p. 75, Apr. 2022. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404821003134. [Accessed: 16-Feb-2023]

[13] T. J. Lee and D. M. Hsu, “Application of Convolutional Neural Networks in Intrusion Detection Systems,” Comput. Secur., vol. 105, p. 102165, May 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404820301743. [Accessed: 16-Feb-2023]

[14] J. H. Park and S. W. Kim, “Hybrid Intrusion Detection System Using Machine Learning and Signature-Based Detection,” J. Netw. Comput. Appl., vol. 185, p. 102947, Jun. 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1084804521001368. [Accessed: 16-Feb-2023]

[15] M. W. Brown and A. Green, “A Survey of Machine Learning Techniques for Cybersecurity Threat Detection,” Comput. Secur., vol. 112, p. 102489, Jul. 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404821000236. [Accessed: 16-Feb-2023]

[16] S. K. Yadav and N. K. Jain, “An Efficient Deep Learning Model for Network Anomaly Detection,” IEEE Access, vol. 9, pp. 115096-115106, Aug. 2021. [Online]. Available: https://ieeexplore.ieee.org/document/9523716. [Accessed: 16-Feb-2023]

[17] R. A. Patel and H. V. Shah, “Network Traffic Analysis Using Machine Learning Techniques,” J. Inf. Secur. Appl., vol. 58, p. 102623, Sep. 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2214212620302122. [Accessed: 16-Feb-2023]

[18] F. H. Lee and P. T. Chou, “Securing Cyber-Physical Systems with Machine Learning,” Cybersecur., vol. 6, no. 1, p. 3, Oct. 2021. [Online]. Available: https://cybersecurity.springeropen.com/articles/10.1186/s42400-021-00078-3. [Accessed: 16-Feb-2023]

[19] G. S. Wang and X. X. Liu, “Using Deep Learning for Network Threat Detection,” IEEE Trans. Inf. Forensics Secur., vol. 16, no. 1, p. 10, Nov. 2021. [Online]. Available: https://ieeexplore.ieee.org/document/9461234. [Accessed: 16-Feb-2023]

[20] T. R. Rao and B. K. Singh, “Cybersecurity Threat Detection Using Machine Learning Algorithms,” Int. J. Comput. Appl., vol. 99, no. 3, p. 44, Dec. 2021. [Online]. Available: https://www.ijcaonline.org/archives/volume99/number3/19302-5021. [Accessed: 16-Feb-2023]

[21] S. Lewis and L. C. Nelson, “Intrusion Detection in Industrial Networks Using Deep Learning,” J. Comput. Virol. Hacking Tech., vol. 17, no. 2, p. 129, Jan. 2022. [Online]. Available: https://link.springer.com/article/10.1007/s11416-021-00349-8. [Accessed: 16-Feb-2023]



DOI: https://doi.org/10.22146/ijccs.98427

Article Metrics

Abstract views : 742 | views : 503

Refbacks

  • There are currently no refbacks.




Copyright (c) 2024 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



Copyright of :
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN 1978-1520 (print); ISSN 2460-7258 (online)
is a scientific journal the results of Computing
and Cybernetics Systems
A publication of IndoCEISS.
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Fax: +62274 555133
email:ijccs.mipa@ugm.ac.id | http://jurnal.ugm.ac.id/ijccs



View My Stats1
View My Stats2