<doi_batch xmlns="http://www.crossref.org/schema/4.4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="4.4.0"><head><doi_batch_id>d31bd3fb-1376-4a5c-adea-422b1602018e</doi_batch_id><timestamp>20240419042055391</timestamp><depositor><depositor_name>wseas:wseas</depositor_name><email_address>mdt@crossref.org</email_address></depositor><registrant>MDT Deposit</registrant></head><body><journal><journal_metadata language="en"><full_title>WSEAS TRANSACTIONS ON COMPUTER RESEARCH</full_title><issn media_type="electronic">2415-1521</issn><issn media_type="print">1991-8755</issn><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/232018</doi><resource>http://wseas.org/wseas/cms.action?id=13372</resource></doi_data></journal_metadata><journal_issue><publication_date media_type="online"><month>1</month><day>2</day><year>2024</year></publication_date><publication_date media_type="print"><month>1</month><day>2</day><year>2024</year></publication_date><journal_volume><volume>12</volume><doi_data><doi>10.37394/232018.2024.12</doi><resource>https://wseas.com/journals/cr/2024.php</resource></doi_data></journal_volume></journal_issue><journal_article language="en"><titles><title>Intrusion Detection System using CNNs and GANs</title></titles><contributors><person_name sequence="first" contributor_role="author"><given_name>Nabeel Refat</given_name><surname>Al-Milli</surname><affiliation>Computer Science Department, Zarqa University, Zarqa JORDAN</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Yazan Alaya</given_name><surname>Al-Khassawneh</surname><affiliation>Computer Science Department, Isra University Amman, JORDAN</affiliation></person_name></contributors><jats:abstract xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1"><jats:p>This study investigates the effectiveness of deep learning models, namely Generative Adversarial Networks (GANs), Convolutional Neural Networks with three layers (CNN-3L), and Convolutional Neural Networks with four layers (CNN-4L), in the domain of multi-class categorization for intrusion detection. The CICFlowMeter-V3 dataset is utilized to thoroughly evaluate the performance of these models and gain insights into their capabilities. The primary approach involves training the models on the dataset and assessing their accuracy. The GAN achieves an overall accuracy of 93%, while CNN-3L demonstrates a commendable score of 99.71%. Remarkably, CNN-4L excels with a flawless accuracy of 100%. These results underscore the superior performance of CNN-3L and CNN-4L compared to GAN in the context of intrusion detection. Consequently, this study provides valuable insights into the potential of these models and suggests avenues for refining their architectures. The conclusions drawn from this research indicate that CNN-3L and CNN-4L hold promise for enhancing multi-class categorization in intrusion detection systems. It is recommended to further explore these models with diverse datasets to strengthen overall comprehension and practical applicability in this crucial field.</jats:p></jats:abstract><publication_date media_type="online"><month>4</month><day>19</day><year>2024</year></publication_date><publication_date media_type="print"><month>4</month><day>19</day><year>2024</year></publication_date><pages><first_page>281</first_page><last_page>290</last_page></pages><publisher_item><item_number item_number_type="article_number">27</item_number></publisher_item><ai:program xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" name="AccessIndicators"><ai:free_to_read start_date="2024-04-19"/><ai:license_ref applies_to="am" start_date="2024-04-19">https://wseas.com/journals/cr/2024/a545118-216.pdf</ai:license_ref></ai:program><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/232018.2024.12.27</doi><resource>https://wseas.com/journals/cr/2024/a545118-216.pdf</resource></doi_data><citation_list><citation key="ref0"><doi>10.1145/3587255</doi><unstructured_citation>Asiri, M., Saxena, N., Gjomemo, R., &amp; Burnap, P. (2023). Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM Transactions on CyberPhysical Systems, 7(2), 1-33. </unstructured_citation></citation><citation key="ref1"><doi>10.17509/ijost.v8i1.52709</doi><unstructured_citation>Al-Khassawneh, Y. A. (2023). A review of artificial intelligence in security and privacy: Research advances, applications, opportunities, and challenges. Indones. J. Sci. Technol, 8, 79-96. </unstructured_citation></citation><citation key="ref2"><doi>10.34028/iajit/19/3a/10</doi><unstructured_citation>Surakhi, O., Garcia, A., Jamoos, M., &amp; Alkhanafseh, M. (2022). The Intrusion Detection System by Deep Learning Methods: Issues and Challenges. International Arab Journal of Information Technology, 19(3 A), 501-513. </unstructured_citation></citation><citation key="ref3"><doi>10.1016/j.jss.2017.11.001</doi><unstructured_citation>Yan, R., Xiao, X., Hu, G., Peng, S., &amp; Jiang, Y. (2018). New deep learning method to detect code injection attacks on hybrid applications. Journal of Systems and Software, 137, 67-77. </unstructured_citation></citation><citation key="ref4"><doi>10.1109/cse-euc.2017.119</doi><unstructured_citation>Zhao, G., Zhang, C., &amp; Zheng, L. (2017, July). Intrusion detection using deep belief network and probabilistic neural network. In 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), Vol. 1, pp. 639-642. </unstructured_citation></citation><citation key="ref5"><doi>10.1109/icacci.2017.8126018</doi><unstructured_citation>Vinayakumar, R., Soman, K. P., &amp; Poornachandran, P. (2017, September). Evaluating effectiveness of shallow and deep networks to intrusion detection system. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1282-1289. </unstructured_citation></citation><citation key="ref6"><doi>10.1109/jeeit.2019.8717523</doi><unstructured_citation>Al-Milli, N., &amp; Almobaideen, W. (2019, April). Hybrid neural network to impute missing data for IoT applications. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 121-125. </unstructured_citation></citation><citation key="ref7"><doi>10.1016/j.procs.2017.08.216</doi><unstructured_citation>Martinelli, F., Marulli, F., &amp; Mercaldo, F. (2017). Evaluating convolutional neural network for effective mobile malware detection. Procedia computer science, 112, 2372-2381. </unstructured_citation></citation><citation key="ref8"><doi>10.1016/j.ins.2017.12.030</doi><unstructured_citation>Fiore, U., De Santis, A., Perla, F., Zanetti, P., &amp; Palmieri, F. (2019). Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Information Sciences, 479, 448-455. </unstructured_citation></citation><citation key="ref9"><doi>10.1109/icmla.2016.0040</doi><unstructured_citation>Alrawashdeh, K., &amp; Purdy, C. (2016, December). Toward an online anomaly intrusion detection system based on deep learning. In 2016 15th IEEE international conference on machine learning and applications (ICMLA), pp. 195-200. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>Portnoy, L. (2000). Intrusion detection with unlabeled data using clustering (Doctoral dissertation, Columbia University). </unstructured_citation></citation><citation key="ref11"><doi>10.1109/eit57321.2023.10187360</doi><unstructured_citation>Y. A. Al-Khassawneh, "An investigation of the Intrusion detection system for the NSLKDD dataset using machine-learning algorithms," 2023 IEEE International Conference on Electro Information Technology (eIT), Romeoville, IL, USA, 2023, pp. 518-523, doi: 10.1109/eIT57321.2023.10187360. </unstructured_citation></citation><citation key="ref12"><doi>10.1145/3422622</doi><unstructured_citation>Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S.,&amp; Bengio, Y. (2020). Generative adversarial networks. Communications of the ACM, 63(11), 139-144 </unstructured_citation></citation><citation key="ref13"><doi>10.1109/icctict.2016.7514608</doi><unstructured_citation>Yadav, S., &amp; Subramanian, S. (2016, March). Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder. In 2016 international conference on computational techniques in information and communication technologies (ICCTICT), pp. 361-366. </unstructured_citation></citation><citation key="ref14"><doi>10.34028/iajit/19/3a/10</doi><unstructured_citation>Ola Surakhi,Antonio García,Mohammed Jamoos,Mohammad Alkhanafseh, "The Intrusion Detection System by Deep Learning Methods: Issues and Challenges", The International Arab Journal of Information Technology (IAJIT) ,Vol. 19, Number 3A, pp. 501 - 513, Special Issue 2022, doi: 10.34028/iajit/19/3A/10. </unstructured_citation></citation><citation key="ref15"><doi>10.1109/ths.2017.7943475</doi><unstructured_citation>Shi, Y., Sagduyu, Y., &amp; Grushin, A. (2017, April). How to steal a machine learning classifier with deep learning. In 2017 IEEE International symposium on technologies for homeland security (HST), pp. 1-5. </unstructured_citation></citation><citation key="ref16"><doi>10.3390/s23010550</doi><unstructured_citation>Rao, Y. N., &amp; Suresh Babu, K. (2023). An imbalanced generative adversarial networkbased approach for network intrusion detection in an imbalanced dataset. Sensors, 23(1), 550. </unstructured_citation></citation><citation key="ref17"><doi>10.1109/access.2023.3296707</doi><unstructured_citation>Dunmore, A., Jang-Jaccard, J., Sabrina, F., &amp; Kwak, J. (2023). A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection. IEEE Access. </unstructured_citation></citation><citation key="ref18"><doi>10.3390/math9080823</doi><unstructured_citation>Al-Milli, N., Hudaib, A., &amp; Obeid, N. (2021). Population diversity control of genetic algorithm using a novel injection method for bankruptcy prediction problem. Mathematics, 9(8), 823. </unstructured_citation></citation><citation key="ref19"><doi>10.1002/ett.4815</doi><unstructured_citation>Poongodi, M., &amp; Hamdi, M. (2023). Intrusion detection system using distributed multilevel discriminator in GAN for IoT system. Transactions on Emerging Telecommunications Technologies, vol. 34 (11), e4815, https://doi.org/10.1002/ett.4815. </unstructured_citation></citation><citation key="ref20"><doi>10.1145/3422622</doi><unstructured_citation>Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., &amp; Bengio, Y. (2020). Generative adversarial networks. Communications of the ACM, 63(11), 139-144. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>Hamandi, H. R. (2022). Modeling and Enhancing Deep Learning Accuracy in Computer Vision Applications. Wayne State University,  29254756. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>Even-Zohar, Y., &amp; Roth, D. (2001). A sequential model for multi-class classification. arXiv preprint cs/0106044, [Online]. https://aclanthology.org/W01- 0502.pdf (Accessed Date: February 2, 2023). </unstructured_citation></citation><citation key="ref23"><doi>10.1016/j.dcan.2023.03.008</doi><unstructured_citation>Ullah, F., Ullah, S., Srivastava, G., &amp; Lin, J. C. W. (2023). IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digital Communications and Networks, https://doi.org/10.1016/j.dcan.2023.03.008. </unstructured_citation></citation><citation key="ref24"><doi>10.34028/iajit/19/3a/8</doi><unstructured_citation>Nti, I. K., Narko-Boateng, O., Adekoya, A. F., &amp; Somanathan, A. R. (2022). Stacknet Based Decision Fusion Classifier for Network Intrusion Detection. International Arab Journal of Information Technology, 19(3 A), 478-490.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>