Network Intrusion Detection System by Learning Jointly From Tabular and Text-Based Features

dc.contributor.author Duzgun, Berkant
dc.contributor.author Cayir, Aykut
dc.contributor.author Unal, Ugur
dc.contributor.author Dag, Hasan
dc.date.accessioned 2024-06-23T21:36:56Z
dc.date.available 2024-06-23T21:36:56Z
dc.date.issued 2024
dc.description Cayir, Aykut/0000-0001-9564-0331; Unal, Ugur/0000-0001-6552-6044; Duzgun, Berkant/0000-0002-3637-4288 en_US
dc.description.abstract Network intrusion detection systems (NIDS) play a critical role in maintaining the security and integrity of computer networks. These systems are designed to detect and respond to anomalous activities that may indicate malicious intent or unauthorized access. The need for robust NIDS solutions has never been more pressing in today's digital landscape, characterized by constantly evolving cyber threats. Deploying effective NIDS can be challenging, particularly in accurately identifying network anomalies amid the ever-increasing sophisticated and difficult-to-detect cyber threats. The motivation for our research stems from the recognition that while NIDS studies have made significant strides, there remains a crucial need for more effective and accurate methods to detect network anomalies. Commonly used features in NIDS studies include network logs, with some studies exploring text-based features such as payload. However, traditional machine and deep learning models may need to be improved in learning jointly from tabular and text-based features. Here, we present a new approach that integrates both tabular and text-based features to improve the performance of NIDS. Our research aims to address the existing limitations of NIDS and contribute to the development of more reliable and efficient network security solutions by introducing more effective and accurate methods for detecting network anomalies. Our internal experiments have revealed that the deep learning approach utilizing tabular features produces favourable results, whereas the pre-trained transformer approach needs to perform sufficiently. Hence, our proposed approach, which integrates both feature types using deep learning and pre-trained transformer approaches, achieves superior performance. These findings indicate that integrating both feature types using deep learning and pre-trained transformer approaches can significantly improve the accuracy of network anomaly detection. Moreover, our proposed approach outperforms the state-of-the-art methods in terms of accuracy, F1-score, and recall on commonly used NIDS datasets consisting of ISCX-IDS2012, UNSW-NB15, and CIC-IDS2017, with F1-scores of 99.80%, 92.37%, and 99.69%, respectively, indicating its effectiveness in detecting network anomalies. en_US
dc.description.sponsorship Scientific and Technological Research Council of Turkey; [120E487] en_US
dc.description.sponsorship This work is supported by The Scientific and Technological Research Council of Turkey under the Grant number 120E487. en_US
dc.identifier.doi 10.1111/exsy.13518
dc.identifier.issn 0266-4720
dc.identifier.issn 1468-0394
dc.identifier.scopus 2-s2.0-85179370771
dc.identifier.uri https://doi.org/10.1111/exsy.13518
dc.identifier.uri https://hdl.handle.net/20.500.12469/5673
dc.language.iso en en_US
dc.publisher Wiley en_US
dc.relation.ispartof Expert Systems
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject CANINE en_US
dc.subject MLP en_US
dc.subject network logs en_US
dc.subject NIDS en_US
dc.subject payload en_US
dc.subject pre-trained transformer en_US
dc.subject tokenization-free en_US
dc.title Network Intrusion Detection System by Learning Jointly From Tabular and Text-Based Features en_US
dc.type Article en_US
dspace.entity.type Publication
gdc.author.id Cayir, Aykut/0000-0001-9564-0331
gdc.author.id Unal, Ugur/0000-0001-6552-6044
gdc.author.id Duzgun, Berkant/0000-0002-3637-4288
gdc.author.scopusid 57887008300
gdc.author.scopusid 56497768800
gdc.author.scopusid 57215332698
gdc.author.scopusid 6507328166
gdc.bip.impulseclass C4
gdc.bip.influenceclass C5
gdc.bip.popularityclass C4
gdc.coar.access open access
gdc.coar.type text::journal::journal article
gdc.collaboration.industrial false
gdc.description.department Kadir Has University en_US
gdc.description.departmenttemp [Duzgun, Berkant; Cayir, Aykut; Unal, Ugur; Dag, Hasan] Kadir Has Univ, Management Informat Syst, Istanbul, Turkiye; [Unal, Ugur] Rierino, Istanbul, Turkiye; [Duzgun, Berkant] Kadir Has Univ, Management Informat Syst, TR-34083 Istanbul, Turkiye en_US
gdc.description.issue 4 en_US
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality Q1
gdc.description.volume 41 en_US
gdc.description.wosquality Q2
gdc.identifier.openalex W4389639285
gdc.identifier.wos WOS:001122493300001
gdc.index.type WoS
gdc.index.type Scopus
gdc.oaire.accesstype HYBRID
gdc.oaire.diamondjournal false
gdc.oaire.impulse 10.0
gdc.oaire.influence 3.1796266E-9
gdc.oaire.isgreen false
gdc.oaire.popularity 9.870363E-9
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.oaire.sciencefields 02 engineering and technology
gdc.openalex.collaboration National
gdc.openalex.fwci 5.71417979
gdc.openalex.normalizedpercentile 0.91
gdc.openalex.toppercent TOP 10%
gdc.opencitations.count 0
gdc.plumx.mendeley 45
gdc.plumx.scopuscites 14
gdc.scopus.citedcount 14
gdc.virtual.author Dağ, Hasan
gdc.wos.citedcount 8
relation.isAuthorOfPublication e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isAuthorOfPublication.latestForDiscovery e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isOrgUnitOfPublication ff62e329-217b-4857-88f0-1dae00646b8c
relation.isOrgUnitOfPublication acb86067-a99a-4664-b6e9-16ad10183800
relation.isOrgUnitOfPublication b20623fc-1264-4244-9847-a4729ca7508c
relation.isOrgUnitOfPublication.latestForDiscovery ff62e329-217b-4857-88f0-1dae00646b8c

Files