Abstract
Securing the information traversing network infrastructures from increasingly sophisticated attackers is paramount. Cybersecurity has evolved to become a critical and integral component of any organizational information system. To this end, the development of Intrusion Detection Systems (IDSs) for monitoring, analyzing, and identifying malicious activities within network data flows is crucial. This paper introduces five innovative IDS models that leverage the capabilities of Convolutional Neural Networks (CNNs). The foremost model, termed the Three-layer Convolutional Neural Network (TCNN), has been designed to minimize parameters and computational demands, thereby expediting the model training process. Complementing this, four additional models have been adopted employing the principles of Transfer Learning (TL): VGG16, VGG19, ResNet50, and ResNet152. We have subjected these models to rigorous evaluation using the NSL-KDD dataset, encompassing four categories of cyber-attacks—Probe, Remote to User (R2U), User to Root (U2R), and Denial of Service (DoS)—as well as benign network behavior. Our models are adept at conducting both binary and multi-class classifications across diverse training and testing data proportions. They have achieved impeccable scores, with precision, recall, and F1-score each reaching 100%. Concurrently, the detection rate, classification accuracy, and false alarm rate stand at 99.99%, 99.81%, and 0.004, respectively. These outcomes corroborate the efficacy of the proposed systems in assisting cybersecurity professionals to efficiently pinpoint network breaches. Furthermore, we present a comparative analysis between our models and selected cutting-edge IDS frameworks to underscore their superior performance and dominance in the field.









Similar content being viewed by others
Data Availability
All data are available upon request from the corresponding author.
References
Alarifi, A., Sankar, S., Altameem, T., Jithin, K., Amoon, M., et al. (2020). A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access, 8, 128548–128573.
Faragallah, O., El-sayed, H., Afifi, A., & El-Shafai, W. (2021). Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Optics and Lasers in Engineering, 137, 1–15.
Alarifi, A., Amoon, M., Aly, M., & El-Shafai, W. (2020). Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access, 8, 221246–221268.
Faragallah, O., Alzain, M., El-Sayed, H., Al-Amri, J., El-Shafai, W., et al. (2018). Block-based optical color image encryption based on double random phase encoding. IEEE Access, 7, 4184–4194.
Al-Afandy, K., El-Shafai, W., El-Rabaie, E., Abd El-Samie, F., Faragallah, O., et al. (2018). Robust hybrid watermarking techniques for different color imaging systems. Multimedia Tools and Applications, 77(19), 25709–25759.
El-Shafai, W., El-Rabaie, S., El-Halawany, M., & Abd El-Samie, F. (2019). Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multimedia Tools and Applications, 78(19), 27211–27244.
El-Shafai, W., El-Rabaie, S., El-Halawany, M., & Abd El-Samie, F. (2018). Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication. International Journal of Communication Systems, 31(4), 1–23.
Faragallah, O., AlZain, M., El-Sayed, H., Al-Amri, J., El-Shafai, W., et al. (2020). Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimedia Tools and Applications, 79(3), 2495–2519.
Faragallah, O., Afifi, A., El-Shafai, W., El-Sayed, H., Naeem, E., et al. (2020). Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications. IEEE Access, 8, 42491–42503.
Mahmoud, A., El-Shafai, W., Taha, T., El-Rabaie, S., Zahran, O., et al. (2021). A statistical framework for breast tumor classification from ultrasonic images. Multimedia Tools and Applications, 80(4), 5977–5996.
El-Shafai, W., El-Rabaie, S., El-Halawany, M., & Abd El-Samie, F. (2018). Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication. Multimedia Tools and Applications, 77(11), 13145–13172.
El-Shafai, W. (2015). Pixel-level matching based multi-hypothesis error concealment modes for wireless 3D H 264/MVC communication. 3 D Research, 6(3), 1–11.
Algarni, A., El Banby, G., Ismail, S., El-Shafai, W., El-Samie, F., et al. (2020). Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security application. Entropy, 22(12), 1361.
Ibrahim, S., Egila, M., Shawky, H., Elsaid, M., El-Shafa, W. et al. (2020). Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimedia Tools and Applications, pp. 1–26.
Soliman, N., Khalil, M., Algarni, A., Ismail, S., Marzouk, R., et al. (2020). Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimedia Tools and Applications, 80, 4789.
El-Shafai, W., Mohamed, F., Elkamchouchi, H., Abd-Elnaby, M., & ElShafee, A. (2021). Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access, 9, 1–25.
El-Shafai, W., Almomani, I., & Alkhayer, A. (2021). Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access, 9, 35004–35026.
El-Shafai, W., El-Rabaie, E., El-Halawany, M., & Abd El-Samie, F. (2018). Efficient multi-level security for robust 3D color-plus-depth HEVC. Multimedia Tools and Applications, 77(23), 30911–30937.
Gu, J., et al. (2020). An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation. In W. Lu (Ed.), Cyber Security. CNCERT 2020. Communications in Computer and Information Science. (Vol. 1299). Springer.
Ji, H., Kim, D., Shin, D., & Shin, D. (2018). A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network. In J. J. Park, V. Loia, G. Yi, & Y. Sung (Eds.), Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 17 (pp. 452–457). Springer Singapore. https://doi.org/10.1007/978-981-10-7605-3_74
Masum, M., & Shahriar, H. (2021). A transfer learning with deep neural network approach for network intrusion detection. International Journal of Intelligent Computing Research, 12(1), 1087.
Man, J., & Sun, G. (2021). A residual learning-based network intrusion detection system. Security and Communication Networks., 2021, 1–9. https://doi.org/10.1155/2021/5593435
Wu, P., Guo, H. & Buckland, R. (2019). A transfer learning approach for network intrusion detection. In 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), 281–285.
Enache, A., & Patriciu, V. V. (2014). Intrusions detection based on Support Vector Machine optimized with swarm intelligence. In 2014 IEEE 9th IEEE international symposium on applied computational intelligence and informatics (SACI), pp. 153–158, doi: https://doi.org/10.1109/SACI.2014.6840052.
Zhang, Q., & Feng, W. (2009). Network intrusion detection by support vectors and ant colony. In Proceedings of the 2009 international workshop on information security and application (IWISA 2009).
Halim, Z., Yousaf, M. N., Waqas, M., Sulaiman, M., et al. (2021). An effective genetic algorithm-based feature selection method for intrusion detection systems. Computers & Security, 110, 102448.
Bridges, S., & Vaughn, R. (2000). Fuzzy data mining and genetic algorithms applied to intrusion detection. In 12th Annual Canadian information technology security symposium, pp. 109–122.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys and tutorials, 18(2), 1153–1176.
Thaseen, I. S., & Kumar, C. A. (2017). Intrusion detection model using fusion of chi-square feature selection and multi class SVM. Journal of King Saud University - Computer and Information Sciences, 29(4), 462–472. https://doi.org/10.1016/j.jksuci.2015.12.004
Devi, R. R., & Abualkibash, M. (2019). Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets - a review paper. International Journal of Computer Science and Information Technology, 11(03), 65–80. https://doi.org/10.5121/ijcsit.2019.11306
LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521, 436–444.
Torrey, L., & Shavlik, J. (2009). Transfer learning. Handbook of Research on Machine Learning Applications. https://doi.org/10.4018/978-1-60566-766-9.ch011
Nsl-kdd data set for network-based intrusion detection systems.” Available on: http://nsl.cs.unb.ca/KDD/NSLKDD.html, March 2009.
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE Symposium on computational intelligence for security and defense applications, 1–6.
Jie, L., Jiahao, C., Xueqin, Z., Yue, Z. H. O. U., & Jiajun, L. I. N. (2019). One-hot encoding and convolutional neural network based anomaly detection. Journal of Tsinghua University (Science and Technology), 59(7), 523–529.
Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 2, 222–232.
Abbas, A., Abdelsamea, M. M., & Gaber, M. M. (2021). Classification of COVID-19 in chest X-ray images using DeTraC deep convolutional neural network. Applied Intelligence, 51(2), 854–864.
Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition, arXiv preprint arXiv:1409.1556.
Zhao, H., Pan, Y., & Yang, F. (2020). Research on information extraction of technical documents and construction of domain knowledge graph. IEEE Access, 8, 168087–168098.
Jiao, J., Courtade, T. A., Venkat, K., & Weissman, T. (2015). Justification of logarithmic loss via the benefit of side information. IEEE Transactions on Information Theory, 61(10), 5357–5365.
El-Shafai, W., El-Nabi, S. A., El-Rabaie, E. M., Ali, A. M., Soliman, N. F., et al. (2022). Efficient deep-learning-based autoencoder denoising approach for medical image diagnosis. CMC-Computers, Materials & Continua, 70(3), 6107–6125.
Davis, A., Gill, S., Wong, R., & Tayeb, S. (2020). Feature selection for deep neural networks in cyber security applications. In: IEEE 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) - Vancouver, BC, Canada (2020.9.9–2020.9.12).
Ieracitano, C., Adeel, A., Morabito, F. C., & Hussain, A. (2020). A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing, 387, 51–62. https://doi.org/10.1016/j.neucom.2019.11.016
Tang, Y., Gu, L., & Wang, L. (2022). Deep stacking network for intrusion detection. Sensors, 22(1), 25. https://doi.org/10.3390/s22010025
Acknowledgements
The authors are very grateful to all the institutions in the affiliation list for successfully performing this research work. The authors would like to thank Prince Sultan University for their support.
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Contributions
All authors equally contributed.
Corresponding author
Ethics declarations
Conflict of interest
The authors have neither relevant financial nor non-financial interests to disclose.
Ethical Approval
All authors contributed and accepted to submit the current work.
Consent to Participate
All authors contributed and accepted to submit the current work.
Consent to Publish
All authors accepted to submit and publish the submitted work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sallam, Y.F., El-Nabi, S.A., El-Shafai, W. et al. Optimized Convolutional Neural Network Frameworks for Automatic Intrusion Detection Systems in Wireless Cybersecurity Applications. Wireless Pers Commun 143, 307–342 (2025). https://doi.org/10.1007/s11277-024-11535-z
Accepted:
Published:
Version of record:
Issue date:
DOI: https://doi.org/10.1007/s11277-024-11535-z
