Skip to main content
Log in

Optimized Convolutional Neural Network Frameworks for Automatic Intrusion Detection Systems in Wireless Cybersecurity Applications

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Securing the information traversing network infrastructures from increasingly sophisticated attackers is paramount. Cybersecurity has evolved to become a critical and integral component of any organizational information system. To this end, the development of Intrusion Detection Systems (IDSs) for monitoring, analyzing, and identifying malicious activities within network data flows is crucial. This paper introduces five innovative IDS models that leverage the capabilities of Convolutional Neural Networks (CNNs). The foremost model, termed the Three-layer Convolutional Neural Network (TCNN), has been designed to minimize parameters and computational demands, thereby expediting the model training process. Complementing this, four additional models have been adopted employing the principles of Transfer Learning (TL): VGG16, VGG19, ResNet50, and ResNet152. We have subjected these models to rigorous evaluation using the NSL-KDD dataset, encompassing four categories of cyber-attacks—Probe, Remote to User (R2U), User to Root (U2R), and Denial of Service (DoS)—as well as benign network behavior. Our models are adept at conducting both binary and multi-class classifications across diverse training and testing data proportions. They have achieved impeccable scores, with precision, recall, and F1-score each reaching 100%. Concurrently, the detection rate, classification accuracy, and false alarm rate stand at 99.99%, 99.81%, and 0.004, respectively. These outcomes corroborate the efficacy of the proposed systems in assisting cybersecurity professionals to efficiently pinpoint network breaches. Furthermore, we present a comparative analysis between our models and selected cutting-edge IDS frameworks to underscore their superior performance and dominance in the field.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price includes VAT (Netherlands)

Instant access to the full article PDF.

Fig. 1
The alternative text for this image may have been generated using AI.
Fig. 2
The alternative text for this image may have been generated using AI.
Fig. 3
The alternative text for this image may have been generated using AI.
Fig. 4
The alternative text for this image may have been generated using AI.
Fig. 5
The alternative text for this image may have been generated using AI.
Fig. 6
The alternative text for this image may have been generated using AI.
Fig. 7
The alternative text for this image may have been generated using AI.
Fig. 8
The alternative text for this image may have been generated using AI.
Fig. 9
The alternative text for this image may have been generated using AI.

Similar content being viewed by others

Data Availability

All data are available upon request from the corresponding author.

References

  1. Alarifi, A., Sankar, S., Altameem, T., Jithin, K., Amoon, M., et al. (2020). A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access, 8, 128548–128573.

    Article  Google Scholar 

  2. Faragallah, O., El-sayed, H., Afifi, A., & El-Shafai, W. (2021). Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Optics and Lasers in Engineering, 137, 1–15.

    Article  Google Scholar 

  3. Alarifi, A., Amoon, M., Aly, M., & El-Shafai, W. (2020). Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access, 8, 221246–221268.

    Article  Google Scholar 

  4. Faragallah, O., Alzain, M., El-Sayed, H., Al-Amri, J., El-Shafai, W., et al. (2018). Block-based optical color image encryption based on double random phase encoding. IEEE Access, 7, 4184–4194.

    Article  Google Scholar 

  5. Al-Afandy, K., El-Shafai, W., El-Rabaie, E., Abd El-Samie, F., Faragallah, O., et al. (2018). Robust hybrid watermarking techniques for different color imaging systems. Multimedia Tools and Applications, 77(19), 25709–25759.

    Article  Google Scholar 

  6. El-Shafai, W., El-Rabaie, S., El-Halawany, M., & Abd El-Samie, F. (2019). Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multimedia Tools and Applications, 78(19), 27211–27244.

    Article  Google Scholar 

  7. El-Shafai, W., El-Rabaie, S., El-Halawany, M., & Abd El-Samie, F. (2018). Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication. International Journal of Communication Systems, 31(4), 1–23.

    Article  Google Scholar 

  8. Faragallah, O., AlZain, M., El-Sayed, H., Al-Amri, J., El-Shafai, W., et al. (2020). Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimedia Tools and Applications, 79(3), 2495–2519.

    Article  Google Scholar 

  9. Faragallah, O., Afifi, A., El-Shafai, W., El-Sayed, H., Naeem, E., et al. (2020). Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications. IEEE Access, 8, 42491–42503.

    Article  Google Scholar 

  10. Mahmoud, A., El-Shafai, W., Taha, T., El-Rabaie, S., Zahran, O., et al. (2021). A statistical framework for breast tumor classification from ultrasonic images. Multimedia Tools and Applications, 80(4), 5977–5996.

    Article  Google Scholar 

  11. El-Shafai, W., El-Rabaie, S., El-Halawany, M., & Abd El-Samie, F. (2018). Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication. Multimedia Tools and Applications, 77(11), 13145–13172.

    Article  Google Scholar 

  12. El-Shafai, W. (2015). Pixel-level matching based multi-hypothesis error concealment modes for wireless 3D H 264/MVC communication. 3 D Research, 6(3), 1–11.

    Google Scholar 

  13. Algarni, A., El Banby, G., Ismail, S., El-Shafai, W., El-Samie, F., et al. (2020). Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security application. Entropy, 22(12), 1361.

    Article  MathSciNet  Google Scholar 

  14. Ibrahim, S., Egila, M., Shawky, H., Elsaid, M., El-Shafa, W. et al. (2020). Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimedia Tools and Applications, pp. 1–26.

  15. Soliman, N., Khalil, M., Algarni, A., Ismail, S., Marzouk, R., et al. (2020). Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimedia Tools and Applications, 80, 4789.

    Article  Google Scholar 

  16. El-Shafai, W., Mohamed, F., Elkamchouchi, H., Abd-Elnaby, M., & ElShafee, A. (2021). Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access, 9, 1–25.

    Article  Google Scholar 

  17. El-Shafai, W., Almomani, I., & Alkhayer, A. (2021). Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access, 9, 35004–35026.

    Article  Google Scholar 

  18. El-Shafai, W., El-Rabaie, E., El-Halawany, M., & Abd El-Samie, F. (2018). Efficient multi-level security for robust 3D color-plus-depth HEVC. Multimedia Tools and Applications, 77(23), 30911–30937.

    Article  Google Scholar 

  19. Gu, J., et al. (2020). An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation. In W. Lu (Ed.), Cyber Security. CNCERT 2020. Communications in Computer and Information Science. (Vol. 1299). Springer.

    Google Scholar 

  20. Ji, H., Kim, D., Shin, D., & Shin, D. (2018). A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network. In J. J. Park, V. Loia, G. Yi, & Y. Sung (Eds.), Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 17 (pp. 452–457). Springer Singapore. https://doi.org/10.1007/978-981-10-7605-3_74

    Chapter  Google Scholar 

  21. Masum, M., & Shahriar, H. (2021). A transfer learning with deep neural network approach for network intrusion detection. International Journal of Intelligent Computing Research, 12(1), 1087.

    Article  Google Scholar 

  22. Man, J., & Sun, G. (2021). A residual learning-based network intrusion detection system. Security and Communication Networks., 2021, 1–9. https://doi.org/10.1155/2021/5593435

    Article  Google Scholar 

  23. Wu, P., Guo, H. & Buckland, R. (2019). A transfer learning approach for network intrusion detection. In 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), 281–285.

  24. Enache, A., & Patriciu, V. V. (2014). Intrusions detection based on Support Vector Machine optimized with swarm intelligence. In 2014 IEEE 9th IEEE international symposium on applied computational intelligence and informatics (SACI), pp. 153–158, doi: https://doi.org/10.1109/SACI.2014.6840052.

  25. Zhang, Q., & Feng, W. (2009). Network intrusion detection by support vectors and ant colony. In Proceedings of the 2009 international workshop on information security and application (IWISA 2009).

  26. Halim, Z., Yousaf, M. N., Waqas, M., Sulaiman, M., et al. (2021). An effective genetic algorithm-based feature selection method for intrusion detection systems. Computers & Security, 110, 102448.

    Article  Google Scholar 

  27. Bridges, S., & Vaughn, R. (2000). Fuzzy data mining and genetic algorithms applied to intrusion detection. In 12th Annual Canadian information technology security symposium, pp. 109–122.

  28. Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys and tutorials, 18(2), 1153–1176.

    Article  Google Scholar 

  29. Thaseen, I. S., & Kumar, C. A. (2017). Intrusion detection model using fusion of chi-square feature selection and multi class SVM. Journal of King Saud University - Computer and Information Sciences, 29(4), 462–472. https://doi.org/10.1016/j.jksuci.2015.12.004

    Article  Google Scholar 

  30. Devi, R. R., & Abualkibash, M. (2019). Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets - a review paper. International Journal of Computer Science and Information Technology, 11(03), 65–80. https://doi.org/10.5121/ijcsit.2019.11306

    Article  Google Scholar 

  31. LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521, 436–444.

    Article  Google Scholar 

  32. Torrey, L., & Shavlik, J. (2009). Transfer learning. Handbook of Research on Machine Learning Applications. https://doi.org/10.4018/978-1-60566-766-9.ch011

    Article  Google Scholar 

  33. Nsl-kdd data set for network-based intrusion detection systems.” Available on: http://nsl.cs.unb.ca/KDD/NSLKDD.html, March 2009.

  34. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE Symposium on computational intelligence for security and defense applications, 1–6.

  35. Jie, L., Jiahao, C., Xueqin, Z., Yue, Z. H. O. U., & Jiajun, L. I. N. (2019). One-hot encoding and convolutional neural network based anomaly detection. Journal of Tsinghua University (Science and Technology), 59(7), 523–529.

    Google Scholar 

  36. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 2, 222–232.

    Article  Google Scholar 

  37. Abbas, A., Abdelsamea, M. M., & Gaber, M. M. (2021). Classification of COVID-19 in chest X-ray images using DeTraC deep convolutional neural network. Applied Intelligence, 51(2), 854–864.

    Article  Google Scholar 

  38. Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition, arXiv preprint arXiv:1409.1556.

  39. Zhao, H., Pan, Y., & Yang, F. (2020). Research on information extraction of technical documents and construction of domain knowledge graph. IEEE Access, 8, 168087–168098.

    Article  Google Scholar 

  40. Jiao, J., Courtade, T. A., Venkat, K., & Weissman, T. (2015). Justification of logarithmic loss via the benefit of side information. IEEE Transactions on Information Theory, 61(10), 5357–5365.

    Article  MathSciNet  MATH  Google Scholar 

  41. El-Shafai, W., El-Nabi, S. A., El-Rabaie, E. M., Ali, A. M., Soliman, N. F., et al. (2022). Efficient deep-learning-based autoencoder denoising approach for medical image diagnosis. CMC-Computers, Materials & Continua, 70(3), 6107–6125.

    Article  Google Scholar 

  42. Davis, A., Gill, S., Wong, R., & Tayeb, S. (2020). Feature selection for deep neural networks in cyber security applications. In: IEEE 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) - Vancouver, BC, Canada (2020.9.9–2020.9.12).

  43. Ieracitano, C., Adeel, A., Morabito, F. C., & Hussain, A. (2020). A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing, 387, 51–62. https://doi.org/10.1016/j.neucom.2019.11.016

    Article  Google Scholar 

  44. Tang, Y., Gu, L., & Wang, L. (2022). Deep stacking network for intrusion detection. Sensors, 22(1), 25. https://doi.org/10.3390/s22010025

    Article  Google Scholar 

Download references

Acknowledgements

The authors are very grateful to all the institutions in the affiliation list for successfully performing this research work. The authors would like to thank Prince Sultan University for their support.

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

All authors equally contributed.

Corresponding author

Correspondence to Walid El-Shafai.

Ethics declarations

Conflict of interest

The authors have neither relevant financial nor non-financial interests to disclose.

Ethical Approval

All authors contributed and accepted to submit the current work.

Consent to Participate

All authors contributed and accepted to submit the current work.

Consent to Publish

All authors accepted to submit and publish the submitted work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sallam, Y.F., El-Nabi, S.A., El-Shafai, W. et al. Optimized Convolutional Neural Network Frameworks for Automatic Intrusion Detection Systems in Wireless Cybersecurity Applications. Wireless Pers Commun 143, 307–342 (2025). https://doi.org/10.1007/s11277-024-11535-z

Download citation

  • Accepted:

  • Published:

  • Version of record:

  • Issue date:

  • DOI: https://doi.org/10.1007/s11277-024-11535-z

Keywords

Profiles

  1. Walid El-Shafai