Network Intrusion Detection System by Learning Jointly From Tabular and Text-Based Features

dc.authorid Cayir, Aykut/0000-0001-9564-0331
dc.authorid Unal, Ugur/0000-0001-6552-6044
dc.authorid Duzgun, Berkant/0000-0002-3637-4288
dc.authorscopusid 57887008300
dc.authorscopusid 56497768800
dc.authorscopusid 57215332698
dc.authorscopusid 6507328166
dc.contributor.author Duzgun, Berkant
dc.contributor.author Dağ, Hasan
dc.contributor.author Cayir, Aykut
dc.contributor.author Unal, Ugur
dc.contributor.author Dag, Hasan
dc.contributor.other Management Information Systems
dc.date.accessioned 2024-06-23T21:36:56Z
dc.date.available 2024-06-23T21:36:56Z
dc.date.issued 2024
dc.department Kadir Has University en_US
dc.department-temp [Duzgun, Berkant; Cayir, Aykut; Unal, Ugur; Dag, Hasan] Kadir Has Univ, Management Informat Syst, Istanbul, Turkiye; [Unal, Ugur] Rierino, Istanbul, Turkiye; [Duzgun, Berkant] Kadir Has Univ, Management Informat Syst, TR-34083 Istanbul, Turkiye en_US
dc.description Cayir, Aykut/0000-0001-9564-0331; Unal, Ugur/0000-0001-6552-6044; Duzgun, Berkant/0000-0002-3637-4288 en_US
dc.description.abstract Network intrusion detection systems (NIDS) play a critical role in maintaining the security and integrity of computer networks. These systems are designed to detect and respond to anomalous activities that may indicate malicious intent or unauthorized access. The need for robust NIDS solutions has never been more pressing in today's digital landscape, characterized by constantly evolving cyber threats. Deploying effective NIDS can be challenging, particularly in accurately identifying network anomalies amid the ever-increasing sophisticated and difficult-to-detect cyber threats. The motivation for our research stems from the recognition that while NIDS studies have made significant strides, there remains a crucial need for more effective and accurate methods to detect network anomalies. Commonly used features in NIDS studies include network logs, with some studies exploring text-based features such as payload. However, traditional machine and deep learning models may need to be improved in learning jointly from tabular and text-based features. Here, we present a new approach that integrates both tabular and text-based features to improve the performance of NIDS. Our research aims to address the existing limitations of NIDS and contribute to the development of more reliable and efficient network security solutions by introducing more effective and accurate methods for detecting network anomalies. Our internal experiments have revealed that the deep learning approach utilizing tabular features produces favourable results, whereas the pre-trained transformer approach needs to perform sufficiently. Hence, our proposed approach, which integrates both feature types using deep learning and pre-trained transformer approaches, achieves superior performance. These findings indicate that integrating both feature types using deep learning and pre-trained transformer approaches can significantly improve the accuracy of network anomaly detection. Moreover, our proposed approach outperforms the state-of-the-art methods in terms of accuracy, F1-score, and recall on commonly used NIDS datasets consisting of ISCX-IDS2012, UNSW-NB15, and CIC-IDS2017, with F1-scores of 99.80%, 92.37%, and 99.69%, respectively, indicating its effectiveness in detecting network anomalies. en_US
dc.description.sponsorship Scientific and Technological Research Council of Turkey; [120E487] en_US
dc.description.sponsorship This work is supported by The Scientific and Technological Research Council of Turkey under the Grant number 120E487. en_US
dc.identifier.citationcount 0
dc.identifier.doi 10.1111/exsy.13518
dc.identifier.issn 0266-4720
dc.identifier.issn 1468-0394
dc.identifier.issue 4 en_US
dc.identifier.scopus 2-s2.0-85179370771
dc.identifier.scopusquality Q2
dc.identifier.uri https://doi.org/10.1111/exsy.13518
dc.identifier.uri https://hdl.handle.net/20.500.12469/5673
dc.identifier.volume 41 en_US
dc.identifier.wos WOS:001122493300001
dc.language.iso en en_US
dc.publisher Wiley en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.scopus.citedbyCount 10
dc.subject CANINE en_US
dc.subject MLP en_US
dc.subject network logs en_US
dc.subject NIDS en_US
dc.subject payload en_US
dc.subject pre-trained transformer en_US
dc.subject tokenization-free en_US
dc.title Network Intrusion Detection System by Learning Jointly From Tabular and Text-Based Features en_US
dc.type Article en_US
dc.wos.citedbyCount 5
dspace.entity.type Publication
relation.isAuthorOfPublication e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isAuthorOfPublication.latestForDiscovery e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isOrgUnitOfPublication ff62e329-217b-4857-88f0-1dae00646b8c
relation.isOrgUnitOfPublication.latestForDiscovery ff62e329-217b-4857-88f0-1dae00646b8c

Files