Deep Learning-Based Anomaly and Intrusion Detection Using the CSE-CIC-IDS2018 Dataset

Authors

  • Al Baraa Bouidaine STIC Laboratory, Faculty of Technology, Department of Telecommunication, University of Tlemcen, Tlemcen, Algeria
  • Djilali Moussaoui STIC Laboratory, Faculty of Technology, Department of Telecommunication, University of Tlemcen, Tlemcen, Algeria
  • Mourad Hadjila STIC Laboratory, Faculty of Technology, Department of Telecommunication, University of Tlemcen, Tlemcen, Algeria
  • Wafaa Ferhi STIC Laboratory, Faculty of Technology, Department of Telecommunication, University of Tlemcen, Tlemcen, Algeria
  • Mohammed Hicham Hachemi Department of Electronics, Faculty of Electrical Engineering, University of Science and Technology Mohamed Boudiaf, Oran, Algeria
Volume: 15 | Issue: 4 | Pages: 24782-24787 | August 2025 | https://doi.org/10.48084/etasr.11173

Abstract

Intrusion Detection Systems (IDSs) play a vital role in identifying and mitigating malicious network activities and system misuse. The integration of Artificial Intelligence (AI), particularly Deep Learning (DL), has significantly enhanced the adaptability and efficiency of IDS. This paper proposes an intelligent network-based IDS leveraging a DL model trained on the CSE-CIC-IDS2018 dataset. Key data pre-processing steps included duplicate removal, handling missing values, conversion of categorical data to a numerical form, and feature scaling. Initially, the model aimed to classify all individual attack types alongside benign traffic; however, the frequent misclassification of certain attack types prompted the aggregation of similar attacks into broader categories. This adjustment led to notable improvements in the performance metrics, including accuracy, precision, recall, and F1-score. To mitigate overfitting, weight decay in the context of neural networks, known as L2 weight regularization, was applied. The proposed improved DL model achieved an accuracy of 99.91%, precision of 98.61%, recall of 93.18%, and an F1-score of 94.78%, highlighting both the robustness of DL in intrusion detection and the critical role of comprehensive data preprocessing.

Keywords:

network security, IDS, pre-processing, DL, one hot encoding, multi-class classification

Downloads

Download data is not yet available.

References

V. Borhade, A. Nayak, and R. Dakshayani, "Intrusion Detection: A Machine Learning Approach," in Advanced Computing Technologies and Applications, Singapore, 2020, pp. 555–561. DOI: https://doi.org/10.1007/978-981-15-3242-9_53

V. Kumar, S. Yadav, V. Kumar, J. Sengupta, R. Tripathi, and S. Tiwari, "Optimal Clustering in Weibull Distributed WSNs Based on Realistic Energy Dissipation Model," in Progress in Computing, Analytics and Networking, Singapore, 2018, vol. 710, pp. 61–73. DOI: https://doi.org/10.1007/978-981-10-7871-2_7

M. Abdalla, X. Boyen, C. Chevalier, and D. Pointcheval, "Distributed Public-Key Cryptography from Weak Secrets," in Public Key Cryptography – PKC 2009, Berlin, Heidelberg, 2009, vol. 5443, pp. 139–159. DOI: https://doi.org/10.1007/978-3-642-00468-1_9

U. Somani, K. Lakhani, and M. Mundra, "Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing," in 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010), Solan, India, Oct. 2010, pp. 211–216. DOI: https://doi.org/10.1109/PDGC.2010.5679895

D. E. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, Feb. 1987. DOI: https://doi.org/10.1109/TSE.1987.232894

M. A. Aydın, A. H. Zaim, and K. G. Ceylan, "A hybrid intrusion detection system design for computer network security," Computers & Electrical Engineering, vol. 35, no. 3, pp. 517–526, May 2009. DOI: https://doi.org/10.1016/j.compeleceng.2008.12.005

D. Anderson, T. F. Lunt, H. S. Javitz, A. Tamaru, and A. Valdes, "Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1," 1997. [Online]. Available: https://api.semanticscholar.org/CorpusID:15146354

H.-J. Liao, C.-H. Richard Lin, Y.-C. Lin, and K.-Y. Tung, "Intrusion detection system: A comprehensive review," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 16–24, Jan. 2013. DOI: https://doi.org/10.1016/j.jnca.2012.09.004

A. H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," in 2003 Symposium on Applications and the Internet, 2003. Proceedings, Orlando, FL, USA, 2003, pp. 209–216. DOI: https://doi.org/10.1109/SAINT.2003.1183050

A. Elhanashi, K. Gasmi, A. Begni, P. Dini, Q. Zheng, and S. Saponara, "Machine Learning Techniques for Anomaly-Based Detection System on CSE-CIC-IDS2018 Dataset," in Applications in Electronics Pervading Industry, Environment and Society, vol. 1036, R. Berta and A. De Gloria, Eds. Cham: Springer Nature Switzerland, 2023, pp. 131–140. DOI: https://doi.org/10.1007/978-3-031-30333-3_17

H. Najafi Mohsenabad and M. A. Tut, "Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset," Applied Sciences, vol. 14, no. 3, Jan. 2024, Art. no. 1044. DOI: https://doi.org/10.3390/app14031044

R. I. Farhan, A. T. Maolood, and N. F. Hassan, "Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning," Indonesian Journal of Electrical Engineering and Computer Science, vol. 20, no. 3, Dec. 2020, Art. no. 1413. DOI: https://doi.org/10.11591/ijeecs.v20.i3.pp1413-1418

Y. Zhang, Y. Zhang, N. Zhang, and M. Xiao, "A network intrusion detection method based on deep learning with higher accuracy," Procedia Computer Science, vol. 174, pp. 50–54, 2020. DOI: https://doi.org/10.1016/j.procs.2020.06.055

S. Gamage and J. Samarabandu, "Deep learning methods in network intrusion detection: A survey and an objective comparison," Journal of Network and Computer Applications, vol. 169, Nov. 2020, Art no. 102767. DOI: https://doi.org/10.1016/j.jnca.2020.102767

V. Kanimozhi and T. P. Jacob, "Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing," ICT Express, vol. 7, no. 3, pp. 366–370, Sep. 2021. DOI: https://doi.org/10.1016/j.icte.2020.12.004

I. Sohn, "Deep belief network based intrusion detection techniques: A survey," Expert Systems with Applications, vol. 167, Apr. 2021, Art. no. 114170. DOI: https://doi.org/10.1016/j.eswa.2020.114170

E. E. Abdallah, W. Eleisah, and A. F. Otoom, "Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey," Procedia Computer Science, vol. 201, pp. 205–212, 2022. DOI: https://doi.org/10.1016/j.procs.2022.03.029

M. Sarhan, S. Layeghy, N. Moustafa, M. Gallagher, and M. Portmann, "Feature extraction for machine learning-based intrusion detection in IoT networks," Digital Communications and Networks, vol. 10, no. 1, pp. 205–216, Feb. 2024. DOI: https://doi.org/10.1016/j.dcan.2022.08.012

B. I. Farhan and A. D. Jasim, "Performance analysis of intrusion detection for deep learning model based on CSE CIC IDS2018 dataset," Indonesian Journal of Electrical Engineering and Computer Science, vol. 26, no. 2, May 2022, Art. no. 1165. DOI: https://doi.org/10.11591/ijeecs.v26.i2.pp1165-1172

V. Hnamte and J. Hussain, "DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System," Telematics and Informatics Reports, vol. 10, Jun. 2023, Art. no. 100053. DOI: https://doi.org/10.1016/j.teler.2023.100053

R. A. Elsayed, R. A. Hamada, M. I. Abdalla, and S. A. Elsaid, "Securing IoT and SDN systems using deep-learning based automatic intrusion detection," Ain Shams Engineering Journal, vol. 14, no. 10, Oct. 2023, Art. no. 102211. DOI: https://doi.org/10.1016/j.asej.2023.102211

N. Saran and N. Kesswani, "A comparative study of supervised Machine Learning classifiers for Intrusion Detection in Internet of Things," Procedia Computer Science, vol. 218, pp. 2049–2057, 2023. DOI: https://doi.org/10.1016/j.procs.2023.01.181

S. Alzughaibi and S. El Khediri, "A Cloud Intrusion Detection Systems Based on DNN Using Backpropagation and PSO on the CSE-CIC-IDS2018 Dataset," Applied Sciences, vol. 13, no. 4, Feb. 2023, Art. no. 2276. DOI: https://doi.org/10.3390/app13042276

D. K. Singh and M. Shrivastava, "Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System," Engineering, Technology & Applied Science Research, vol. 11, no. 3, pp. 7130–7134, Jun. 2021. DOI: https://doi.org/10.48084/etasr.4149

R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7657

A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018). (2018), Sharafaldin I, A. H. Lashkari Ali A. Ghorbani. [Online]. Available: https://registry.opendata.aws/cse-cic-ids2018.

I. Sharafaldin, A. Habibi Lashkari, and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization:," in Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, Madeira, Portugal, 2018, pp. 108–116. DOI: https://doi.org/10.5220/0006639801080116

Downloads

How to Cite

[1]
A. B. Bouidaine, D. Moussaoui, M. Hadjila, W. Ferhi, and M. H. Hachemi, “Deep Learning-Based Anomaly and Intrusion Detection Using the CSE-CIC-IDS2018 Dataset”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 24782–24787, Aug. 2025.

Metrics

Abstract Views: 254
PDF Downloads: 281

Metrics Information