..............................
            ..............................
            ..............................
            
Intrusion Detection Model Using Naive Bayes and Deep Learning Technique
        
        The  increase  of  security  threats  and  hacking  the  computer  networks  are  one  of  the  most  dangerous  issues  should 
treat in these days.  Intrusion Detection Systems (IDSs), are the  most appropriate  methods to prevent and detect the attacks of 
networks and computer systems. This study presents several techniques to discover network anomalies using data mining tasks, 
Machine  learning technology  and  dependence  of  artificial  intelligence  techniques.  In  this  research,  the  smart  hybrid  model 
was developed to explore any penetrations inside the network. The model divides into two basic stages. The first stage includes 
the  Genetic  Algorithm  (GA)  in  selecting  the  characteristics  with  depends  on  a  process  of  extracting,  Discretize  And 
dimensionality  reduction  through  Proportional K-Interval  Discretization  (PKID)  and  Fisher  Linear  Discriminant  Analysis 
(FLDA)  on  respectively.  At  the  end  of  the  first  stage  combining Naïve  Bayes  classifier  (NB)  and Decision  Table  (DT)  using 
NSL-KDD data set divided into two separate groups for training and testing. The second stage completely depends on the first 
stage  outputs  (predicted  class)  and  reclassified  with  multilayer  perceptrons  using  Deep Learning4J  (DL)  and  the  use  of 
algorithm  Stochastic Gradient Descent (SGD). In order to improve the  performance in terms of the  accuracy in classification 
of penetrations, raising the average of discovering and reducing the false alarms. The comparison of the proposed model and 
conventional  models  show  the  superiority  of  the  proposed  model  and  the  previous  conventional  hybrid  models.  The  result  of 
the proposed model is 99.9325 of classification accuracy, the rate of detection is 99.9738 and 0.00093 of false alarms.    
            [1] Aljawarneh S., Aldwairi M., and Yassein M., “Anomaly-Based Intrusion Detection System Through Feature Selection Analysis and Building Hybrid Efficient Model,” Journal of Intrusion Detection Model Using Naive Bayes and Deep Learning Technique 223 Computational Science, vol. 25, pp. 152-160, 2018.
[2] Alom M., Bontupalli V., and Taha T., “Intrusion Detection Using Deep Belief Networks,” in Proceedings of National Aerospace and Electronics Conference, Dayton, pp. 339-344, 2015.
[3] Azad C. and Jha V., “Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets,” International Journal of Information Technology and Computer Science, pp. 75-90, 2013.
[4] Azad C. and Jha V., “Data Mining based Hybrid Intrusion Detection System,” Indian Journal of Science and Technology, vol. 7, no. 6, pp. 781- 789, 2014.
[5] Bhavsar Y. and Waghmare K., “Intrusion Detection System Using Data Mining Technique: Support Vector Machine,” International Journal of Emerging Technology and Advanced Engineering, vol. 3, no. 3, pp. 581-586, 2013.
[6] Canbay Y. and Sagiroglu S., “A Hybrid Method for Intrusion Detection,” in Proceedings of IEEE 14th International Conference on Machine Learning and Applications, Miami, pp. 156-161, 2015.
[7] Chae H., Jo B., Choi S., and Park T., “Feature Selection for Intrusion Detection using NSL- KDD,” Recent Advances in Computer Science, pp. 184-187, 2013.
[8] Dhanabal L. and Shantharajah S., “A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 6, pp. 446-452, 2015.
[9] Farid D., Zhang L., Rahman C., Hossain M., and Strachan R., “Hybrid Decision Tree And Naïve Bayes Classifiers For Multi-Class Classification Tasks,” Expert Systems with Applications, vol. 41, no. 4, pp. 1937-1946, 2014.
[10] Gao N., Gao L., Gao Q., and Wang H., “An Intrusion Detection Model Based on Deep Belief Networks,” in Proceedings of 2nd International Conference on Advanced Cloud and Big Data, Huangshan, pp. 247-252, 2014.
[11] Ghazali A., Nuaimy W., Al-Atabi A., and Jamaludin I., “Comparison of Classification Models For Nsl-Kdd Dataset for Network Anomaly Detection,” Academic Journal of Science, vol. 4, no. 1, pp. 199-206, 2015.
[12] Hadi A., “Performance Analysis of Big Data Intrusion Detection System over Random Forest Algorithm,” International Journal of Applied Engineering Research, vol. 13, no. 2, pp. 1520- 1527, 2018.
[13] Hettich S. and Bay S., KDD cup 99 task description, http://kdd. ics. uci. edu/databases/kddcup99/task. html , Last Visited, 1999.
[14] Nsl-kdd Data Set for Network-Based Intrusion Detection Systems, Available on: http://nsl. cs. unb. ca/KDD/NSLKDD.html, Last Visited, 2009.
[15] Liao H., Lin C., Lin Y., and Tung K., “Intrusion Detection System: A Comprehensive Review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 16-24, 2013.
[16] Kaliappan J., Revathi T., and Karpagam S., “Intrusion Detection using Artificial Neural Networks with Best Set of Features,” The International Arab Journal of Information Technology, vol. 12, no. 6A, pp. 728-734, 2015.
[17] Kanagalakshmi R. and Naveenantony V., “Network Intrusion Detection Using Hidden Naive Bayes Multiclass Classifier Model,” International Journal of Science, Technology and Management, vol. 3, no. 12, pp. 76-84, 2014.
[18] Kim J., Kim J., Thu H., and Kim H., “Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection,” in Proceedings of International Conference on Platform Technology and Service, Jeju, pp. 1-5, 2016.
[19] Liao H., Lin C., Lin Y., and Tung K., “Intrusion Detection System: A Comprehensive Review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 16-24, 2013.
[20] Modi U. and Jain A., “A Survey of IDS Classification Using KDD CUP 99 Dataset in WEKA,” International Journal of Scientific and Engineering Research, vol. 6, no. 11, pp. 947- 954, 2015.
[21] Mukherjeea S. and Sharmaa N., “Intrusion Detection using Naive Bayes Classifier with Feature Reduction,” Procedia Technology, vol. 4, pp. 119-128, 2012.
[22] Niyaz Q., Sun W., Javaid A., and Alam M., “A Deep Learning Approach for Network Intrusion Detection System,” in Proceedings of the 9th International Conference on Bio-inspired Information and Communications Technologies, pp. 21-26, 2016.
[23] Niyaz Q., Sun W., and Javaid A., “A Deep Learning Based DDoS Detection in System Software-Defined Networking,” EAI Endorsed Transactions, vol. 4, no. 12, pp. 1-12, 2016.
[24] Noureldien N. and Yousif I., “Accuracy of Machine Learning Algorithms in Detecting Dos Attacks Types,” Science and Technology, vol. 6, no. 4, pp. 89-92, 2016.
[25] Putchala M., “Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU),” PhD Dissertation, Wright State University, 2017. 224 The International Arab Journal of Information Technology, Vol. 17, No. 2, March 2020
[26] Rathore M., Ahmad A., and Paul A., “Real Time Intrusion Detection System for Ultra-High-Speed Big Data Environments,” The Journal of Supercomputing, vol. 72, no. 9, pp. 3489-3510, 2016.
[27] Sujendran R. and Arunachalam M., “Design and Development of Suginer Filter for Intrusion Detection Using Real Time Network Data,” The International Arab Journal of Information Technology, vol. 15, no. 4, pp. 633-638, 2015.
[28] Tahir H., Said A., Osman N., Zakaria N., Sabri P., and Katuk N., “Oving K-Means Clustering Using Discretization Technique in Network Intrusion Detection System,” in Proceedings of 3rd International Conference on Computer and Information Sciences, Kuala Lumpur, pp. 248- 252, 2016.
[29] Tang T., Mhamdi L., McLernon D., Zaidi S., and Ghogho M., “Deep Learning Approach for Network Intrusion Detection in Software Defined Networking,” in Proceedings of International Conference on Wireless Networks and Mobile Communications, Fez, pp. 258-263, 2016.
[30] Tavallaee M., Bagheri E., Lu W., and Ghorbani A., “A Detailed Analysis of The KDD CUP 99 Data Set,” in Proceedings of IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, pp. 1-6, 2009.
[31] Wutyi K. and Thwin M., “Heuristic Rules for Attack Detection Charged by NSL KDD Dataset,” in Proceedings of Genetic and Evolutionary Computing, Yangon, vol. 1, pp. 137-153, 2015. Mohammed Tabash is a holds a BSc degree in Computer Science from Al-Quds Open University (2002), studying Master of Information Systems at the faculty of computers and informatics Suez Canal University (2014). His research interests: data mining, machine learning, network security and information systems. Mohamed Abd Allah is a lecturer at the Department of information systems and decision support Faculty of Computer Science & informatics Suez Canal University. He received his First degree in Computer Science and Operation Research, Faculty of Science, Master degree in Expert systems, Faculty of Science Cairo university. And his PhD degree in computer science, Faculty of Science, Zagazig University. His research interests: Machine learning, data mining, intelligent Bioinformatics, metaheuristic optimization, and predictive models. Bella Tawfik received his B.Sc. in Electrical engineering from Military Technical Collage, Cairo, Egypt in 1986. He received his M. Sc. in Computer Engineering from the Military Technical Collage, Cairo in 1991. He received his Ph.D. in Electrical Engineering from Colorado State University in August 1999. He got his Post Doctor in Computer Engineering from Colorado State University in October 2006. He is currently assistance professor in Faculty of Computers and Informatics, Suez Canal University, Ismailia, Egypt. His current research interests are Networks, Modeling, simulation, and Image Processing.
