A CNN-Based Network Profiling System for Intrusion Detection: Addressing Evolving Cyber Threats

Authors

  • Ibukun Eweoya Babcock University
  • Olufemi A. Folorunso Computer Science Department, Elizade University, Nigeria
  • Tolulope A. Awoniyi Department of Software Engineering, Babcock University, Nigeria
  • Taiwo Adigun University of Lay Adventist of Kigali, Rwanda, East-Central Africa
  • Yaw Mensah Department of Software Engineering, Babcock University, Nigeria
  • Abimbola O. Ojenike Bimson Technologies. Lagos, Nigeria
  • Asa Mensah Department of Information Technology, Valley View University, Ghana

DOI:

https://doi.org/10.70112/ajcst-2025.14.1.4332

Keywords:

Intrusion Detection, Convolutional Neural Network (CNN), Network Profiling, Cyber Threats, Anomalous Traffic Detection

Abstract

Intrusion detection is a critical aspect of securing computer networks against unauthorized access and malicious activities. Traditional intrusion detection systems (IDS) are typically signature-based, which limits their ability to withstand evolving cyber threats. To address these limitations, this study proposes a novel approach: a Convolutional Neural Network (CNN)-based network profiling system for intrusion detection. The primary aim of this study is to design and develop a CNN-based network profiling system that enhances the accuracy and effectiveness of identifying and mitigating cyber threats in computer networks. The proposed system leverages a CNN architecture to extract high-level features from network packets, capturing intricate spatial dependencies within the data. This approach enables the network profiling system to efficiently distinguish between normal and anomalous traffic, making it highly adaptive to new and previously unseen attack vectors. Data was collected from diverse network environments, encompassing legitimate network behavior and various intrusion scenarios. The collected data was pre-processed and converted into suitable input representations for the CNN model. The network profiling system was subsequently trained on a large-scale dataset to enable it to learn complex patterns and anomalies present in network traffic. The evaluation was conducted through extensive experimentation using benchmark datasets and real-world traffic traces. A comparative analysis with traditional IDS methods demonstrates the superiority of the CNN-based approach in terms of accuracy, efficiency, and adaptability. This work highlights the scalability of the proposed system, ensuring its applicability to large-scale enterprise networks.

References

[1] K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (IDPS),” National Institute of Standards and Technology, Special Publication 800-94, 2007.

[2] D. E. Denning, “An intrusion detection model,” IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222-232, 2017.

[3] S. Axelsson, “Intrusion detection systems: A survey and taxonomy,” Chalmers University of Technology, Department of Computer Engineering, Technical Report 99-3, 2019.

[4] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “Intrusion detection in 21st century: A state-of-the-art review,” J. Netw. Comput. Appl., vol. 60, pp. 1-18, 2020.

[5] S. P. Borgatti, M. G. Everett, and J. C. Johnson, Analyzing social networks, 2nd ed. SAGE Publications, 2018.

[6] S. Kim, H. Park, and J. Lee, “Deep learning approach to detect DDoS attacks using convolutional neural networks,” J. Inf. Process. Syst., vol. 14, no. 4, pp. 976-988, 2018, doi: 10.3745/JIPS.03.0091.

[7] S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: Towards real-time object detection with region proposal networks,” in Advances in Neural Information Processing Systems, Neural Information Processing Systems Foundation, 2019, pp. 91-99.

[8] A. Suleiman and R. Mayrhofer, “Deep learning-based intrusion detection systems: A comprehensive survey,” J. Big Data, vol. 5,

no. 1, Article 11, 2018, doi: 10.1186/s40537-018-0133-6.

[9] M. Girvan and M. E. J. Newman, “Community structure in social and biological networks,” Proc. Natl. Acad. Sci., vol. 99, no.12, pp.7821-7826, 2002.

[10] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature,vol. 521, no. 7553, pp. 436-444, 2017.

[11] P. Casas, P. Garrido, and P. A. Bartolomé, “A survey of intrusion detection systems based on machine learning: State-of-the-art and challenges,” IEEE Commun. Surv. Tutor., vol. 22, no. 3, pp. 1-18, 2020.

[12] W. Li, Y. Zhang, and K. Wang, “CNN-based deep learning for industrial control system intrusion detection,” in Proc. IEEE Int. Conf. Industrial Cyber-Physical Systems (ICPS), 2019, pp. 382-387, doi: 10.1109/ICPHYS.2019.8780344.

[13] T. H. Nguyen, C. Lim, and S. Yu, “A hybrid CNN-based intrusion detection system for network security,” in Proc. Int. Conf. Electronics, Information, and Communication (ICEIC),2021, pp.1-4, doi: 10.1109/ICEIC51230.2021.9360025.

[14] M. Alrawashdeh, C. Purdy, and M. Al-Hasan, “Anomaly-based intrusion detection with deep learning,” IEEE Access, vol.7, pp. 15871-15882, 2019, doi: 10.1109/ACCESS.2019.2894663.

[15] R. Santos, J. Souza, and E. Moreno, “Convolutional neural networks for network intrusion detection: An application of scalable machine learning for IDS,” in Proc. IEEE Symp. Computers and Communications (ISCC), 2017, pp. 511-516, doi: 10.1109/ISCC.2017. 8024636.

[16] O. Alhussein, F. Reza Zare-Mirakabad, and S. Singh, “Deep packet: A novel approach for encrypted traffic classification using convolutional neural networks,” Comput. Secur., vol. 92, Article 101704, 2020, doi: 10.1016/j.cose.2020.101704.

[17] I. A. Solomon, A. Jatain, and S. B. Bajaj, “Intrusion Detection System Using Deep Learning,” Asian J. Comput. Sci. Technol., vol. 8, no. 2, pp. 105–110, 2019, doi: 10.51983/ajcst-2019.8.2.2132.

[18] U.-J. Nzenwata, A. G. Abiodun, A. Olayinka, O. J. Adeniyi, and A. B. Gazie, “Parkinson’s Disease Prediction Using Convolutional Neural Networks and Hand-Drawn Image Analysis,” Asian J. Comput. Sci. Technol., vol. 13, no. 2, pp. 1–13, 2024, doi: 10.70112/ajcst-2024.13.2. 4270.

[19] T. Deep Singh and R. Bharti, “Detection and Classification of Plant Diseases in Crops (Solanum lycopersicum) due to Pests Using Deep Learning Techniques: A Review,” Asian J. Comput. Sci. Technol., vol. 12, no. 2, pp. 39–47, 2023, doi: 10.51983/ajcst-2023.12.2.3735.

[20] G. C. Jyothi, C. Prakash, G. A. Babitha, and G. H. Kiran Kumar, “Comparison Analysis of CNN, SVC and Random Forest Algorithms in Segmentation of Teeth X-Ray Images,” Asian J. Comput. Sci. Technol., vol. 11, no. 1, pp. 40–47, 2022, doi: 10.51983/ajcst-2022.11.1.3283.

[21] B. K. Kiranashree, V. Ambika, and A. D. Radhika, “Analysis on Machine Learning Techniques for Stress Detection among Employees,” Asian J. Comput. Sci. Technol., vol. 10, no. 1, pp. 35–37, 2021, doi: 10.51983/ajcst-2021.10.1.2698.

Downloads

Published

05-03-2025

How to Cite

Eweoya, I., A. Folorunso, O., A. Awoniyi, T., Adigun, T., Mensah, Y., O. Ojenike, A., & Mensah, A. (2025). A CNN-Based Network Profiling System for Intrusion Detection: Addressing Evolving Cyber Threats. Asian Journal of Computer Science and Technology , 14(1), 20–27. https://doi.org/10.70112/ajcst-2025.14.1.4332

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)