Enhancing Multiclass Network Intrusion Detection Systems Using Continuous Wavelet Transform on Network Traffic
DOI:
https://doi.org/10.56294/dm2025474Keywords:
Machine learning, Deep Learning, Intrusion detection system, Cyberattacks, Continuous Wavelet TransformAbstract
Network systems are susceptible to cyberattacks, which motivates attackers to exploit their vulnerabilities. Scanning network traffic to identify malicious activity is becoming a trend in the cybersecurity domain to mitigate the negative effects of intruders. Network intrusion detection systems (NIDS) are widely recognized as essential tools against cyberattacks. However, there is a need to go beyond designing traditional NIDS, which are preferred to be used with binary classification, towards designing multiclass network intrusion detection systems (MNIDS) to predict the cyberattack category. This, indeed, assists in understanding cyberattack behavior, which mitigates their effects quickly. Machine learning models, including conventional and deep learning, have been widely employed in the design of MNIDS. However, MNIDS based on machine learning can face challenges in predicting the category of cyberattack, especially with complex data that has a large number of categories. Thus, this paper proposes an enhanced MNIDS by exploiting the power of integrating continuous wavelet transform (CWT) with machine learning models to increase the accuracy of predicting cyberattacks in network traffic. This is due to the fact that CWT is considered as an effective method for feature extraction. The experimental results emphasize that using CWT with machine learning models improves the classification performance of MNIDS by up to 3.36% in overall accuracy. Additionally, it enhances the F1-score value in up to 40% of the total classes using the proposed model.
References
1. Ahmed SF, Alam MdS Bin, Afrin S, Rafa SJ, Taher SB, Kabir M, et al. Toward a Secure 5G-Enabled Internet of Things: A Survey on Requirements, Privacy, Security, Challenges, and Opportunities. IEEE Access. 2024;12:13125–45.
2. Chettri L, Bera R. A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems. IEEE Internet Things J. 2020 Jan;7(1):16–32.
3. Tran T, Navratil D, Sanders P, Hart J, Odarchenko R, Barjau C, et al. Enabling Multicast and Broadcast in the 5G Core for Converged Fixed and Mobile Networks. IEEE Transactions on Broadcasting. 2020 Jun;66(2):428–39.
4. Kumar N, Khanna R. A compact multi‐band multi‐input multi‐output antenna for 4G/5G and IoT devices using theory of characteristic modes. International Journal of RF and Microwave Computer-Aided Engineering. 2020 Jan 21;30(1).
5. Asad M, Basit A, Qaisar S, Ali M. Beyond 5G: Hybrid End-to-End Quality of Service Provisioning in Heterogeneous IoT Networks. IEEE Access. 2020;8:192320–38.
6. Dhasarathan V, Singh M, Malhotra J. Development of high-speed FSO transmission link for the implementation of 5G and Internet of Things. Wireless Networks. 2020 May 15;26(4):2403–12.
7. Liyakat KKS. Machine Learning Approach Using Artificial Neural Networks to Detect Malicious Nodes in IoT Networks. In 2024. p. 123–34.
8. Aslan Ö, Aktuğ SS, Ozkan-Okay M, Yilmaz AA, Akin E. A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics (Basel). 2023 Mar 11;12(6):1333.
9. Chakraborty A, Biswas A, Khan AK. Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation. 2022 Sep 27;
10. Bringhenti D, Marchetto G, Sisto R, Valenza F. Automation for Network Security Configuration: State of the Art and Research Trends. ACM Comput Surv. 2024 Mar 31;56(3):1–37.
11. National Institute of Standards and Technology. Intrusion Detection System [Internet]. 2024 [cited 2024 May 18]. Available from: https://csrc.nist.gov/glossary/term/intrusion_detection_system
12. NIST. https://csrc.nist.gov/glossary/term/intrusion_detection_system. 2022. Committee on National Security Systems (CNSS) Glossary.
13. Kumar S, Gupta S, Arora S. Research Trends in Network-Based Intrusion Detection Systems: A Review. IEEE Access. 2021;9:157761–79.
14. Satilmiş H, Akleylek S, Tok ZY. A Systematic Literature Review on Host-Based Intrusion Detection Systems. IEEE Access. 2024;12:27237–66.
15. Liu H, Lang B. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Applied Sciences. 2019 Oct 17;9(20):4396.
16. Düzgün B, Çayır A, Ünal U, Dağ H. Network intrusion detection system by learning jointly from tabular and text‐based features. Expert Syst. 2024 Apr 12;41(4).
17. Azam Z, Islam MdM, Huda MN. Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree. IEEE Access. 2023;11:80348–91.
18. Dini P, Elhanashi A, Begni A, Saponara S, Zheng Q, Gasmi K. Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity. Applied Sciences. 2023 Jun 25;13(13):7507.
19. Ghosh P, Azam S, Jonkman M, Karim A, Shamrat FMJM, Ignatious E, et al. Efficient Prediction of Cardiovascular Disease Using Machine Learning Algorithms With Relief and LASSO Feature Selection Techniques. IEEE Access. 2021;9:19304–26.
20. Khaire UM, Dhanalakshmi R. Stability of feature selection algorithm: A review. Journal of King Saud University - Computer and Information Sciences. 2022 Apr;34(4):1060–73.
21. Li T, Kou G, Peng Y. Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods. Inf Syst. 2020 Jul;91:101494.
22. Acharya T, Khatri I, Annamalai A, Chouikha MF. Efficacy of Machine Learning-Based Classifiers for Binary and Multi-Class Network Intrusion Detection. In: 2021 IEEE International Conference on Automatic Control & Intelligent Systems (I2CACIS). IEEE; 2021. p. 402–7.
23. Tomlinson A, Bryans J, Shaikh SA, Kalutarage HK. Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE; 2018. p. 231–8.
24. Halder S, Conti M, Das SK. COIDS. In: Proceedings of the 21st International Conference on Distributed Computing and Networking. New York, NY, USA: ACM; 2020. p. 1–10.
25. He T, Zhang L, Kong F, Salekin A. Exploring Inherent Sensor Redundancy for Automotive Anomaly Detection. In: 2020 57th ACM/IEEE Design Automation Conference (DAC). IEEE; 2020. p. 1–6.
26. Liu W, Xiong L, Xia X, Lu Y, Gao L, Song S. Vision‐aided intelligent vehicle sideslip angle estimation based on a dynamic model. IET Intelligent Transport Systems. 2020 Oct 20;14(10):1183–9.
27. Xiong L, Xia X, Lu Y, Liu W, Gao L, Song S, et al. IMU-Based Automated Vehicle Body Sideslip Angle and Attitude Estimation Aided by GNSS Using Parallel Adaptive Kalman Filters. IEEE Trans Veh Technol. 2020 Oct;69(10):10668–80.
28. Liu W, Xia X, Xiong L, Lu Y, Gao L, Yu Z. Automated Vehicle Sideslip Angle Estimation Considering Signal Measurement Characteristic. IEEE Sens J. 2021 Oct 1;21(19):21675–87.
29. Xu H, Przystupa K, Fang C, Marciniak A, Kochan O, Beshley M. A Combination Strategy of Feature Selection Based on an Integrated Optimization Algorithm and Weighted K-Nearest Neighbor to Improve the Performance of Network Intrusion Detection. Electronics (Basel). 2020 Jul 27;9(8):1206.
30. Alqahtani H, Sarker IH, Kalim A, Minhaz Hossain SMd, Ikhlaq S, Hossain S. Cyber Intrusion Detection Using Machine Learning Classification Techniques. In 2020. p. 121–31.
31. Song J, Zhao W, Liu Q, Wang X. Hybrid feature selection for supporting lightweight intrusion detection systems. J Phys Conf Ser. 2017 Aug;887:012031.
32. Biney G, Okyere GA, Alhassan A. Adaptive Scheme for ANOVA Models. Journal of Advances in Mathematics and Computer Science. 2020 Jun 20;12–23.
33. Khan MA, Kim J. Toward Developing Efficient Conv-AE-Based Intrusion Detection System Using Heterogeneous Dataset. Electronics (Basel). 2020 Oct 26;9(11):1771.
34. Siddiqi MA, Pak W. Optimizing Filter-Based Feature Selection Method Flow for Intrusion Detection System. Electronics (Basel). 2020 Dec 10;9(12):2114.
35. Kim A, Park M, Lee DH. AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection. IEEE Access. 2020;8:70245–61.
36. Girdler T, Vassilakis VG. Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses. Computers & Electrical Engineering. 2021 Mar;90:106990.
37. Imran, Jamil F, Kim D. An Ensemble of Prediction and Learning Mechanism for Improving Accuracy of Anomaly Detection in Network Intrusion Environments. Sustainability. 2021 Sep 8;13(18):10057.
38. Hossain Z, Rahman Sourov MdM, Khan M, Rahman P. Network Intrusion Detection using Machine Learning Approaches. In: 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE; 2021. p. 438–42.
39. Disha RA, Waheed S. A Comparative study of machine learning models for Network Intrusion Detection System using UNSW-NB 15 dataset. In: 2021 International Conference on Electronics, Communications and Information Technology (ICECIT). IEEE; 2021. p. 1–5.
40. Ghurab M, Gaphari G, Alshami F, Alshamy R, Othman S. A Detailed Analysis of Benchmark Datasets for Network Intrusion Detection System. Asian Journal of Research in Computer Science. 2021 Apr 14;14–33.
41. Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Jhaveri RH, et al. Performance Assessment of Supervised Classifiers for Designing Intrusion Detection Systems: A Comprehensive Review and Recommendations for Future Research. Mathematics. 2021 Mar 23;9(6):690.
42. Sarhan M, Layeghy S, Moustafa N, Portmann M. NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems. In 2021. p. 117–35.
43. Rajesh Kanna P, Santhi P. Unified Deep Learning approach for Efficient Intrusion Detection System using Integrated Spatial–Temporal Features. Knowl Based Syst. 2021 Aug;226:107132.
44. Hassan M, Haque ME, Tozal ME, Raghavan V, Agrawal R. Intrusion Detection Using Payload Embeddings. IEEE Access. 2022;10:4015–30.
45. Ahmad S, Ahmad Z, Kim CH, Kim JM. A Method for Pipeline Leak Detection Based on Acoustic Imaging and Deep Learning. Sensors. 2022 Feb 17;22(4):1562.
46. Xia X, Xiong L, Huang Y, Lu Y, Gao L, Xu N, et al. Estimation on IMU yaw misalignment by fusing information of automotive onboard sensors. Mech Syst Signal Process. 2022 Jan;162:107993.
47. Gao L, Xiong L, Xia X, Lu Y, Yu Z, Khajepour A. Improved Vehicle Localization Using On-Board Sensors and Vehicle Lateral Velocity. IEEE Sens J. 2022 Apr 1;22(7):6818–31.
48. Alsuwian T, Saeed RB, Amin AA. Autonomous Vehicle with Emergency Braking Algorithm Based on Multi-Sensor Fusion and Super Twisting Speed Controller. Applied Sciences. 2022 Aug 24;12(17):8458.
49. Alsuwian T, Usman MH, Amin AA. An Autonomous Vehicle Stability Control Using Active Fault-Tolerant Control Based on a Fuzzy Neural Network. Electronics (Basel). 2022 Oct 1;11(19):3165.
50. Qazi E ul H, Imran M, Haider N, Shoaib M, Razzak I. An intelligent and efficient network intrusion detection system using deep learning. Computers and Electrical Engineering. 2022 Apr;99:107764.
51. Qazi EUH, Almorjan A, Zia T. A One-Dimensional Convolutional Neural Network (1D-CNN) Based Deep Learning System for Network Intrusion Detection. Applied Sciences. 2022 Aug 10;12(16):7986.
52. Ahmad I, Ul Haq QE, Imran M, Alassafi MO, AlGhamdi RA. An Efficient Network Intrusion Detection and Classification System. Mathematics. 2022 Feb 8;10(3):530.
53. Bhati BS, Rai CS. Analysis of Support Vector Machine-based Intrusion Detection Techniques. Arab J Sci Eng. 2020 Apr 2;45(4):2371–83.
54. Ahmed N, Ngadi A bin, Sharif JM, Hussain S, Uddin M, Rathore MS, et al. Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction. Sensors. 2022 Oct 17;22(20):7896.
55. Tufan E, Tezcan C, Acarturk C. Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network. IEEE Access. 2021;9:50078–92.
56. Farrukh YA, Khan I, Wali S, Bierbrauer D, Pavlik JA, Bastian ND. Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets. In: 2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT). IEEE; 2022. p. 58–67.
57. Ho CMK, Yow KC, Zhu Z, Aravamuthan S. Network Intrusion Detection via Flow-to-Image Conversion and Vision Transformer Classification. IEEE Access. 2022;10:97780–93.
58. Albasheer H, Md Siraj M, Mubarakali A, Elsier Tayfour O, Salih S, Hamdan M, et al. Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. Sensors. 2022 Feb 15;22(4):1494.
59. Jiang Z, Zhang K, Xiang L, Yu G, Xu Y. A time-frequency spectral amplitude modulation method and its applications in rolling bearing fault diagnosis. Mech Syst Signal Process. 2023 Feb;185:109832.
60. Xia X, Hashemi E, Xiong L, Khajepour A. Autonomous Vehicle Kinematics and Dynamics Synthesis for Sideslip Angle Estimation Based on Consensus Kalman Filter. IEEE Transactions on Control Systems Technology. 2023 Jan;31(1):179–92.
61. Rizvi S, Scanlon M, McGibney J, Sheppard J. Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments. In 2023. p. 355–67.
62. Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy. SciTePress; 2018. p. 108–16.
63. IDS 2018 Intrusion CSVs (CSE-CIC-IDS2018) [Internet]. [cited 2024 May 10]. Available from: https://www.kaggle.com/datasets/solarmainframe/ids-intrusion-csv
64. Wang T, Lu C, Sun Y, Yang M, Liu C, Ou C. Automatic ECG Classification Using Continuous Wavelet Transform and Convolutional Neural Network. Entropy. 2021 Jan 18;23(1):119.
65. Djaballah S, Meftah K, Khelil K, Sayadi M. Deep Transfer Learning for Bearing Fault Diagnosis using CWT Time–Frequency Images and Convolutional Neural Networks. Journal of Failure Analysis and Prevention. 2023 Jun 21;23(3):1046–58.
66. Boateng EY, Otoo J, Abaye DA. Basic Tenets of Classification Algorithms K-Nearest-Neighbor, Support Vector Machine, Random Forest and Neural Network: A Review. Journal of Data Analysis and Information Processing. 2020;08(04):341–57.
67. Singh Kushwah J, Kumar A, Patel S, Soni R, Gawande A, Gupta S. Comparative study of regressor and classifier with decision tree using modern tools. Mater Today Proc. 2022;56:3571–6.
68. Hemeida AM, Hassan SA, Mohamed AAA, Alkhalaf S, Mahmoud MM, Senjyu T, et al. Nature-inspired algorithms for feed-forward neural network classifiers: A survey of one decade of research. Ain Shams Engineering Journal. 2020 Sep;11(3):659–75.
69. Laghrissi F, Douzi S, Douzi K, Hssina B. Intrusion detection systems using long short-term memory (LSTM). J Big Data. 2021 Dec 7;8(1):65.
70. Zulqarnain M, Ghazali R, Hassim YMM, Aamir M. An Enhanced Gated Recurrent Unit with Auto-Encoder for Solving Text Classification Problems. Arab J Sci Eng. 2021 Sep 22;46(9):8953–67.
71. MathWorks. Continuous 1-D wavelet transform [Internet]. [cited 2024 May 14]. Available from: https://www.mathworks.com/help/wavelet/ref/cwt.html
72. Alsemmeari RA, Dahab MY, Alsulami AA, Alturki B, Algarni S. Resilient Security Framework Using TNN and Blockchain for IoMT. Electronics (Basel). 2023 May 15;12(10):2252.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Abdulaziz A. Alsulami, Badraddin Alturki (Author)
This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.