A Review of Deep Belief Networks in Intrusion Detection Systems: Applications, Optimization Techniques, and Dataset Utilization
Keywords:
Deep Belief Networks (DBN), Intrusion Detection Systems (IDS), Cybersecurity, Optimization Techniques, Benchmark Datasets
Abstract
As reliance on the Internet and interconnected systems for essential services continues to grow, the need for strong cybersecurity defenses has become more pressing. Intrusion Detection Systems (IDS) are crucial in safeguarding these digital infrastructures. This paper investigates how Deep Belief Networks (DBNs) can enhance IDS capabilities, particularly in identifying advanced and dynamic threats such as Distributed Denial of Service (DDoS) attacks, SQL injections, and zero-day vulnerabilities. By reviewing recent research, we explore how DBNs have been applied in IDS contexts, examine optimization methods like layer-wise pre-training and dropout regularization that contribute to better detection performance, and evaluate commonly used benchmark datasets including UNSW-NB15, NSL-KDD, and CSE-CIC-IDS2018. This study compiles empirical evidence to assess DBNs' performance across varied network conditions and traffic types. Findings suggest that DBNs are effective in learning complex data patterns and improving the detection of anomalies. Nonetheless, challenges such as interpretability, high computational requirements, and the limitations of existing datasets continue to hinder widespread adoption. This work adds to the ongoing cybersecurity discourse by outlining major developments, constraints, and future directions for DBN-powered IDS. It ends by proposing strategic improvements, including the development of more efficient models, broader dataset coverage, and real-time, adaptive integration to support smarter and more responsive IDS solutions.
Downloads
References
Abdulhammed, R., Faezipour, M., Musa, S., Anuar, N. B., & Mostafa, S. A. (2019). A survey on deep learning techniques for network intrusion detection systems. Electronics, 8(10), 1213. https://doi.org/10.3390/electronics8101213
Agrawal, A., Singh, R., Khari, M., Shanmuganathan, V., & Lim, S. (2022). Autoencoder for Design of Mitigation Model for DDOS Attacks via M-DBNN. Wireless Communications and Mobile Computing, 2022, 1–14. https://doi.org/10.1155/2022/9855022
Asghar, M. Z., Abbas, M., Zeeshan, K., Kotilainen, P., & Hämäläinen, T. (2019). Assessment of deep learning methodology for self-organizing 5G networks. Applied Sciences (Switzerland), 9(15). https://doi.org/10.3390/app9152975
Ashiku, L., & Dagli, C. (2021). Network Intrusion Detection System using Deep Learning. Procedia Computer Science, 185, 239–247. https://doi.org/10.1016/j.procs.2021.05.025
Assiri, F. Y., & Ragab, M. (2023). Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment. Mathematics, 11(19). https://doi.org/10.3390/math11194080
Bay, S. D., Kibler, D., Pazzani, M. J., & Smyth, P. (2000). The UCI KDD Archive of Large Data Sets for Data Mining Research and Experimentation*.
Coli, G. O., Aina, S., Okegbile, S. D., Lawal, A. R., & Oluwaranti, A. I. (2022). DDoS Attacks Detection in the IoT Using Deep Gaussian-Bernoulli Restricted Boltzmann Machine. Modern Applied Science, 16(2), 12. https://doi.org/10.5539/mas.v16n2p12
Dai, X., Cheng, J., Gao, Y., Guo, S., Yang, X., Xu, X., & Cen, Y. (2020). Deep Belief Network for Feature Extraction of Urban Artificial Targets. Mathematical Problems in Engineering. https://doi.org/10.1155/2020/2387823
Dennis, J. B., & Priya, M. S. (2021). Deep belief network and support vector machine fusion for distributed denial of service and economical denial of service attack detection in cloud. Concurrency and Computation: Practice and Experience, 33(1), e6543. https://doi.org/10.1002/cpe.6543
Dilipkumar, S., & Durairaj, M. (2023). Epilson Swarm Optimized Cluster Gradient and deep belief classifier for multi-attack intrusion detection in MANET. Journal of Ambient Intelligence and Humanized Computing, 14(3). https://doi.org/10.1007/s12652-021-03169-x
Du, J., Yang, K., Hu, Y., & Jiang, L. (2023). NIDS-CNNLSTM: Network Intrusion Detection Classification Model Based on Deep Learning. IEEE Access, 11, 24808–24821. https://doi.org/10.1109/ACCESS.2023.3254915
Elmasry, W., Akbulut, A., & Zaim, A. H. (2020). Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks, 168. https://doi.org/10.1016/j.comnet.2019.107042
Hanafi, A. S., Saheed, Y. K., & Arowolo, M. O. (2023). An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory. International Journal of Interactive Mobile Technologies, 17(19). https://doi.org/10.3991/ijim.v17i19.27663
Hwang, R. H., Peng, M. C., Nguyen, V. L., & Chang, Y. L. (2019). An LSTM-based deep learning approach for classifying malicious traffic at the packet level. Applied Sciences (Switzerland), 9(16). https://doi.org/10.3390/app9163414
Khan, M. A., Karim, M. R., & Kim, Y. (2019). A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry, 11(4). https://doi.org/10.3390/sym11040583
Kim, J., Shim, M., Hong, S., Shin, Y., & Choi, E. (2020). Intelligent detection of iot botnets using machine learning and deep learning. Applied Sciences (Switzerland), 10(19). https://doi.org/10.3390/app10197009
Lashkari, A. H., Draper Gil, G., Mamun, M. A., & Ghorbani, A. A. (2017). Characterization of Tor Traffic Using Time Based Features. Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP), 253–262. https://doi.org/10.5220/0006105602530262
Malik, R., Singh, Y., Sheikh, Z. A., Anand, P., Singh, P. K., & Workneh, T. C. (2022). An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems. Journal of Advanced Transportation, 2022. https://doi.org/10.1155/2022/7892130
Maseer, Z. K., Yusof, R., Al-Bander, B., Saif, A., & Kadhim, Q. K. (2024). Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges.
Moustafa, N., & Slay, J. (2015). UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set). 2015 Military Communications and Information Systems Conference (MilCIS), 1–6. https://doi.org/10.1109/MILCIS.2015.7348942
Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the Feasibility of Deep Learning in Sensor Network Intrusion Detection. IEEE Networking Letters, 1(2), 68–71. https://doi.org/10.1109/lnet.2019.2901792
Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., Shamseer, L., Tetzlaff, J. M., Akl, E. A., Brennan, S. E., Chou, R., Glanville, J., Grimshaw, J. M., Hróbjartsson, A., Lalu, M. M., Li, T., Loder, E. W., Mayo-Wilson, E., McDonald, S., & Moher, D. (2021). The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Systematic Reviews, 10(1). https://doi.org/10.1186/s13643-021-01626-4
Rajarao, B., & Sreenivasulu, M. (2023). A Hybridized- Logistic Regression and Deep Learning-based Approaches for Precise Anomaly Detection in Cloud. International Journal on Recent and Innovation Trends in Computing and Communication, 11, 378–385. https://doi.org/10.17762/ijritcc.v11i9s.7433
Sajith, P. J., & Nagarajan, G. (2022). Intrusion Detection System Using Deep Belief Network & Particle Swarm Optimization. Wireless Personal Communications, 125(2). https://doi.org/10.1007/s11277-022-09609-x
Samsu Aliar, A. A., Agoramoorthy, M., & Y, J. (2024). An Automated Detection of DDoS Attack in Cloud Using Optimized Weighted Fused Features and Hybrid DBN-GRU Architecture. Cybernetics and Systems, 55(7). https://doi.org/10.1080/01969722.2022.2157603
Sathya, M., Jeyaselvi, M., Krishnasamy, L., Hazzazi, M. M., Shukla, P. K., Shukla, P. K., & Nuagah, S. J. (2021). A Novel, Efficient, and Secure Anomaly Detection Technique Using DWU-ODBN for IoT-Enabled Multimedia Communication Systems. Wireless Communications and Mobile Computing, 2021. https://doi.org/10.1155/2021/4989410
Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), 108–116. https://doi.org/10.5220/0006639801080116
Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., & Nakao, K. (2011). Statistical Analysis of Honeypot Data and Building of Kyoto 2006+ Dataset for NIDS Evaluation.
Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the internet of things. Sensors (Switzerland), 19(9). https://doi.org/10.3390/s19091977
Velliangiri, S., & Pandey, H. M. (2020). Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms. Future Generation Computer Systems, 110, 80–90. https://doi.org/10.1016/j.future.2020.03.049
Vitalkar, R., Thorat, S., Rojatkar, D., Vitalkar, R. S., & Rojatkar, D. V. (2023). Intrusion Detection for Vehicular Ad-Hoc Network Based on Deep Learning.
Wang, Z., Zeng, Y., Liu, Y., & Li, D. (2021). Deep Belief Network Integrating Improved Kernel-Based Extreme Learning Machine for Network Intrusion Detection. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3051074
Wei, P., Li, Y., Zhang, Z., Hu, T., Li, Z., & Liu, D. (2019). An optimization method for intrusion detection classification model based on deep belief network. IEEE Access, 7. https://doi.org/10.1109/ACCESS.2019.2925828
Yang, Y., Zheng, K., Wu, C., & Yang, Y. (2019). Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network. Sensors (Switzerland), 19(11). https://doi.org/10.3390/s19112528
Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access, 5, 21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418
Zhang, Y., Li, P., & Wang, X. (2019). Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network. IEEE Access, 7, 31711–31722. https://doi.org/10.1109/ACCESS.2019.2903723
Published
How to Cite
Issue
Section
Copyright (c) 2025 Sule Aishat A., Alhassan John K., Ismaila Idris, Alabi Isiaq O., Subairu Sikiru O.

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.