{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:25:37Z","timestamp":1767907537141,"version":"3.49.0"},"reference-count":50,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Department of Computer Science of Sapienza University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of networks has been rapidly increasing and network intrusions have become more frequent and less detectable. The increase in complexity pushed researchers to boost NIDS effectiveness by introducing machine learning (ML) and deep learning (DL) techniques. However, even with the addition of ML and DL, some issues still need to be addressed: high false negative rates and low attack predictability for minority classes. Aim of the study was to address these problems that have not been adequately addressed in the literature. Firstly, we have built a deep learning model for network intrusion detection that would be able to perform both binary and multiclass classification of network traffic. The goal of this base model was to achieve at least the same, if not better, performance than the models observed in the state-of-the-art research. Then, we proposed an effective refinement strategy and generated several models for lowering the FNR and increasing the predictability for the minority classes. The obtained results proved that using the proper parameters is possible to achieve a satisfying trade-off between FNR, accuracy, and detection of the minority classes.<\/jats:p>","DOI":"10.3390\/a15080258","type":"journal-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T22:03:42Z","timestamp":1658873022000},"page":"258","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1418-3613","authenticated-orcid":false,"given":"Jovana","family":"Mijalkovic","sequence":"first","affiliation":[{"name":"Department of Computer Science, Sapienza University, 00198 Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6935-0701","authenticated-orcid":false,"given":"Angelo","family":"Spognardi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sapienza University, 00198 Rome, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Liu, H., and Lang, B. (2019). Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Appl. Sci., 9.","DOI":"10.3390\/app9204396"},{"key":"ref_2","unstructured":"Goeschel, K. (April, January 30). Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis. Proceedings of the SoutheastCon, Norfolk, VA, USA."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Azeroual, O., and Nikiforova, A. (2022). Apache Spark and MLlib-Based Intrusion Detection System or How the Big Data Technologies Can Secure the Data. Information, 13.","DOI":"10.3390\/info13020058"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"147","DOI":"10.19101\/IJATEE.2020.762057","article-title":"A systematic review of the machine learning algorithms for the computational analysis in different domains","volume":"7","author":"Chahar","year":"2020","journal-title":"Int. J. Adv. Technol. Eng. Explor. (IJATEE)"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"TRansactions Emerg. Telecommun. Technol."},{"key":"ref_6","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., and Atkinson, R. (2017). Shallow and deep networks intrusion detection system: A taxonomy and survey. arXiv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1186\/s40537-020-00346-1","article-title":"Anomaly detection optimization using big data and deep learning to reduce false-positive","volume":"7","author":"Aljnidi","year":"2020","journal-title":"J. Big Data"},{"key":"ref_8","first-page":"67","article-title":"Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System","volume":"11","author":"Vijayakumar","year":"2018","journal-title":"Comput. Inf. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A. (2009, January 8\u201310). A Detailed Analysis of the KDD CUP 99 Data Set. Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), Ottawa, ON, Canada.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rao, U.H., and Nayak, U. (2014). Intrusion Detection and Prevention Systems. The InfoSec Handbook, Apress.","DOI":"10.1007\/978-1-4302-6383-8"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","article-title":"Intrusion detection system: A comprehensive review","volume":"36","author":"Liao","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","article-title":"Anomaly-based network intrusion detection: Techniques, systems and challenges","volume":"28","year":"2009","journal-title":"Comput. Secur."},{"key":"ref_15","unstructured":"(2022, June 12). What Is Machine Learning?. Available online: https:\/\/www.ibm.com\/cloud\/learn\/machine-learning."},{"key":"ref_16","unstructured":"Bishop, C.M., and Nasrabadi, N.M. (2006). Pattern Recognition and Machine Learning, Springer."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-021-00444-8","article-title":"Review of deep learning: Concepts, CNN architectures, challenges, applications, future directions","volume":"8","author":"Alzubaidi","year":"2021","journal-title":"J. Big Data"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00815-1","article-title":"Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A Deep Learning Approach to Network Intrusion Detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"9731","DOI":"10.1007\/s00500-021-05893-0","article-title":"Machine learning and deep learning methods for intrusion detection systems: Recent developments and challenges","volume":"25","author":"Kocher","year":"2021","journal-title":"Soft Comput."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Alzaqebah, A., Aljarah, I., Al-Kadi, O., and Dama\u0161evi\u010dius, R. (2022). A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System. Mathematics, 10.","DOI":"10.3390\/math10060999"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ali, M.H., Jaber, M.M., Abd, S.K., Rehman, A., Awan, M.J., Dama\u0161evi\u010dius, R., and Bahaj, S.A. (2022). Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT). Electronics, 11.","DOI":"10.3390\/electronics11030494"},{"key":"ref_23","first-page":"1130","article-title":"Cost-based modeling for fraud and intrusion detection: Results from the jam project","volume":"2","author":"Stolfo","year":"2000","journal-title":"DISCEX"},{"key":"ref_24","first-page":"1848","article-title":"A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection","volume":"2","author":"Revathi","year":"2013","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref_25","unstructured":"(2022, June 04). NSL-KDD | Datasets | Research | Canadian Institute for Cybersecurity | UNB. Available online: https:\/\/www.unb.ca\/cic\/datasets\/nsl.html."},{"key":"ref_26","unstructured":"Saporito, G. (2022, June 06). A Deeper Dive into the NSL-KDD Data Set. Available online: https:\/\/towardsdatascience.com\/a-deeper-dive-into-the-nsl-kdd-data-set-15c753364657."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1049\/iet-ifs.2018.5258","article-title":"Network intrusion detection algorithm based on deep neural network","volume":"13","author":"Jia","year":"2019","journal-title":"IET Inf. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep Learning Approach for Intelligent Intrusion Detection System","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Potluri, S., and Diedrich, C. (2016, January 6\u20139). Accelerated deep neural networks for enhanced Intrusion Detection System. Proceedings of the 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, Germany.","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"38597","DOI":"10.1109\/ACCESS.2019.2905633","article-title":"A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System","volume":"7","author":"Kasongo","year":"2019","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Fu, Y., Du, Y., Cao, Z., Li, Q., and Xiang, W. (2022). A Deep Learning Model for Network Intrusion Detection with Imbalanced Data. Electronics, 11.","DOI":"10.3390\/electronics11060898"},{"key":"ref_33","first-page":"443","article-title":"UNSW-NB15 Dataset Feature Selection and Network Intrusion Detection using Deep Learning","volume":"7","author":"Kanimozhi","year":"2019","journal-title":"Int. J. Recent Technol. Eng."},{"key":"ref_34","first-page":"1","article-title":"Intrusion Detection System Using Convolutional Neural Network on UNSW NB15 Dataset","volume":"40","author":"Mahalakshmi","year":"2021","journal-title":"Adv. Parallel Comput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Al-Zewairi, M., Almajali, S., and Awajan, A. (2017, January 11\u201313). Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System. Proceedings of the 2017 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan.","DOI":"10.1109\/ICTCS.2017.29"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., and Abuzneid, A. (2019). Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection. Electronics, 8.","DOI":"10.3390\/electronics8030322"},{"key":"ref_37","unstructured":"Doshi, S. (2021, December 08). Various Optimization Algorithms For Training Neural Network. Available online: https:\/\/towardsdatascience.com\/optimizers-for-training-neural-network-59450d71caf6."},{"key":"ref_38","unstructured":"Brownlee, J. (2021, December 07). Understand the Impact of Learning Rate on Neural Network Performance. Available online: https:\/\/machinelearningmastery.com\/understand-the-dynamics-of-learning-rate-on-deep-learning-neural-networks\/."},{"key":"ref_39","unstructured":"McGonagle, J., Shaikouski, G., Williams, C., Hsu, A., Khim, J., and Miller, A. (2021, December 16). Backpropagation. Available online: https:\/\/brilliant.org\/wiki\/backpropagation\/."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2015). Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification. arXiv.","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref_41","unstructured":"Wood, T. (2021, December 18). Softmax Function. Available online: https:\/\/deepai.org\/machine-learning-glossary-and-terms\/softmax-layer."},{"key":"ref_42","unstructured":"(2022, June 25). NumPy. Available online: https:\/\/numpy.org\/."},{"key":"ref_43","unstructured":"(2022, June 25). Pandas. Available online: https:\/\/pandas.pydata.org\/."},{"key":"ref_44","unstructured":"(2022, June 25). Matplotlib. Available online: https:\/\/matplotlib.org\/."},{"key":"ref_45","unstructured":"(2022, June 25). Scikit-Learn. Available online: https:\/\/scikit-learn.org\/."},{"key":"ref_46","unstructured":"(2022, June 25). Tensorflow. Available online: https:\/\/www.tensorflow.org\/."},{"key":"ref_47","unstructured":"(2022, June 25). Keras. Available online: https:\/\/keras.io\/."},{"key":"ref_48","unstructured":"(2022, June 25). Jupyter. Available online: https:\/\/jupyter.org\/."},{"key":"ref_49","unstructured":"(2022, June 13). PyCaret. Available online: https:\/\/pycaret.org\/."},{"key":"ref_50","unstructured":"(2022, June 16). Feature Selection. Available online: https:\/\/pycaret.gitbook.io\/docs\/get-started\/preprocessing\/feature-selection."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/8\/258\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:57:05Z","timestamp":1760140625000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/8\/258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":50,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["a15080258"],"URL":"https:\/\/doi.org\/10.3390\/a15080258","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,26]]}}}