全部 標題 作者
關鍵詞 摘要


Recurrent Neural Networks and Deep Neural Networks Based on Intrusion Detection System

DOI: 10.4236/oalib.1106151, PP. 1-11

Subject Areas: Artificial Intelligence, Computer and Network Security

Keywords: Intrusion Detection System (IDS), Deep Learning (DL), Deep Neural Networks (DNN), Explainable Artificial Intelligence (AI), Recurrent Neural Networks (RNN), Anomaly Detection

Full-Text   Cite this paper   Add to My Lib

Abstract

The computer security has become a major challenge. Tools and mechanisms have been developed to ensure a level of compliance. These include the Intrusion De-tection Systems (IDS). The principle of conventional IDS is to detect attempts to attack a network and to identify abnormal activities and behaviors. The reasons, including the uncertainty in searching for types of attacks and the increasing com-plexity of advanced cyber-attacks, IDS calls for the need for integration of meth-ods such as Deep Neuron Networks (DNN) and Recurring Neuron Networks (RNN) more precisely long-term memory (LSTM). In this submission, DNN and LSTM were used to predict attacks against the Network Intrusion Detection Sys-tem (NIDS). In this memory, we used four hidden layers for all deep learning algo-rithms, forty-one layers of inputs and two layers of outputs and with 100 itera-tions. In fact, learning is kept constant at 0.01 while the other parameters are optimized. After that for DNN, the number of neurons of the first hidden layer was further increased to 1280 but did not give any appreciable increase in accuracy. Therefore, the number of neurons has been set to 1024 and the LSTM we set the number of neurons of all hidden layers to 32. The results were compared and con-cluded that a three-layer LSTM performs better than all other conventional ma-chine learning and deep learning algorithms.

Cite this paper

Zarai, R. , Kachout, M. , Hazber, M. A. G. and Mahdi, M. A. (2020). Recurrent Neural Networks and Deep Neural Networks Based on Intrusion Detection System. Open Access Library Journal, 7, e6151. doi: http://dx.doi.org/10.4236/oalib.1106151.

References

[1]  Park, Y.S., Choi, C.S., Jang, C., Shin, D.G., Cho, G.C. and Kim, H.S. (2019) Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud. 2019 International Workshop on Big Data and Information Security (IWBIS), Bali, Indonesia, 115-118. https://doi.org/10.1109/IWBIS.2019.8935723
[2]  Alom, M.Z. and Taha, T.M. (2017) Network Intrusion Detection for Cyber Security Using Unsupervised Deep Learning Approaches. 2017 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, 63-69. https://doi.org/10.1109/NAECON.2017.8268746
[3]  Mehra, L., Gupta, M.K. and Gill, H.S. (2015) An Effectual & Secure Approach for the Detection and Efficient Searching of Network Intrusion Detection System (NIDS). 2015 International Conference on Computer, Communication and Control, Indore, 21-23 April 2015, 1-5. https://doi.org/10.1109/IC4.2015.7375615
[4]  Manthira, M.S. and Rajeswari, M. (2013) Virtual Host Based Intrusion Detection System for Cloud. International Journal of Engineering and Technology, 5, 5023-5029.
[5]  Torkaman, A., Javadzadeh, G. and Bahrololum, M. (2013) A Hybrid Intelligent HIDS Model Using Two-Layer Genetic Algorithm and Neural Network. The 5th Conference on Information and Knowledge Technology, Shiraz, 28-30 May 2013, 92-96. https://doi.org/10.1109/IKT.2013.6620045
[6]  Shidore, S. and Bhusari, V.K. (2014) Evasion of Network Intrusion Detection System Using Functional Framework. International Journal of Application or Innovation in Engineering & Management, 3.
[7]  Ahmed, P., Mona, T., Kaveh, B. and Joaquim. (2012) An Intrusion Detection And Prevention System in Cloud Computing: A Systematic Review. Journal of Network and Computer Applications, 36.
[8]  Kumari, U. and Soni, U. (2017) A Review of Intrusion Detection Using Anomaly Based Detection. 2017 2nd International Conference on Communication and Electronics Systems (ICCES), Coimbatore, 19-20 October 2017, 824-826. https://doi.org/10.1109/CESYS.2017.8321199
[9]  Justin, V., Marathe, N. and Dongre, N. (2017) Hybrid IDS Using SVM Classifier for Detecting DoS Attack in MANET Application. 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), Palladam, 10-11 February 2017, 775-778. https://doi.org/10.1109/I-SMAC.2017.8058284
[10]  Mishra, P., Varadharajan, V., Tupakula, U. and Pilli, E.S. (2019) A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection. IEEE Communications Surveys & Tutorials, 21, 686-728. https://doi.org/10.1109/COMST.2018.2847722
[11]  Xiong, C., Hua, Z., Lv, K. and Li, X. (2016) An Improved K-Means Text Clustering Algorithm by Optimizing Initial Cluster Centers. 2016 7th International Conference on Cloud Computing and Big Data (CCBD), Macau, 16-18 November 2016, 265-268. https://doi.org/10.1109/CCBD.2016.059
[12]  Yongzhong, L., Rushan, W., Jing, X., Ge, Y. and Bo, Z. (2009) Intrusion Detection Method Based on Fuzzy Hidden Markov Model. 2009 6th International Conference on Fuzzy Systems and Knowledge Discovery, Tianjin, 14-16 August 2009, 470-474. https://doi.org/10.1109/FSKD.2009.79
[13]  Wang, H., Xu, Z., Wang, C. and Yuan, Z. (2009) A New Algorithm Combining Self Organizing Map with Simulated Annealing Used in Intrusion Detection. 2009 2nd International Conference on Biomedical Engineering and Informatics, Tianjin, 17-19 October 2009, 1-4. https://doi.org/10.1109/BMEI.2009.5305521
[14]  Wei, M., Liu, Y., Chen, X. and Li, J. (2010) Decision Tree Applied in Web-Based Intrusion Detection System. 2010 2nd International Conference on Future Networks, Sanya, Hainan, 22-24 January 2010, 110-113. https://doi.org/10.1109/ICFN.2010.68
[15]  Ernawati, S., Yulia, E.R. and Samudi, F. (2018) Implementation of The Na?ve Bayes Algorithm with Feature Selection Using Genetic Algorithm for Sentiment Review Analysis of Fashion Online Companies. 2018 6th International Conference on Cyber and IT Service Management (CITSM), Parapat, Indonesia, 7-9 August 2018, 1-5. https://doi.org/10.1109/CITSM.2018.8674286
[16]  Wang, S. and Jiang, J. (2016) Learning Natural Language Inference with LST. Proceedings of NAACL-HLT 2016, San Diego, CA, 12-17 June 2016, 1442–1451.
[17]  Muhammed, M.A.E., Ahmed, A.A. and Khalid, T.A. (2017) Benchmark Analysis of Popular ImageNet Classification Deep CNN Architectures. 2017 International Conference On Smart Technologies for Smart Nation (SmartTechCon), Bangalore, 17-19 August 2017, 902-907. https://doi.org/10.1109/SmartTechCon.2017.8358502
[18]  LeCun, Y., et al. (2015) Deep Learning. Nature, 521, 436-444. https://doi.org/10.1038/nature14539
[19]  Farahnakian, F. and Heikkonen, J. (2018) A Deep Auto-Encoder Based Approach for Intrusion Detection System. 2018 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon-Si Gangwon-Do, Korea (South), 11-14 February 2018, 247-252. https://doi.org/10.23919/ICACT.2018.8323688
[20]  Seo, S., Park, S. and Kim, J. (2016) Improvement of Network Intrusion Detection Accuracy by Using Restricted Boltzmann Machine. 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, 23-25 December 2016, 413-417. https://doi.org/10.1109/CICN.2016.87
[21]  Vinayakumar, R., Soman, K. and Prabaharan, P. (2020) Evaluation of Recurrent Neural Network and Its Variants for Intrusion Detection System (IDS). https://doi.org/10.4018/978-1-7998-0414-7.ch018
[22]  Golovko, V., Komar, M. and Sachenko, A. (2010) Principles of Neural Network Artificial Immune System Design to Detect Attacks on Computers. 2010 International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv-Slavske, 237-237.
[23]  Amarasinghe, K. and Manic, M. (2018) Improving User Trust on Deep Neural Networks Based Intrusion Detection Systems. IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, Washington DC, 21-23 October 2018, 3262-3268. https://doi.org/10.1109/IECON.2018.8591322

Full-Text


comments powered by Disqus

Contact Us

[email protected]

QQ:3279437679

微信:OALib Journal




广西快乐10分下载