{"title":"Optimum Analysis of Imbalanced Network for Intrusion Detection using LSTM Convolution Technique","authors":"Monika Meena, Rakesh Kumar Tiwari","doi":"10.1109/ICAAIC56838.2023.10140458","DOIUrl":null,"url":null,"abstract":"Analyzing network packets to determine whether they are genuine or suspicious are called “Intrusion Detection.” The significant difficulties associated with this space incorporates the tremendous volume of information for preparing and the quick and streaming information that will be accommodated the expectation interaction. In addition, the intrusion detection model faces additional difficulties as a result of the domain's inherent data imbalance. The classification accuracy and other parameters of enhanced LSTM are contrasted with those of conventional deep learning and other machine learning methods in this study. In addition to classifying the tweets, this framework can be used to investigate user attitudes toward Indian higher education. Two algorithms form the basis of the proposed framework: Using the evolutionary algorithm to improve LSTM. Because the standard LSTM algorithm can select parameter values at random, the enhanced LSTM algorithm uses the evolutionary algorithm to enhance its functionality.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAAIC56838.2023.10140458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Analyzing network packets to determine whether they are genuine or suspicious are called “Intrusion Detection.” The significant difficulties associated with this space incorporates the tremendous volume of information for preparing and the quick and streaming information that will be accommodated the expectation interaction. In addition, the intrusion detection model faces additional difficulties as a result of the domain's inherent data imbalance. The classification accuracy and other parameters of enhanced LSTM are contrasted with those of conventional deep learning and other machine learning methods in this study. In addition to classifying the tweets, this framework can be used to investigate user attitudes toward Indian higher education. Two algorithms form the basis of the proposed framework: Using the evolutionary algorithm to improve LSTM. Because the standard LSTM algorithm can select parameter values at random, the enhanced LSTM algorithm uses the evolutionary algorithm to enhance its functionality.