{"title":"Detection of Cyber-attacks using Deep Convolution in Honeyed Framework","authors":"Sayan Nath, D. Pal, Sajal Saha","doi":"10.1109/ICDT57929.2023.10150916","DOIUrl":null,"url":null,"abstract":"A network-related environment called a “honeyed framework” served to defend official network resources against harm. This framework creates a scenario that motivates the intrusive person to engage in resource-stealing activity. To recognise an unauthorised assault, this framework applied the Attack-detection-procedure. Here, we attempt to identify DoS attacks using the suggested Honeyed framework system. In order to safeguard your network from assaults, NIDS (Network Intrusion Detection System) is one of the first security solutions to make it easier to identify intrusions. In this work, we offer a system that reveals an assault while validating the defense against it. The new cyber security benchmark IoT dataset is used in this white paper to assess the most recent machine learning techniques. This work’s major goal is to develop an architecture that can foresee and stop DDOS attacks, malware, and botnet attacks using these Honeyed designs. Deep Convolution Reinforcement Neural Networks are used for network surveillance and to categories network users from potential threats (DCRNN). A two-step technique of network understanding is used to enhance the functionality of the suggested solution. DSAE (Deep Sparse Auto Encoder) is used for feature engineering challenges at the initial step of the processing process, data pre-processing. The Deep Convolution Reinforcement Neural Network learning strategy is used in the second step to facilitate categorization. The honeyed firewall and web server are then implemented, following the deployment of the honeyed framework. The DCRNN deployment is finished, and users can now be monitored and analyzed as well as data on network users collected. In this study, data from a loT environment was used to test the effectiveness of the published technique. This data included the heterogeneous datasets \"IoT-23,\" \"NetML-2020,\" and \"LITNET-2020.\" With contemporary methods for network discovery, the statistical relevance of this strategy is evaluated.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Disruptive Technologies (ICDT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDT57929.2023.10150916","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A network-related environment called a “honeyed framework” served to defend official network resources against harm. This framework creates a scenario that motivates the intrusive person to engage in resource-stealing activity. To recognise an unauthorised assault, this framework applied the Attack-detection-procedure. Here, we attempt to identify DoS attacks using the suggested Honeyed framework system. In order to safeguard your network from assaults, NIDS (Network Intrusion Detection System) is one of the first security solutions to make it easier to identify intrusions. In this work, we offer a system that reveals an assault while validating the defense against it. The new cyber security benchmark IoT dataset is used in this white paper to assess the most recent machine learning techniques. This work’s major goal is to develop an architecture that can foresee and stop DDOS attacks, malware, and botnet attacks using these Honeyed designs. Deep Convolution Reinforcement Neural Networks are used for network surveillance and to categories network users from potential threats (DCRNN). A two-step technique of network understanding is used to enhance the functionality of the suggested solution. DSAE (Deep Sparse Auto Encoder) is used for feature engineering challenges at the initial step of the processing process, data pre-processing. The Deep Convolution Reinforcement Neural Network learning strategy is used in the second step to facilitate categorization. The honeyed firewall and web server are then implemented, following the deployment of the honeyed framework. The DCRNN deployment is finished, and users can now be monitored and analyzed as well as data on network users collected. In this study, data from a loT environment was used to test the effectiveness of the published technique. This data included the heterogeneous datasets "IoT-23," "NetML-2020," and "LITNET-2020." With contemporary methods for network discovery, the statistical relevance of this strategy is evaluated.
一个与网络相关的环境被称为“蜜糖框架”,用来保护官方网络资源不受损害。这个框架创造了一个场景,激励侵入者从事资源窃取活动。为了识别未经授权的攻击,该框架应用了攻击检测过程。在这里,我们尝试使用建议的蜜糖框架系统来识别DoS攻击。为了保护您的网络免受攻击,NIDS(网络入侵检测系统)是最早的安全解决方案之一,可以更容易地识别入侵。在这项工作中,我们提供了一个系统,可以在验证防御的同时揭示攻击。本白皮书使用新的网络安全基准物联网数据集来评估最新的机器学习技术。这项工作的主要目标是开发一个架构,可以预见和阻止DDOS攻击,恶意软件和僵尸网络攻击使用这些蜜糖设计。深度卷积强化神经网络用于网络监控和对网络用户进行潜在威胁分类(DCRNN)。网络理解的两步技术被用来增强建议的解决方案的功能。DSAE (Deep Sparse Auto Encoder,深度稀疏自动编码器)用于特征工程挑战处理过程的初始步骤,即数据预处理。在第二步中使用深度卷积强化神经网络学习策略来促进分类。然后,随着蜜化框架的部署,实现蜜化防火墙和web服务器。DCRNN部署完成,现在可以对用户进行监控和分析,并收集网络用户的数据。在本研究中,使用loT环境中的数据来测试已发表技术的有效性。这些数据包括异构数据集“IoT-23”、“NetML-2020”和“LITNET-2020”。使用现代网络发现方法,评估该策略的统计相关性。