Detection of Cyber-attacks using Deep Convolution in Honeyed Framework

Sayan Nath, D. Pal, Sajal Saha
{"title":"Detection of Cyber-attacks using Deep Convolution in Honeyed Framework","authors":"Sayan Nath, D. Pal, Sajal Saha","doi":"10.1109/ICDT57929.2023.10150916","DOIUrl":null,"url":null,"abstract":"A network-related environment called a “honeyed framework” served to defend official network resources against harm. This framework creates a scenario that motivates the intrusive person to engage in resource-stealing activity. To recognise an unauthorised assault, this framework applied the Attack-detection-procedure. Here, we attempt to identify DoS attacks using the suggested Honeyed framework system. In order to safeguard your network from assaults, NIDS (Network Intrusion Detection System) is one of the first security solutions to make it easier to identify intrusions. In this work, we offer a system that reveals an assault while validating the defense against it. The new cyber security benchmark IoT dataset is used in this white paper to assess the most recent machine learning techniques. This work’s major goal is to develop an architecture that can foresee and stop DDOS attacks, malware, and botnet attacks using these Honeyed designs. Deep Convolution Reinforcement Neural Networks are used for network surveillance and to categories network users from potential threats (DCRNN). A two-step technique of network understanding is used to enhance the functionality of the suggested solution. DSAE (Deep Sparse Auto Encoder) is used for feature engineering challenges at the initial step of the processing process, data pre-processing. The Deep Convolution Reinforcement Neural Network learning strategy is used in the second step to facilitate categorization. The honeyed firewall and web server are then implemented, following the deployment of the honeyed framework. The DCRNN deployment is finished, and users can now be monitored and analyzed as well as data on network users collected. In this study, data from a loT environment was used to test the effectiveness of the published technique. This data included the heterogeneous datasets \"IoT-23,\" \"NetML-2020,\" and \"LITNET-2020.\" With contemporary methods for network discovery, the statistical relevance of this strategy is evaluated.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Disruptive Technologies (ICDT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDT57929.2023.10150916","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A network-related environment called a “honeyed framework” served to defend official network resources against harm. This framework creates a scenario that motivates the intrusive person to engage in resource-stealing activity. To recognise an unauthorised assault, this framework applied the Attack-detection-procedure. Here, we attempt to identify DoS attacks using the suggested Honeyed framework system. In order to safeguard your network from assaults, NIDS (Network Intrusion Detection System) is one of the first security solutions to make it easier to identify intrusions. In this work, we offer a system that reveals an assault while validating the defense against it. The new cyber security benchmark IoT dataset is used in this white paper to assess the most recent machine learning techniques. This work’s major goal is to develop an architecture that can foresee and stop DDOS attacks, malware, and botnet attacks using these Honeyed designs. Deep Convolution Reinforcement Neural Networks are used for network surveillance and to categories network users from potential threats (DCRNN). A two-step technique of network understanding is used to enhance the functionality of the suggested solution. DSAE (Deep Sparse Auto Encoder) is used for feature engineering challenges at the initial step of the processing process, data pre-processing. The Deep Convolution Reinforcement Neural Network learning strategy is used in the second step to facilitate categorization. The honeyed firewall and web server are then implemented, following the deployment of the honeyed framework. The DCRNN deployment is finished, and users can now be monitored and analyzed as well as data on network users collected. In this study, data from a loT environment was used to test the effectiveness of the published technique. This data included the heterogeneous datasets "IoT-23," "NetML-2020," and "LITNET-2020." With contemporary methods for network discovery, the statistical relevance of this strategy is evaluated.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于蜜糖框架的深度卷积网络攻击检测
一个与网络相关的环境被称为“蜜糖框架”,用来保护官方网络资源不受损害。这个框架创造了一个场景,激励侵入者从事资源窃取活动。为了识别未经授权的攻击,该框架应用了攻击检测过程。在这里,我们尝试使用建议的蜜糖框架系统来识别DoS攻击。为了保护您的网络免受攻击,NIDS(网络入侵检测系统)是最早的安全解决方案之一,可以更容易地识别入侵。在这项工作中,我们提供了一个系统,可以在验证防御的同时揭示攻击。本白皮书使用新的网络安全基准物联网数据集来评估最新的机器学习技术。这项工作的主要目标是开发一个架构,可以预见和阻止DDOS攻击,恶意软件和僵尸网络攻击使用这些蜜糖设计。深度卷积强化神经网络用于网络监控和对网络用户进行潜在威胁分类(DCRNN)。网络理解的两步技术被用来增强建议的解决方案的功能。DSAE (Deep Sparse Auto Encoder,深度稀疏自动编码器)用于特征工程挑战处理过程的初始步骤,即数据预处理。在第二步中使用深度卷积强化神经网络学习策略来促进分类。然后,随着蜜化框架的部署,实现蜜化防火墙和web服务器。DCRNN部署完成,现在可以对用户进行监控和分析,并收集网络用户的数据。在本研究中,使用loT环境中的数据来测试已发表技术的有效性。这些数据包括异构数据集“IoT-23”、“NetML-2020”和“LITNET-2020”。使用现代网络发现方法,评估该策略的统计相关性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Best Ways Using AI in Impacting Success on MBA Graduates A Mechanism Used to Predict Diet Consumption and Stress Management in Humans Using IoMT ICDT 2023 Cover Page Machine Learning-Based Approach for Hand Gesture Recognition A Smart Innovation of Business Intelligence Based Analytical Model by Using POS Based Deep Learning Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1