基于IWD的LSTM分类混合异常入侵检测方法

Mukesh Madanan, A. Venugopal, Nitha C. Velayudhan
{"title":"基于IWD的LSTM分类混合异常入侵检测方法","authors":"Mukesh Madanan, A. Venugopal, Nitha C. Velayudhan","doi":"10.1109/ANTS50601.2020.9342820","DOIUrl":null,"url":null,"abstract":"The Network Intrusion Detection based on Anomaly is one of the best ways to identify the spam users and activities in cyber security. In present era, the Intrusion Detection System resources are increased due to inappropriate features that effect the detection rate of systems. To ensure better detection rate, a feature selection approach is utilized for the elimination of dissimilar and unemployable features in Intrusion Detection Systems. In addition, the time-consuming for the detection process also needs to be augmented for the process of classification. The paper introduces a method that avails the IWD algorithm for the feature subset selection in conjunction with LSTM to predict the malicious activity on that network. KDD CUP’99 dataset is employed for the judgement of performance on the intrusion detection in comparison with extant techniques. The performance estimate of the proposed model with previous methodologies depicts that the intended model is prominent by means of Higher Detection Rate, Low False Alarm Rate, and time consumption.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Hybrid Anomaly Based Intrusion Detection Methodology Using IWD for LSTM Classification\",\"authors\":\"Mukesh Madanan, A. Venugopal, Nitha C. Velayudhan\",\"doi\":\"10.1109/ANTS50601.2020.9342820\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Network Intrusion Detection based on Anomaly is one of the best ways to identify the spam users and activities in cyber security. In present era, the Intrusion Detection System resources are increased due to inappropriate features that effect the detection rate of systems. To ensure better detection rate, a feature selection approach is utilized for the elimination of dissimilar and unemployable features in Intrusion Detection Systems. In addition, the time-consuming for the detection process also needs to be augmented for the process of classification. The paper introduces a method that avails the IWD algorithm for the feature subset selection in conjunction with LSTM to predict the malicious activity on that network. KDD CUP’99 dataset is employed for the judgement of performance on the intrusion detection in comparison with extant techniques. The performance estimate of the proposed model with previous methodologies depicts that the intended model is prominent by means of Higher Detection Rate, Low False Alarm Rate, and time consumption.\",\"PeriodicalId\":426651,\"journal\":{\"name\":\"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"volume\":\"95 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANTS50601.2020.9342820\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS50601.2020.9342820","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

基于异常的网络入侵检测是网络安全中识别垃圾用户和活动的最佳方法之一。当今时代,入侵检测系统的资源越来越多,由于不合适的特征影响了系统的检测率。为了保证更好的检测率,在入侵检测系统中采用特征选择的方法来消除不相似和不可使用的特征。此外,在分类过程中,检测过程的耗时也需要增加。本文介绍了一种利用IWD算法进行特征子集选择,并结合LSTM进行网络恶意活动预测的方法。采用KDD CUP ' 99数据集对入侵检测的性能进行判断,并与现有技术进行比较。使用先前的方法对所提出的模型进行性能评估,表明预期模型具有较高的检测率、较低的误报率和较低的时间消耗。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Hybrid Anomaly Based Intrusion Detection Methodology Using IWD for LSTM Classification
The Network Intrusion Detection based on Anomaly is one of the best ways to identify the spam users and activities in cyber security. In present era, the Intrusion Detection System resources are increased due to inappropriate features that effect the detection rate of systems. To ensure better detection rate, a feature selection approach is utilized for the elimination of dissimilar and unemployable features in Intrusion Detection Systems. In addition, the time-consuming for the detection process also needs to be augmented for the process of classification. The paper introduces a method that avails the IWD algorithm for the feature subset selection in conjunction with LSTM to predict the malicious activity on that network. KDD CUP’99 dataset is employed for the judgement of performance on the intrusion detection in comparison with extant techniques. The performance estimate of the proposed model with previous methodologies depicts that the intended model is prominent by means of Higher Detection Rate, Low False Alarm Rate, and time consumption.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Real-time Spatio-Temporal based Outlier Detection Framework for Wireless Body Sensor Networks Availability Comparison of 5G Network Service Detection and Prevention of Black Hole Attack in SUPERMAN QoS Aware and Fair Resource Distribution for Uplink NOMA Cellular Networks Quality of Experience Aware Medium Access Control in Attocell Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1