Abstract

The internet is growing at a rapid pace offering multiple web-based applications catering to the changing needs and demands of customers. Nevertheless, extensive use of internet services has potentially exposed the threats of data security and reliability. With technological advancements, cyber threats have also become more sophisticated with the blend of distinctive forms of attacks to cause potential damage. The increase in the number and variety of cyber attacks is inevitable; hence it is imperative to improve the efficiency of the cyber security systems. This research aims to compare different neural network models to distinguish malicious acts from non-malicious ones. The examined models are trained, validated, and tested using two datasets(cyber-physical subsystem dataset and KDD dataset). The performance of the studied models is measured using the confusion matrix. For the cyber-physical subsystem dataset, binary classification and multi-class classification are used for evaluating the models. In the KDD dataset, binary classification is the only classification approach because the dataset contains two classes, regular (normal actions) and harmful (malicious actions). In general, the results in binary classification are more encouraging than in multi-class classification. Among all the models, the PNN model achieves the best performance, while the GRNN model is the fastest one. Although PNN's runtime is slightly higher than the GRNN model, we can claim that the PNN is the best model for our data because a trade-off between the performance and run time can be obtained.

Highlights

  • The rise of the internet in the mid-1990s has paved the way for global communication

  • Wannacry [1] is a type of cyber attacks that took place in May of 2017 and had an impact on over 230,000 computers in over 150 countries

  • We examined the performance of several neural networkbased methods using their built-in package/functions in MATLAB, namely Generalized Regression Neural Network (GRNN), Probabilistic Neural Network (PNN), Radial Basis Neural Network (RBNN), FNN, Elman NN, and Pattern NN

Read more

Summary

Introduction

The rise of the internet in the mid-1990s has paved the way for global communication. It has had a progressive influence on the world’s economy, technology, business, and human interaction to reduce the distance between people. It offers vulnerabilities and chances for cyber-attacks at different political, organizational, and individual levels. Cyber attacks were expanded from being performed by individuals to be completed by groups of criminals and state actors. Anomaly-based IDS methods were used as an alternative approach to framing the detection of the cyber security issue.

Objectives
Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call