Abstract
Today cyberspace is developing tremendously, and the Intrusion Detection System (IDS) plays a key role in information security. The IDS, which operates at the network and host levels, should be able to identify various malicious attacks. The job of network-based IDSs is to distinguish between normal and malicious traffic data and trigger an alert in the event of an attack. In addition to traditional signature-based and anomaly-based approaches, many researchers have used various deep learning (DL) techniques to detect intruders, as DL models are capable of automatically extracting salient features from the input data packets. The application of the Convolutional Neural Network (CNN), which is often used to solve research problems in the visual and visual fields, is not much explored for IDS. In this research work the proposed model for intrusion detection is based on feature selection and reduction using CNN and classification using random forest. As compared to some existing work the proposed algorithm proves its efficiency in terms of high accuracy and high detection rate.
Highlights
Intrusion Detection System (IDS) are implemented over host computer or network as a security tool or application to avoid malicious attacks over them
When IDS is applied over multiple systems, connected in a network, it is termed as Network Intrusion Detection System (NIDS)
For analysis this model is designed by applying artificial neural networks (ANNs) in order to detect malicious behavior of coming network traffic
Summary
Intrusion Detection System (IDS) are implemented over host computer or network as a security tool or application to avoid malicious attacks over them. Ryan et al [3] proposed anomaly detection model by using back-propagation 3-layer Multi-Layer Perceptron (MLP) to detect possible attack in network This model analyzed each session logs and analyzed the behavior of data packets. The prediction of coming data packets are analyzed by generalized study of previous known packets For analysis this model is designed by applying artificial neural networks (ANNs) in order to detect malicious behavior of coming network traffic. Similar approach was applied in [5] and [6] using Self-Organizing Maps (SOM) These models are trained on the basis of previously recognized packets and tested over real-time data packets or network traffic. Feng et al [9] integrated SVM and Self-Organized Ant Colony Network for intrusion detection This model is hybrid by merging classification and clustering techniques. DNN model learns the abstract and high-dimensional feature representation of the IDS data
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.