Abstract

The internet connected devices are prone to cyber threats. Most of the companies are developing devices with built-in cyber threat protection mechanism or recommending prevention measure. But cyber threat is becoming harder to trace due to the availability of various tools and techniques to bypass the normal prevention measures. A data mining-based intrusion detection system can play a key role to handle such cyberattacks. This paper proposes a threefold approach to analyzing intrusion detection system. In the first phase, experiments have been conducted by applying SVM, Decision Tree, and KNN. In the second phase, Random Forest, and XGBoost are applied as lately they have been showing significant improved performance in supervised learning. Finally, deep learning techniques, namely, Feed Forward, LSTM, and Gated Recurrent Unit neural network are applied to conduct the experiment. Kyoto Honeypot Dataset is used for experimental purpose. The results show a significant improvement in IDS outperforming the state of the arts on this dataset. Such improvement strengthens the applicability proposed model in IDS.

Highlights

  • The rapid development of computational and intelligent devices, smart home appliances, and high-speed internet enables everything to be connected

  • We describe the validity of the proposed neural network models through required evaluation metrics

  • The Matthews Correlation Coefficient (MCC) score is considered for 100 and 50 epochs to demonstrate the quality of neural network Intrusion Detection System (IDS) models

Read more

Summary

Introduction

The rapid development of computational and intelligent devices, smart home appliances, and high-speed internet enables everything to be connected. There is a lot of work with different policies to defend threat [1] such as software developments with quality of services, and parallel technologies in Cisco Switches [2], and intrusion. Data science technique has been adapted to implement effective Intrusion Detection System (IDS). Several algorithms have been used to develop IDS, such as Naïve Bayes, Self Organizing Map (SOM) [5], non-dominated genetic algorithm [6], Support Vector Machine (SVM) with Softmax or radial basis function (rbf). Each of these models is different, but their goal is to differentiate the normal traffic from the compromised ones

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.