Cyberattacks Detection Through Behavior Analysis of Internet Traffic

被引:1
作者
Berjawi, Omran [1 ]
El Attar, Ali [2 ]
Chbib, Fadlallah [2 ]
Khatoun, Rida [2 ]
Fahs, Walid [3 ]
机构
[1] IMT Sch Adv Studies Lucca, Lucca, Italy
[2] Inst Polytech Paris, Telecom Paris INFRES, LTCI, Paris, France
[3] IUL, Dept Comp & Commun Engn, Wardanieh, Lebanon
来源
18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023 | 2023年 / 224卷
关键词
Cyber Security; traffic Network analysis; Deep Learning (DL); Feature Selection; NEURAL-NETWORK;
D O I
10.1016/j.procs.2023.09.010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network intrusion detection systems (NIDS) are actually used to detect suspicious activities such as viruses, shellcode, XSS, CSRF, worms, etc. There are two types of the NIDS: signature-based and anomaly-based. Recently, Deep Learning have emerged as promising techniques for classifying network attacks. In this paper, we propose a method to analyze the network traffic behavior through Deep Learning classification techniques using traffic features. The results indicate that Multi-Layer Perceptron (MLP) and Convolutional Neural Network (CNN) techniques achieved similar performance with 94% accuracy when using all features in the used dataset. However, with the use of feature selection techniques such as XGBoost, Pearson correlation, and mutual information, the models achieved a slightly lower accuracy of 91%, but these results demonstrate the effectiveness of feature selection methods in enhancing the performance of Deep Learning models by reducing complexity and removing irrelevant features. (c) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:52 / 59
页数:8
相关论文
共 18 条
  • [1] Basic concepts of artificial neural network (ANN) modeling and its application in pharmaceutical research
    Agatonovic-Kustrin, S
    Beresford, R
    [J]. JOURNAL OF PHARMACEUTICAL AND BIOMEDICAL ANALYSIS, 2000, 22 (05) : 717 - 727
  • [2] Ahsan M., 2021, J. Cybersecurity Priv, V1, P199, DOI [DOI 10.3390/JCP1010011, 10.3390/jcp1010011]
  • [3] Review of deep learning: concepts, CNN architectures, challenges, applications, future directions
    Alzubaidi, Laith
    Zhang, Jinglan
    Humaidi, Amjad J.
    Al-Dujaili, Ayad
    Duan, Ye
    Al-Shamma, Omran
    Santamaria, J.
    Fadhel, Mohammed A.
    Al-Amidie, Muthana
    Farhan, Laith
    [J]. JOURNAL OF BIG DATA, 2021, 8 (01)
  • [4] Azizjon Meliboev, 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), P218, DOI 10.1109/ICAIIC48513.2020.9064976
  • [5] Badis H, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P906, DOI 10.1109/INM.2015.7140406
  • [6] A hybrid filter-wrapper feature selection method for DDoS detection in cloud computing
    Belouch, Mustapha
    Elhadaj, Salah
    Idhammad, Mohamed
    [J]. INTELLIGENT DATA ANALYSIS, 2018, 22 (06) : 1209 - 1226
  • [7] Chen Zaiwei, 2021, arXiv
  • [8] The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems
    Einy, Sajad
    Oz, Cemil
    Navaei, Yahya Dorostkar
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [9] El Attar A., 2022, 2022 INT C EL COMP C, P1
  • [10] Farshchi M, 2015, 2015 IEEE 26TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), P24, DOI 10.1109/ISSRE.2015.7381796