DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System

被引:95
作者
Hnamte, Vanlalruata [1 ]
Hussain, Jamal [1 ]
机构
[1] Mizoram Univ, Dept Math & Comp Sci, Aizawl 796004, Mizoram, India
来源
TELEMATICS AND INFORMATICS REPORTS | 2023年 / 10卷
关键词
Deep learning; DDoS; IDS; Bilstm; CNN; DCNNBiLstm; NEURAL-NETWORK; ATTACK DETECTION; INTERNET;
D O I
10.1016/j.teler.2023.100053
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
In recent years, all real-world processes have been shifted to the cyber environment practically, and computers communicate with one another over the Internet. As a result, there is a rising number of network security vulnerabilities, and network administrators are unable to secure their networks from all forms of cyberattacks. Many techniques for network intrusion detection have also been developed. However, they encounter significant challenges as a result of the ongoing emergence of new vulnerabilities that present systems cannot comprehend. We are motivated by deep learnings exceptional performance in various detection and identification tasks, we present an intelligent and efficient network intrusion detection system (NIDS) based on Deep Learning (DL). In this study, we present a deep learning-based IDS for attack detection. The model has been trained with real-time traffic datasets; CICIDS2018 and Edge_IIoT datasets. The performance of the model is investigated using multi- class classification and achieved a 100% and 99.64% accuracy rate respectively when trained and tested with the datasets.
引用
收藏
页数:13
相关论文
共 38 条
[1]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[2]   Developing a Security Testbed for Industrial Internet of Things [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5558-5573
[3]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[4]  
Albawi S, 2017, I C ENG TECHNOL
[5]   Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment [J].
Amma, Bhuvaneswari N. G. ;
Selvakumar, S. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 :255-265
[6]  
Bachem O., 2018, ARXIV, p1812.05069, DOI [DOI 10.48550/ARXIV.1812.05069, 10.48550/arXiv.1812.05069]
[7]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[8]  
Chen ZM, 2018, WIREL TELECOMM SYMP
[9]  
Deng L, 2013, INT CONF ACOUST SPEE, P8599, DOI 10.1109/ICASSP.2013.6639344
[10]   A Hierarchical Fused Fuzzy Deep Neural Network for Data Classification [J].
Deng, Yue ;
Ren, Zhiquan ;
Kong, Youyong ;
Bao, Feng ;
Dai, Qionghai .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2017, 25 (04) :1006-1012