A Real-Time Network Intrusion Detection based on Transformer-LSTM model

被引:0
作者
Jeevan, G. [1 ]
Adnan, Mohammed [1 ]
Nandeesh, M. [1 ]
Sonal, Sai G. [1 ]
Jayana, H. S. [2 ]
机构
[1] SIT, Dept ISE, Tumakuru 03, India
[2] SIT, Dept ISE, Tumakuru, India
来源
2024 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA PROCESSING, COMMUNICATION & INFORMATION TECHNOLOGY, MPCIT | 2024年
关键词
IDS; Transformer; LSTM; Apache Kafka; Elasticsearch;
D O I
10.1109/MPCIT62449.2024.10892727
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a novel approach to network intrusion detection by leveraging the advanced capabilities of deep learning. Traditional intrusion detection systems (IDS) often rely on rule-based mechanisms or require human intervention for feature selection, which limits their effectiveness against sophisticated and evolving cyber threats. To address these challenges, this paper focuses on the development of an innovative deep learning model that combines Transformer and Long Short-Term Memory (LSTM) architectures, aiming to enhance the accuracy and automation of intrusion detection tasks. The uniqueness of our approach lies in the integration of the proposed deep learning model with Apache Kafka, a leading distributed streaming platform. This integration enables the real-time capture and processing of network data, which is vital for the timely detection of malicious activities. Specifically, Network data is captured and stored in CSV file by flow generator, streamed into Kafka for efficient processing, analyzed by deep learning model, detected intrusions transmitted back, and stored in Elasticsearch. This setup not only provides a mechanism for real-time intrusion detection but also supports advanced data visualization and further analysis. By combining the predictive power of deep learning with the real-time data processing capabilities of Kafka, this research paper presents a comprehensive and scalable solution for detecting network intrusions.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 6 条
[1]  
Abraham J.A., 2021 INT C ADV EL EL, P2, DOI DOI 10.1109/ICAECA52838.2021.9675595
[2]  
Huang XiaoFei, 2022 IEEE 10 JOINT I, DOI [10.1109/ITAIC54216.2022.9836915, DOI 10.1109/ITAIC54216.2022.9836915]
[3]  
Hussain J., 2021, 2021 2 GLOB C ADV TE, P1, DOI [10.1109/GCAT52182.2021.9587719, DOI 10.1109/GCAT52182.2021.9587719]
[4]  
Liu Yi, Intrusion Detection Model Based on Improved Transformer
[5]  
Marinho Renato, 2023, Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing, DOI [10.1109/ACCESS.2023.3260020, DOI 10.1109/ACCESS.2023.3260020]
[6]  
Zhang Zhipeng, 2023 3 INT C NEUR NE, DOI [10.1109/NNICE58320.2023.10105733, DOI 10.1109/NNICE58320.2023.10105733]