Intrusion detection in big data environment using hybrid deep learning algorithm (VAE-CNN)

被引:0
|
作者
Gokila, R. G. [1 ]
Kannan, S. [2 ]
机构
[1] EGS Pillay Engn Coll, Dept Informat Technol, Nagapattinam, India
[2] Kings Coll Engn, Dept Elect & Commun Engn, Pudukkottai, India
关键词
Big data; intrusions; denial of service; intrusion detection system; deep learning; auto encoder; convolutional neural network; NETWORK; IOT; FUZZY;
D O I
10.3233/JIFS-234311
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the internet era, billions of devices are connected to the network generates large volume of data and the generation rate increases exponentially every day. As the data increases, the chances for cyber attackers to exploit the data increases which results into numerous security threats to organizations and network. Fast and accurate detection of attacks in big data environment is difficult due to its volume and variety and velocity. Over a decade, numerous attack detection systems are developed using machine learning. However, most of the traditional detection systems cannot recognize the attack types specifically which reduces the detection performances and network performances. Thus, the intrusion detection model presented in this research which incorporates deep variational auto-encoder and convolutional neural network to detect intrusions. Experimentations using benchmark dataset validated the proposed model better performances over existing machine learning techniques like logistic regression, random forest, extreme gradient boosting, k-nearest neighbor, and selfscalable heuristic artificial neural network algorithms using accuracy, recall, precision, and F1-score. The proposed model outperforms with a maximum precision of 97.48%, Recall of 99.52%, F1-score of 98.49% and accuracy of 98.65% over conventional intrusion detection algorithms.
引用
收藏
页码:8637 / 8649
页数:13
相关论文
共 50 条
  • [31] Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach
    Mahdavisharif, Mahzad
    Jamali, Shahram
    Fotohi, Reza
    JOURNAL OF GRID COMPUTING, 2021, 19 (04)
  • [32] Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach
    Mahzad Mahdavisharif
    Shahram Jamali
    Reza Fotohi
    Journal of Grid Computing, 2021, 19
  • [33] IoT security using deep learning algorithm: intrusion detection model using LSTM
    Lija, Abitha V. K.
    Shobana, R.
    Misbha, J. Caroline
    Chandrakala, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2025, 17 (1-2) : 283 - 293
  • [34] A deep learning approach for effective intrusion detection in wireless networks using CNN
    B. Riyaz
    Sannasi Ganapathy
    Soft Computing, 2020, 24 : 17265 - 17278
  • [35] A deep learning approach for effective intrusion detection in wireless networks using CNN
    Riyaz, B.
    Ganapathy, Sannasi
    SOFT COMPUTING, 2020, 24 (22) : 17265 - 17278
  • [36] Intrusion Detection in IoT Networks Using Deep Learning Algorithm
    Susilo, Bambang
    Sari, Riri Fitri
    INFORMATION, 2020, 11 (05)
  • [37] Remora whale optimization-based hybrid deep learning for network intrusion detection using CNN features
    Pingale, Subhash V.
    Sutar, Sanjay R.
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 210
  • [38] Applications of deep learning algorithms for Supervisory Control and Data Acquisition intrusion detection system
    Balla, Asaad
    Habaebi, Mohamed Hadi
    Islam, Md. Rafiqul
    Mubarak, Sinil
    CLEANER ENGINEERING AND TECHNOLOGY, 2022, 9
  • [39] Sea turtle foraging algorithm with hybrid deep learning-based intrusion detection for the internet of drones environment
    Escorcia-Gutierrez, Jose
    Gamarra, Margarita
    Leal, Esmeide
    Madera, Natasha
    Soto, Carlos
    Mansour, Romany F.
    Alharbi, Meshal
    Alkhayyat, Ahmed
    Gupta, Deepak
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [40] Intrusion detection based on ensemble learning for big data classification
    Jemili, Farah
    Meddeb, Rahma
    Korbaa, Ouajdi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 3771 - 3798