Cyber Security Intruder Detection Using Deep Learning Approach

被引:0
作者
Islam, Tariqul [1 ]
Rahman, Md Mosfikur [1 ]
Jabiullah, Md Ismail [1 ]
Saifuzzaman, Mohd [1 ]
机构
[1] Daffodil Int Univ, Dhaka, Bangladesh
来源
INFORMATION SYSTEMS AND MANAGEMENT SCIENCE, ISMS 2021 | 2023年 / 521卷
关键词
Cyber security; Artificial intelligence; Deep learning; Cyberattack; Intrusion detection system;
D O I
10.1007/978-3-031-13150-9_42
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Intrusion detection systems (IDS) are among the most promising approaches for securing data and networks; through the years, numerous categorization algorithms have been utilized in IDS. In recent years, as the alarming increase in computer connectivity and the substantial number of applications associated with computer technology have increased, the challenge of cyber security is constantly rising. A proper system of protection for numerous cyber-attacks is also required. This is how incoherence and attacks in a computer network are detected and IDS developed, which could play a possible role in cyber security. The authors used the CICIDS2017 dataset to meet this objective. It is the 2017 set of the Canadian Cyber Security Institute. The authors propose an IDS based on the deep learning technique to increase safety. The purpose was to use a neural network classifier to predict the network and web attacks.
引用
收藏
页码:518 / 530
页数:13
相关论文
共 19 条
[1]   A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models [J].
Ahmim, Ahmed ;
Maglaras, Leandros ;
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Janicke, Helge .
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, :228-233
[2]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[3]  
Atefi Kayvan, 2019, 2019 IEEE 7th Conference on Systems, Process and Control (ICSPC), P269, DOI 10.1109/ICSPC47137.2019.9068081
[4]   Optimization Methods for Large-Scale Machine Learning [J].
Bottou, Leon ;
Curtis, Frank E. ;
Nocedal, Jorge .
SIAM REVIEW, 2018, 60 (02) :223-311
[5]  
Ciaburro GiuseppeBalaji Venkateswaran., 2017, Neural Networks with R: Smart models using CNN, RNN, deep learning, and artificial intelligence principles
[6]   Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm [J].
Gu, Yonghao ;
Li, Kaiyue ;
Guo, Zhenyang ;
Wang, Yongfei .
IEEE ACCESS, 2019, 7 :64351-64365
[7]  
Ho Samson, 2021, IEEE Open Journal of the Computer Society, V2, P14, DOI [10.1109/ojcs.2021.3050917, 10.1109/OJCS.2021.3050917]
[8]  
Jyothsna V., 2011, INT J COMPUTER APPL, V28, P26
[9]   Survey of intrusion detection systems: techniques, datasets and challenges [J].
Khraisat, Ansam ;
Gondal, Iqbal ;
Vamplew, Peter ;
Kamruzzaman, Joarder .
CYBERSECURITY, 2019, 2 (01)
[10]   STOCHASTIC ESTIMATION OF THE MAXIMUM OF A REGRESSION FUNCTION [J].
KIEFER, J ;
WOLFOWITZ, J .
ANNALS OF MATHEMATICAL STATISTICS, 1952, 23 (03) :462-466