Automated network intrusion detection using multimodal networks

被引:2
作者
Pingale, Subhash V. [1 ,2 ]
Sutar, Sanjay R. [1 ]
机构
[1] Dr Babasaheb Ambedkar Technol Univ, Dept Informat Technol, Lonere, Raigad, India
[2] SKN Sinhgad Coll Engn, Pandharpur 413304, Solapur, India
关键词
intrusion detection system; multimodal networks; NSL-KDD dataset; cybersecurity; SECURITY; ALGORITHM; SELECTION; SYSTEMS; KDD99;
D O I
10.1504/IJCSE.2022.123123
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Intrusion detection requires accurate and timely detection of any bad connection that intends to exploit network vulnerabilities. Previous approaches have focused on deriving statistical features based on domain knowledge, followed by primitive machine learning and ensemble techniques. Grouping all the parameters as a single input to a model may not always be effective. In this paper, we propose using multimodal networks for network intrusion detection. The input logs are segregated into multiple sub-groups trained differently. Their intermediate representations are combined to produce the final prediction. This approach handles the strengths of individual features better as compared to normalisation. The system is evaluated on the NSL-KDD dataset and is compared with standard methods across multiple performance metrics. The proposed system achieves an accuracy of 83.5, highest as compared to other approaches. Channelling inputs for richer feature extraction is fast gaining traction, and we extend the same in cybersecurity.
引用
收藏
页码:339 / 352
页数:14
相关论文
共 46 条
[1]   Deep learning for collective anomaly detection [J].
Ahmed, Mohiuddin ;
Pathan, Al-Sakib Khan .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 21 (01) :137-145
[2]   DNS rule-based schema to botnet detection [J].
Alieyan, Kamal ;
Almomani, Ammar ;
Anbar, Mohammed ;
Alauthman, Mohammad ;
Abdullah, Rosni ;
Gupta, B. B. .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) :545-564
[3]   Impact of digital fingerprint image quality on the fingerprint recognition accuracy [J].
Alsmirat, Mohammad A. ;
Al-Alem, Fatimah ;
Al-Ayyoub, Mahmoud ;
Jararweh, Yaser ;
Gupta, Brij .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (03) :3649-3688
[4]  
[Anonymous], 2001, Intrusion Detection Systems
[5]  
[Anonymous], 2004, P IEEE INT C ADV INT
[6]   DDoS attack detection method based on network abnormal behaviour in big data environment [J].
Chen, Jing ;
Tang, Xiangyan ;
Cheng, Jieren ;
Wang, Fengkai ;
Xu, Ruomeng .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 23 (01) :22-30
[7]   Enhanced recursive feature elimination [J].
Chen, Xue-Wen ;
Jeong, Jong Cheol .
ICMLA 2007: SIXTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2007, :429-435
[8]   Multi Factor Two-way Hash-Based Authentication in Cloud Computing [J].
DeviPriya, K. ;
Lingamgunta, Sumalatha .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (02) :56-76
[9]  
Dhanabal L., 2015, Int. J. Adv. Res. Comput. Commun. Eng., V4, P446
[10]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217