Automated network intrusion detection using multimodal networks

被引:2
作者
Pingale, Subhash V. [1 ,2 ]
Sutar, Sanjay R. [1 ]
机构
[1] Dr Babasaheb Ambedkar Technol Univ, Dept Informat Technol, Lonere, Raigad, India
[2] SKN Sinhgad Coll Engn, Pandharpur 413304, Solapur, India
关键词
intrusion detection system; multimodal networks; NSL-KDD dataset; cybersecurity; SECURITY; ALGORITHM; SELECTION; SYSTEMS; KDD99;
D O I
10.1504/IJCSE.2022.123123
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Intrusion detection requires accurate and timely detection of any bad connection that intends to exploit network vulnerabilities. Previous approaches have focused on deriving statistical features based on domain knowledge, followed by primitive machine learning and ensemble techniques. Grouping all the parameters as a single input to a model may not always be effective. In this paper, we propose using multimodal networks for network intrusion detection. The input logs are segregated into multiple sub-groups trained differently. Their intermediate representations are combined to produce the final prediction. This approach handles the strengths of individual features better as compared to normalisation. The system is evaluated on the NSL-KDD dataset and is compared with standard methods across multiple performance metrics. The proposed system achieves an accuracy of 83.5, highest as compared to other approaches. Channelling inputs for richer feature extraction is fast gaining traction, and we extend the same in cybersecurity.
引用
收藏
页码:339 / 352
页数:14
相关论文
共 46 条
[21]   A novel CNN based security guaranteed image watermarking generation scenario for smart city applications [J].
Li, Daming ;
Deng, Lianbing ;
Gupta, Brij Bhooshan ;
Wang, Haoxiang ;
Choi, Chang .
INFORMATION SCIENCES, 2019, 479 :432-447
[22]   Machine Learning-Driven Intrusion Detection for Contiki-NG-Based IoT Networks Exposed to NSL-KDD Dataset [J].
Liu, Jinxin ;
Kantarci, Burak ;
Adams, Carlisle .
PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020, 2020, :25-30
[23]   Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network [J].
Lu, Xue ;
Han, Dezhi ;
Duan, Letian ;
Tian, Qiuting .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) :221-232
[24]  
Malte A, 2019, TENCON IEEE REGION, P784, DOI [10.1109/TENCON.2019.8929493, 10.1109/tencon.2019.8929493]
[25]   Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System [J].
Mamta ;
Gupta, Brij B. ;
Li, Kuan-Ching ;
Leung, Victor C. M. ;
Psannis, Kostas E. ;
Yamaguchi, Shingo .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2021, 8 (12) :1877-1890
[26]  
McHugh J., 2000, ACM Transactions on Information and Systems Security, V3, P262, DOI 10.1145/382912.382923
[27]   The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set [J].
Moustafa, Nour ;
Slay, Jill .
INFORMATION SECURITY JOURNAL, 2016, 25 (1-3) :18-31
[28]   Biometrics-Based Un-Locker to Enhance Cloud Security Systems [J].
Narang, Ashima ;
Gupta, Deepali ;
Kaur, Amandeep .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (04) :1-12
[29]  
Olusola AA, 2010, LECT NOTES ENG COMP, P162
[30]  
Om H., 2012, Proceedings of the 2012 1st International Conference on Recent Advances in Information Technology (RAIT 2012), P131, DOI 10.1109/RAIT.2012.6194493