Intrusion Detection System using Autoencoder based Deep Neural Network for SME Cybersecurity

被引:0
作者
Ubaidillah, Khaizuran Aqhar [1 ]
Hisham, Syifak Izhar [1 ]
Ernawan, Ferda [1 ]
Badshah, Gran [2 ]
Suharto, Edy [3 ]
机构
[1] Univ Malaysia Pahang, Fac Comp, Pekan 26600, Pahang, Malaysia
[2] King Khalid Univ Abha, Coll Comp Sci, Abha, Saudi Arabia
[3] Diponegoro Univ, Dept Informat, Semarang, Indonesia
来源
2021 5TH INTERNATIONAL CONFERENCE ON INFORMATICS AND COMPUTATIONAL SCIENCES (ICICOS 2021) | 2021年
关键词
security; cyber threats; cybersecurity; network monitoring; detection system; deep neural network;
D O I
10.1109/ICICOS53627.2021.9651851
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an intermediate solution using artificial intelligence to monitor any potential threat for SME, specifically in Malaysia. The proposed method uses Autoencoder based Deep Neural Network (AEDNN) trained with NSL-KDD dataset to efficiently detect possible cyber threats. This paper proposed AEDNN to detect automated threats cybersecurity and it does not intend to replace any existing security solutions. The proposed AEDNN is designed to detect any possible cyber threats accurately and consistently in the real-time network. The experimental results show that accurate results in the range between 96% to 99% specifically for SMEs in Malaysia.
引用
收藏
页数:6
相关论文
共 15 条
[1]  
Al-Emadi S., 2020, INT C INF IOT EN TEC, P1
[2]  
Alahmari A., 2020, 2020 INT C CYB SIT A, P1
[3]  
Amarasinghe A. M. S. N., 2019, 2019 International Conference on Advancements in Computing (ICAC), P363, DOI 10.1109/ICAC49085.2019.9103372
[4]  
Halawa L. J., 2019, 2019 3 INT C INFORMA, P1
[5]   Evaluation of Cybersecurity Data Set Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies [J].
Larriva-Novo, Xavier A. ;
Vega-Barbas, Mario ;
Villagra, Victor A. ;
Sanz Rodrigo, Mario .
IEEE ACCESS, 2020, 8 :9005-9014
[6]   Characterization of Tor Traffic using Time based Features [J].
Lashkari, Arash Habibi ;
Gil, Gerard Draper ;
Mamun, Mohammad Saiful Islam ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :253-262
[7]   Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles [J].
Lee, Jonghoon ;
Kim, Jonghyun ;
Kim, Ikkyun ;
Han, Kijun .
IEEE ACCESS, 2019, 7 :165607-165626
[8]  
Mujaddidurrahman Auliya, 2021, 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM), P685, DOI 10.1109/ICSECS52883.2021.00130
[9]  
Naseer S., 2020, SYMMETRY, V12, P1
[10]   Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture [J].
Ortiz-Garces, Ivan ;
Andrade, Roberto O. ;
Cazares, Maria .
2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, :366-370