Intrusion Detection System based on Network Traffic using Deep Neural Networks

被引:6
作者
Chamou, Dimitra [1 ]
Toupas, Petros [1 ]
Ketzaki, Eleni [1 ]
Papadopoulos, Stavros [1 ]
Giannoutakis, Konstantinos M. [1 ]
Drosou, Anastasios [1 ]
Tzovaras, Dimitrios [1 ]
机构
[1] Ctr Res & Technol Hellas CERTH, Informat Technol Inst, Thessaloniki, Greece
来源
2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD) | 2019年
基金
欧盟地平线“2020”;
关键词
Cybersecurity; Intrusion Detection System; Deep Neural Networks; DDoS Detection; Malware Detection;
D O I
10.1109/camad.2019.8858475
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the small-medium enterprises security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially and functionally. Novel and sophisticated attacks are emerging daily, targeting and threatening a large number of businesses around the world. For this reason, the implementation and optimization of the performance of Intrusion Detection Systems have attracted the interest of the scientific community. The malicious behavior detection in terms of DDoS and malware cyber-threats using deep learning methods constitutes an extended and the most important part of this paper. The experimental results for the real-time intrusion detection system showed that the proposed model can achieve high accuracy, and low false positive rate, while distinguishing between malicious and normal network traffic.
引用
收藏
页数:6
相关论文
共 26 条
[1]  
Abadi M., 2015, P 12 USENIX S OPERAT
[2]  
Aksu D., 2018, INTRUSION DETECTION, P141
[3]  
[Anonymous], 2018, INT J INFORM COMPUTE
[4]   DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions [J].
Bawany, Narmeen Zakaria ;
Shamsi, Jawwad A. ;
Salah, Khaled .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) :425-441
[5]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[6]   NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems [J].
Chung, Chun-Jen ;
Khatkar, Pankaj ;
Xing, Tianyi ;
Lee, Jeongkeun ;
Huang, Dijiang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) :198-211
[7]  
Dotcenko S, 2014, INT CONF ADV COMMUN, P167, DOI 10.1109/ICACT.2014.6778942
[8]  
Faruki P., 2013, ANDROSIMILAR ROBUST, V11, P152
[9]   Rational Design of PLGA Nanoparticle Vaccine Delivery Systems To Improve Immune Responses [J].
Gu, Pengfei ;
Wusiman, Adelijiang ;
Zhang, Yue ;
Liu, Zhenguang ;
Bo, Ruonan ;
Hu, Yuanliang ;
Liu, Jiaguo ;
Wang, Deyun .
MOLECULAR PHARMACEUTICS, 2019, 16 (12) :5000-5012
[10]   Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter? [J].
Holm, Hannes .
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, :4895-4904