Hybrid Optimization Enabled Robust CNN-LSTM Technique for Network Intrusion Detection

被引:22
作者
Deore, Bhushan [1 ]
Bhosale, Surendra [1 ]
机构
[1] Veermata Jijabai Technol Inst, Dept Elect Engn, Mumbai 400019, Maharashtra, India
关键词
Feature extraction; Network intrusion detection; Deep learning; Computational modeling; Training; Security; Optimization; Intrusion detection; deep long short-term memory; chimp optimization algorithm; chicken swarm optimization algorithm; convolutional neural network features; MACHINE;
D O I
10.1109/ACCESS.2022.3183213
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, computer networks and the Internet are unprotected from many security threats. Introducing adaptive and flexible security-related techniques is challenging because of the new types of frequently occurring attacks. An intrusion detection system (IDS) is a security device similar to other measures, including firewalls, antivirus software, and access control models devised to strengthen communication and information security. Network intrusion detection system (NIDS) plays a vital function in defending computer networks and systems. However, several issues concerning the sustainability and feasibility of existing techniques are faced with recent networks. These concerns are directly related to the rising levels of necessary human interactions and reducing the level of detection accuracy. Several approaches are designed to detect and manage various security threats in a network. This study uses Chimp Chicken Swarm Optimization-based Deep Long Short-Term Memory (ChCSO-driven Deep LSTM) for the intrusion detection process. A CNN feature extraction process is necessary for effective intrusion detection. Here, the Deep LSTM is applied for detecting network intrusion, and the Deep LSTM is trained using a designed optimization technique to enhance the detection performance.
引用
收藏
页码:65611 / 65622
页数:12
相关论文
共 25 条
[1]   Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages [J].
Abuadlla, Yousef ;
Kvascev, Goran ;
Gajin, Slavko ;
Jovanovic, Zoran .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (02) :601-622
[2]   Autoencoder-based deep metric learning for network intrusion detection [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
Malerba, Donato .
INFORMATION SCIENCES, 2021, 569 (569) :706-727
[3]  
Anita J.S., 2019, MULTIMEDIA RES, V2, P9
[4]  
[Anonymous], NSL-KDD dataset taken from
[5]  
[Anonymous], BOT-IoT Dataset taken from
[6]   An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System [J].
De Carvalho Bertoli, Gustavo ;
Pereira Junior, Lourenco Alves ;
Saotome, Osamu ;
Dos Santos, Aldri L. ;
Verri, Filipe Alves Neto ;
Marcondes, Cesar Augusto Cavalheiro ;
Barbieri, Sidnei ;
Rodrigues, Moises S. ;
Parente De Oliveira, Jose M. .
IEEE ACCESS, 2021, 9 :106790-106805
[7]  
Hojage A, 2021, Multimed Res, V4, P7
[8]  
Jilani SF, 2018, 2018 IEEE MTT-S INTERNATIONAL MICROWAVE WORKSHOP SERIES ON 5G HARDWARE AND SYSTEM TECHNOLOGIES (IMWS-5G)
[9]   A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection [J].
Khan, Farrukh Aslam ;
Gumaei, Abdu ;
Derhab, Abdelouahid ;
Hussain, Amir .
IEEE ACCESS, 2019, 7 :30373-30385
[10]   Chimp optimization algorithm [J].
Khishe, M. ;
Mosavi, M. R. .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 149