FEED-FORWARD INTRUSION DETECTION AND CLASSIFICATION ON A SMART GRID NETWORK

被引:4
作者
Aribisala, Adedayo [1 ]
Khan, Mohammad S. [1 ]
Husari, Ghaith [1 ]
机构
[1] East Tennessee State Univ, Dept Comp, Johnson City, TN 37614 USA
来源
2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) | 2022年
关键词
NSL-KDD; MLP; FFNN; ANN; Anomaly Detection; Ingress Packet Filtering; Packet classification; SEQ-FFNN;
D O I
10.1109/CCWC54503.2022.9720898
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyberattack detection modeling on a smart grid and critical networks is rising due to the growing number of successful, sophisticated attacks to industrial controllers and critical infrastructure using False Data Injection Attack (FDIA), Distributed Denial of Service (DDoS), and Data replay attacks. Integrating Deep Learning algorithms, i.e., Artificial Neural Network (ANN), Convolutional Neural Network and Recurrent Neural Network (RNN), with Network Intrusion Detection Systems (NIDs), and Host-based Intrusion Detection Systems (HIDs) can improve the critical infrastructures' accuracy during anomaly detection, class classification, and ingress packet filtering. This paper leveraged the ANN's sequential classifier in training, testing, and accurately predicting the attack vectors held in the NSL-KDD dataset, which led to the proposal of a hybrid Multilayer Perceptron(MLP) Sequential-Feedforward Neural Network (SEQ-FFNN). NSL-KDD is a foundational cyber-attack modeling dataset that holds transmission protocols like TCP/IP, HTTP, and POP, critical to packet propagation in all networking infrastructures. SEQ-FFNN is a self-learning model that performs a Principal component analysis, Hyperparametization, Testing, Training, and Prediction of accurate outputs; during each code iteration. SEQ-FFNN detected and classified the attack packets to return improved accuracy of 98.97% for Tanh activated layers and 99.59% for the Sigmoid activated model.
引用
收藏
页码:99 / 105
页数:7
相关论文
共 21 条
[1]  
Andreatos A., 2019, MODULAR INTRUSION DE, V6
[2]  
Aribisala A., 2021, IEEE IEMCON, V1, P3
[3]  
Brian: Privacy End, 2021, BIGG DAT BREACH
[4]   Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks [J].
Ding, Yalei ;
Zhai, Yuqing .
PROCEEDINGS OF 2018 THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2018) / 2018 THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY (ICIMT 2018), 2018, :81-85
[5]  
Ghanem, 2020, EFFICIENT OPTIMIZATI
[6]   An efficient optimization approach for designing machine learning models based on genetic algorithm [J].
Hamdia, Khader M. ;
Zhuang, Xiaoying ;
Rabczuk, Timon .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (06) :1923-1933
[7]   Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security [J].
Jiang, Feng ;
Fu, Yunsheng ;
Gupta, B. B. ;
Liang, Yongsheng ;
Rho, Seungmin ;
Lou, Fang ;
Meng, Fanzhi ;
Tian, Zhihong .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02) :204-212
[8]  
Kumar Anjani, 2020, DEEP LEARNING ARTIFI
[9]   An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM [J].
Lu, Guanyu ;
Tian, Xiuxia .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[10]   Convolutional LSTM based transportation mode learning from raw GPS trajectories [J].
Nawaz, Asif ;
Huang Zhiqiu ;
Wang Senzhang ;
Hussain, Yasir ;
Khan, Izhar ;
Khan, Zaheer .
IET INTELLIGENT TRANSPORT SYSTEMS, 2020, 14 (06) :570-577