Intrusion Detection System Using Deep Belief Network & Particle Swarm Optimization

被引:0
|
作者
P. J. Sajith
G. Nagarajan
机构
[1] Sathyabama Institute of Science and Technology,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2022年 / 125卷
关键词
Adaptive neuro fuzzy inference system; Deep learning; Deep belief network; Harris Hawks optimization; Particle swarm optimization;
D O I
暂无
中图分类号
学科分类号
摘要
Securing the services of security such as data integrity, confidentiality and availability is one of the great challenges. Failure to secure above will potentially lead many cyber-attacks. One of the greatest hits for detecting intrusion is an intrusion detection system (IDS) and there are so many advances put forward by many researchers. Even though there exists a large number of Intrusion Detection Systems intruders are still continuing with their job. Another evolving and yet revolutionized strategies is Deep Learning. So, integrating these two systems to create an effective model that could potentially find normal or malicious attacks. In this paper, we classify intrusion using Deep Belief Network and Particle Swarm Optimization into categories like Normal, Probe, DoS, U2R, R2L. The dataset used for applying this model is DARPA 1999 and they are evaluated under various measures. Also, the proposed system is compared with other system like ANFIS, HHO, Fuzzy GNP in which our system outperforms better with greater accuracy of 96.5%.
引用
收藏
页码:1385 / 1403
页数:18
相关论文
共 50 条
  • [31] Network Intrusion Detection Based on Deep Belief Network Broad Equalization Learning System
    Deng, Miaolei
    Sun, Chuanchuan
    Kan, Yupei
    Xu, Haihang
    Zhou, Xin
    Fan, Shaojun
    ELECTRONICS, 2024, 13 (15)
  • [32] MapReduce Intrusion Detection System based on a Particle Swarm Optimization Clustering Algorithm
    Aljarah, Ibrahim
    Ludwig, Simone A.
    2013 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2013, : 955 - 962
  • [33] An Intrusion Detection Model Based on Deep Belief Network
    Qu, Feng
    Zhang, Jitao
    Shao, Zetian
    Qi, Shuzhuang
    PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 97 - 101
  • [34] Intrusion Detection using Deep Belief Networks
    Alom, Md. Zahangir
    Bontupalli, VenkataRamesh
    Taha, Tarek M.
    PROCEEDINGS OF THE 2015 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2015, : 339 - 344
  • [35] DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things
    Ahmad, Jawad
    Shah, Syed Aziz
    Latif, Shahid
    Ahmed, Fawad
    Zou, Zhuo
    Pitropakis, Nikolaos
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8112 - 8121
  • [36] Intrusion Detection Network Based on Fuzzy C-Means and Particle Swarm Optimization
    Zhang, Zhongxing
    Gu, Baoping
    PROCEEDINGS OF THE 6TH INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION, VOL 2: INNOVATION AND PRACTICE OF INDUSTRIAL ENGINEERING AND MANAGMENT, 2016, : 111 - 119
  • [37] Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network
    Durairaj, Danalakshmi
    Venkatasamy, Thiruppathy Kesavan
    Mehbodniya, Abolfazl
    Umar, Syed
    Alam, Tanweer
    ENERGY SOURCES PART A-RECOVERY UTILIZATION AND ENVIRONMENTAL EFFECTS, 2024, 46 (01) : 1519 - 1541
  • [38] Network Intrusion Detection System using Deep Learning
    Ashiku, Lirim
    Dagli, Cihan
    BIG DATA, IOT, AND AI FOR A SMARTER FUTURE, 2021, 185 : 239 - 247
  • [39] CPUusage prediction for cloud resource provisioning based on deep belief network and particle swarm optimization
    Wen, Yiping
    Wang, Yuan
    Liu, Jianxun
    Cao, Buqing
    Fu, Qi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (14):
  • [40] An Intrusion Detection System Based on Deep Belief Networks
    Belarbi, Othmane
    Khan, Aftab
    Carnelli, Pietro
    Spyridopoulos, Theodoros
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 377 - 392