A Method For Network Intrusion Detection Using Deep Learning

Authors

  • Nihar Mudigonda Rocklin High School

DOI:

https://doi.org/10.47611/jsrhs.v11i3.2875

Keywords:

network intrusion detection, deep learning

Abstract

In an increasingly digitally reliant world, organizations are facing the ever more challenging problem of how to best defend their digital information and infrastructure. Current non-machine learning methods for detecting network intrusion, like signature-based and anomaly-based algorithms, are slow and unreliable. Signature based detection holds signatures, or known information and warning signs, about a known attack and compares them to the current flow of data. If a signature matches with the network activity, users and network administrators are notified. Anomaly based detection is where the system monitors current network traffic and compares it to a set baseline traffic. Again, if any unusual traffic occurs, members of the network are notified. In this research, new advancements in deep learning algorithms are used to bolster the defenses of digital networks. Neural networks are used to create a multi-class classifier, which will determine whether the network activity is a certain type of malicious attack or benign. We will use the CICIDS2017 dataset (Canadian Institute of Cybersecurity), which is a state-of-the-art network intrusion dataset composed of computer network activity, including  multiple types of attacks such as DDoS, SQL Injection, and Brute Force. This research proposes a more precise network intrusion detection system (NIDS) to accurately detect malicious network activity. Better NIDSs will also prevent cybercrime and create a safer internet for all users.

Downloads

Download data is not yet available.

References or Bibliography

Restrepo, Ronny. “Derivative of the Sigmoid Function - a Worked Example.” RSS, 10 Aug. 2017, ronny.rest/blog/post_2017_08_10_sigmoid/.

“Hyperbolic Tangent.” From Wolfram MathWorld, 23 Nov. 2021, mathworld.wolfram.com/HyperbolicTangent.html.

Bagli, E., Grandini, M., & Visani, G. (2020, August 13). Metrics For Multi-Class Classification: An Overview. https://arxiv.org/pdf/2008.05756.pdf

Dansbecker, “Rectified Linear Units (ReLU) in Deep Learning.” Kaggle, 7 May 2018, www.kaggle.com/dansbecker/rectified-linear-units-relu-in-deep-learning.

Ghorbani, A. A., Lashkari, A. H., & Sharafaldin, I. (2018). In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Pages 108-116. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. https://www.scitepress.org/Papers/2018/66398/66398.pdf

Mohavedi, M., & Zamani, M. (2015, May 9). Machine Learning Techniques for Intrusion Detection. https://arxiv.org/pdf/1312.2177.pdf

Paola, J. D., & Schowengerdt, R. A. (May 1997). The Effect of Neural-Network Structure on a Multispectral Land-Use/Land-Cover Classification. http://www.asprs.org/wp-content/uploads/pers/1997journal/may/1997_may_535-544.pdf

Restrepo, Ronny. “Derivative of the Sigmoid Function - a Worked Example.” RSS, 10 Aug. 2017, ronny.rest/blog/post_2017_08_10_sigmoid/.

Sabhnani, M., & Serpen, G. (January 2003). Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context. https://neuro.bstu.by/ai/To-dom/My_research/Papers-0/For-research/D-mining/Anomaly-D/KDD-cup-99/CD4/mlmta03.pdf

Shukla, Lavanya. “Designing Your Neural Networks.” Medium, Towards Data Science, 23 Sept. 2019, towardsdatascience.com/designing-your-neural-networks-a5e4617027ed.

Wood, Thomas. “Softmax Function.” DeepAI, 17 May 2019, deepai.org/machine-learning-glossary-and-terms/softmax-layer.

Published

08-31-2022

How to Cite

Mudigonda, N. (2022). A Method For Network Intrusion Detection Using Deep Learning. Journal of Student Research, 11(3). https://doi.org/10.47611/jsrhs.v11i3.2875

Issue

Section

HS Research Projects