A Method For Network Intrusion Detection Using Deep Learning
DOI:
https://doi.org/10.47611/jsrhs.v11i3.2875Keywords:
network intrusion detection, deep learningAbstract
In an increasingly digitally reliant world, organizations are facing the ever more challenging problem of how to best defend their digital information and infrastructure. Current non-machine learning methods for detecting network intrusion, like signature-based and anomaly-based algorithms, are slow and unreliable. Signature based detection holds signatures, or known information and warning signs, about a known attack and compares them to the current flow of data. If a signature matches with the network activity, users and network administrators are notified. Anomaly based detection is where the system monitors current network traffic and compares it to a set baseline traffic. Again, if any unusual traffic occurs, members of the network are notified. In this research, new advancements in deep learning algorithms are used to bolster the defenses of digital networks. Neural networks are used to create a multi-class classifier, which will determine whether the network activity is a certain type of malicious attack or benign. We will use the CICIDS2017 dataset (Canadian Institute of Cybersecurity), which is a state-of-the-art network intrusion dataset composed of computer network activity, including multiple types of attacks such as DDoS, SQL Injection, and Brute Force. This research proposes a more precise network intrusion detection system (NIDS) to accurately detect malicious network activity. Better NIDSs will also prevent cybercrime and create a safer internet for all users.
Downloads
References or Bibliography
Restrepo, Ronny. “Derivative of the Sigmoid Function - a Worked Example.” RSS, 10 Aug. 2017, ronny.rest/blog/post_2017_08_10_sigmoid/.
“Hyperbolic Tangent.” From Wolfram MathWorld, 23 Nov. 2021, mathworld.wolfram.com/HyperbolicTangent.html.
Bagli, E., Grandini, M., & Visani, G. (2020, August 13). Metrics For Multi-Class Classification: An Overview. https://arxiv.org/pdf/2008.05756.pdf
Dansbecker, “Rectified Linear Units (ReLU) in Deep Learning.” Kaggle, 7 May 2018, www.kaggle.com/dansbecker/rectified-linear-units-relu-in-deep-learning.
Ghorbani, A. A., Lashkari, A. H., & Sharafaldin, I. (2018). In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Pages 108-116. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. https://www.scitepress.org/Papers/2018/66398/66398.pdf
Mohavedi, M., & Zamani, M. (2015, May 9). Machine Learning Techniques for Intrusion Detection. https://arxiv.org/pdf/1312.2177.pdf
Paola, J. D., & Schowengerdt, R. A. (May 1997). The Effect of Neural-Network Structure on a Multispectral Land-Use/Land-Cover Classification. http://www.asprs.org/wp-content/uploads/pers/1997journal/may/1997_may_535-544.pdf
Restrepo, Ronny. “Derivative of the Sigmoid Function - a Worked Example.” RSS, 10 Aug. 2017, ronny.rest/blog/post_2017_08_10_sigmoid/.
Sabhnani, M., & Serpen, G. (January 2003). Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context. https://neuro.bstu.by/ai/To-dom/My_research/Papers-0/For-research/D-mining/Anomaly-D/KDD-cup-99/CD4/mlmta03.pdf
Shukla, Lavanya. “Designing Your Neural Networks.” Medium, Towards Data Science, 23 Sept. 2019, towardsdatascience.com/designing-your-neural-networks-a5e4617027ed.
Wood, Thomas. “Softmax Function.” DeepAI, 17 May 2019, deepai.org/machine-learning-glossary-and-terms/softmax-layer.
Published
How to Cite
Issue
Section
Copyright (c) 2022 Nihar Mudigonda
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.