Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques

The network anomaly and threat detection are essential components of the cyber security field due to continually growing network traffic and the frequent emergence of new attack types. Deep learning (DL) has become increasingly important in anomaly detection in recent years, particularly in the fiel...

Full description

Saved in:
Bibliographic Details
Published in:2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) pp. 1 - 6
Main Authors: Akkepalli, Srinivas, Sagar, K
Format: Conference Proceeding
Language:English
Published: IEEE 16.05.2024
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The network anomaly and threat detection are essential components of the cyber security field due to continually growing network traffic and the frequent emergence of new attack types. Deep learning (DL) has become increasingly important in anomaly detection in recent years, particularly in the field of cyber security. While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize for adjust to the evolving novel patterns in the data. As a result, in recent years, cyber security has taken center stage. Identification of potential attack patterns requires careful observation and analysis of network traffic data. This research includes a variety of methodologies from the fields of computers, statistics, information, and technology, including machine learning. This paper describes a DL model more precisely, a Bidirectional LSTM that combines the unique benefits of RNN (Recurrent Neural Network) and a convolution neural network. The suggested model has a relatively low FPR (False Positive Rate), a high detection rate and high accuracy. Ultimately, this study assesses the efficacy of deep learning approaches and the suggested model in the domain of network anomaly detection by comparing them to the most recent machine learning models.
AbstractList The network anomaly and threat detection are essential components of the cyber security field due to continually growing network traffic and the frequent emergence of new attack types. Deep learning (DL) has become increasingly important in anomaly detection in recent years, particularly in the field of cyber security. While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize for adjust to the evolving novel patterns in the data. As a result, in recent years, cyber security has taken center stage. Identification of potential attack patterns requires careful observation and analysis of network traffic data. This research includes a variety of methodologies from the fields of computers, statistics, information, and technology, including machine learning. This paper describes a DL model more precisely, a Bidirectional LSTM that combines the unique benefits of RNN (Recurrent Neural Network) and a convolution neural network. The suggested model has a relatively low FPR (False Positive Rate), a high detection rate and high accuracy. Ultimately, this study assesses the efficacy of deep learning approaches and the suggested model in the domain of network anomaly detection by comparing them to the most recent machine learning models.
Author Sagar, K
Akkepalli, Srinivas
Author_xml – sequence: 1
  givenname: Srinivas
  surname: Akkepalli
  fullname: Akkepalli, Srinivas
  email: India.sress2020@gmail.com
  organization: Osmania University,Hyderabad,Telangana,India,500007
– sequence: 2
  givenname: K
  surname: Sagar
  fullname: Sagar, K
  email: sagar.k@sreyas.ac.in
  organization: Osmania University,Hyderabad,Telangana,India,500007
BookMark eNo1j0FPgzAYhmuiB537Bx7qXbCltLRHNqcjQUwcu5kshX7Vxq3MwmL4925RT-9zePIk7xU6950HhG4piSkl6r54zVeLWhCepnFCkjSmR5Qik2doqjIlGSeMKE7kJXrLfbfT2zGa6R4MrmD47sInLvwQDr3rPH6AAdrhROve-Xe8HJvgDJ5X1R2euahc1c9HB_a4BB38yaih_fDu6wD9NbqwetvD9G8naP24qOfLqHx5KuZ5GTlK1RAZqqxsqdWNlDxNiDCSWCMapYFSaJNEZoZoSqRV0AhlrWRCWyCCp0w1vGETdPPbdQCw2Qe302Hc_J9mPzWiUf0
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IRASET60544.2024.10548678
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350309508
EndPage 6
ExternalDocumentID 10548678
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-d19f8c1fab8854206d80fd6b9ae11ec2287d0a108f9eb69ff836afe065439b5b3
IEDL.DBID RIE
IngestDate Wed Jul 03 05:40:20 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-d19f8c1fab8854206d80fd6b9ae11ec2287d0a108f9eb69ff836afe065439b5b3
PageCount 6
ParticipantIDs ieee_primary_10548678
PublicationCentury 2000
PublicationDate 2024-May-16
PublicationDateYYYYMMDD 2024-05-16
PublicationDate_xml – month: 05
  year: 2024
  text: 2024-May-16
  day: 16
PublicationDecade 2020
PublicationTitle 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)
PublicationTitleAbbrev IRASET
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8705652
Snippet The network anomaly and threat detection are essential components of the cyber security field due to continually growing network traffic and the frequent...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Bi-LSTM
CNN
Computational modeling
Computer crime
Deep learning
NSL KDD
Recurrent neural networks
RNN
Statistical analysis
Telecommunication traffic
Threat assessment
Title Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques
URI https://ieeexplore.ieee.org/document/10548678
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA22iHhSseI3ETyautnNZpOjrS0t1KXYFXoQymYzkYJui61C_71JulU8ePAWQiAwIXmTmXlvELq2Hi0TFmcJWHAgjHMg1guXJCwsfApd2BfQdy0ZJGkqxmM5rMjqngsDAL74DJpu6HP5elZ8uFCZveGxE4gTNVRLkmRN1tpBV5Vu5m3_8W7Uyax_zlywJGTNzfpfnVM8cHT3_rnlPmr8UPDw8BtcDtAWlIfo2X7W3_LXFWlZ7NE4XZdw437pmBPWwPgelr60qsS-FAD3Vo6QhdtpeoNbUzIYZQ92DcxxJav6grONhuuigZ66nazdI1V7BDKlVC6JptKIgppcCRGzMOBaBEZzJXOgFIrQ_oV0kNNAGAmKS2NExHMDnk0qVayiI1QvZyUcI6wo1xEoYZ1DxgqppBPJj0zsnkMmwJyghjPNZL5WwJhsrHL6x_wZ2nUH4LLslJ-jurUCXKDt4nM5Xbxf-nP7AstImPY
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA1aRT2pWPHbCB5NbXazMTnaamlxuxS7Qg9C2WwmUtBtsVXovzdJt4oHD95CSAhMyLxJMu8NQpc2omXC4iwBCw6EcQ7ERuGSBLmFT6Fz6wF91ZL4JknEYCB7JVndc2EAwCefQc01_V--Hucf7qnMnvDICcSJVbQWMRbQBV1rA12UypnXncfb_n1qI3TmnksCVlvO-FU7xUNHa_ufi-6g6g8JD_e-4WUXrUCxh57tdf0te52ThkUfjZNFEjfuFI47YU2M72Dmk6sK7JMBcHvuKFm4mSRXuDEicT_t2jEwwaWw6gtOlyqu0yp6at2nzTYpCySQEaVyRjSVRuTUZEqIiAV1rkXdaK5kBpRCHtjbkK5ntC6MBMWlMSLkmQHPJ5UqUuE-qhTjAg4QVpTrEJSw4SFjuVTSyeSHJnIOkQkwh6jqTDOcLDQwhkurHP3Rf44222k3Hsad5OEYbbnNcH_ulJ-girUInKL1_HM2mr6f-T38Au8anD0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+4th+International+Conference+on+Innovative+Research+in+Applied+Science%2C+Engineering+and+Technology+%28IRASET%29&rft.atitle=Anomaly-Based+Network+Intrusion+Detection+Using+Hybrid+CNN%2C+Bi-LSTM+Deep+Learning+Techniques&rft.au=Akkepalli%2C+Srinivas&rft.au=Sagar%2C+K&rft.date=2024-05-16&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FIRASET60544.2024.10548678&rft.externalDocID=10548678