Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques

The network anomaly and threat detection are essential components of the cyber security field due to continually growing network traffic and the frequent emergence of new attack types. Deep learning (DL) has become increasingly important in anomaly detection in recent years, particularly in the fiel...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) s. 1 - 6
Hlavní autoři: Akkepalli, Srinivas, Sagar, K
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 16.05.2024
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The network anomaly and threat detection are essential components of the cyber security field due to continually growing network traffic and the frequent emergence of new attack types. Deep learning (DL) has become increasingly important in anomaly detection in recent years, particularly in the field of cyber security. While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize for adjust to the evolving novel patterns in the data. As a result, in recent years, cyber security has taken center stage. Identification of potential attack patterns requires careful observation and analysis of network traffic data. This research includes a variety of methodologies from the fields of computers, statistics, information, and technology, including machine learning. This paper describes a DL model more precisely, a Bidirectional LSTM that combines the unique benefits of RNN (Recurrent Neural Network) and a convolution neural network. The suggested model has a relatively low FPR (False Positive Rate), a high detection rate and high accuracy. Ultimately, this study assesses the efficacy of deep learning approaches and the suggested model in the domain of network anomaly detection by comparing them to the most recent machine learning models.
AbstractList The network anomaly and threat detection are essential components of the cyber security field due to continually growing network traffic and the frequent emergence of new attack types. Deep learning (DL) has become increasingly important in anomaly detection in recent years, particularly in the field of cyber security. While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize for adjust to the evolving novel patterns in the data. As a result, in recent years, cyber security has taken center stage. Identification of potential attack patterns requires careful observation and analysis of network traffic data. This research includes a variety of methodologies from the fields of computers, statistics, information, and technology, including machine learning. This paper describes a DL model more precisely, a Bidirectional LSTM that combines the unique benefits of RNN (Recurrent Neural Network) and a convolution neural network. The suggested model has a relatively low FPR (False Positive Rate), a high detection rate and high accuracy. Ultimately, this study assesses the efficacy of deep learning approaches and the suggested model in the domain of network anomaly detection by comparing them to the most recent machine learning models.
Author Sagar, K
Akkepalli, Srinivas
Author_xml – sequence: 1
  givenname: Srinivas
  surname: Akkepalli
  fullname: Akkepalli, Srinivas
  email: India.sress2020@gmail.com
  organization: Osmania University,Hyderabad,Telangana,India,500007
– sequence: 2
  givenname: K
  surname: Sagar
  fullname: Sagar, K
  email: sagar.k@sreyas.ac.in
  organization: Osmania University,Hyderabad,Telangana,India,500007
BookMark eNo1j0FPgzAYhmuiB537Bx7qXbCltLRHNqcjQUwcu5kshX7Vxq3MwmL4925RT-9zePIk7xU6950HhG4piSkl6r54zVeLWhCepnFCkjSmR5Qik2doqjIlGSeMKE7kJXrLfbfT2zGa6R4MrmD47sInLvwQDr3rPH6AAdrhROve-Xe8HJvgDJ5X1R2euahc1c9HB_a4BB38yaih_fDu6wD9NbqwetvD9G8naP24qOfLqHx5KuZ5GTlK1RAZqqxsqdWNlDxNiDCSWCMapYFSaJNEZoZoSqRV0AhlrWRCWyCCp0w1vGETdPPbdQCw2Qe302Hc_J9mPzWiUf0
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IRASET60544.2024.10548678
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350309508
EndPage 6
ExternalDocumentID 10548678
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-d19f8c1fab8854206d80fd6b9ae11ec2287d0a108f9eb69ff836afe065439b5b3
IEDL.DBID RIE
IngestDate Wed Jul 03 05:40:20 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-d19f8c1fab8854206d80fd6b9ae11ec2287d0a108f9eb69ff836afe065439b5b3
PageCount 6
ParticipantIDs ieee_primary_10548678
PublicationCentury 2000
PublicationDate 2024-May-16
PublicationDateYYYYMMDD 2024-05-16
PublicationDate_xml – month: 05
  year: 2024
  text: 2024-May-16
  day: 16
PublicationDecade 2020
PublicationTitle 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)
PublicationTitleAbbrev IRASET
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8699164
Snippet The network anomaly and threat detection are essential components of the cyber security field due to continually growing network traffic and the frequent...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Bi-LSTM
CNN
Computational modeling
Computer crime
Deep learning
NSL KDD
Recurrent neural networks
RNN
Statistical analysis
Telecommunication traffic
Threat assessment
Title Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques
URI https://ieeexplore.ieee.org/document/10548678
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5aRDypWPFNBI-mbrb7SI62trRQl2JX6UEoeUykoNtiq9B_b5LdKh48eAshEPKFZDKT-b5B6CoxTDW1AcIjFZJIa0qYME1iXWaZyCA2ZbzjaZBmGRuP-bAiq3suDAD45DNouKb_y9cz9eFCZfaEx04gjm2izTRNS7LWNrqsdDNv-g-3o05u3-eRC5aEUWM9_lflFG84urv_nHIP1X8oeHj4bVz20QYUB-jZOutv4nVFWtb2aJyVKdy4XzjmhAUY38HSp1YV2KcC4N7KEbJwO8uucWtKBqP83o6BOa5kVV9wvtZwXdTRY7eTt3ukKo9AppTyJdGUW6CpEZKxOAqDRLPA6ERyAZSCCq0vpANBA2Y4yIQbw5qJMODZpFzGsnmIasWsgCOENZMQKZPqkCu3XCHtfSxSrbiOQx3Fx6juoJnMSwWMyRqVkz_6T9GO2wD3y06TM1SzKMA52lKfy-ni_cLv2xdT4ZvY
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA1aRT2pWPHbCB5N3Wyz2-Roa6XF7VLsKj0IJZ9S0G2xVei_N8luFQ8evIWQEPJCMpnJvBcALmNDZV0ZjRiRISJKYUS5qSPrMotYBJEp4h1PSSNN6XDI-iVZ3XNhtNY--UzXXNG_5auJ_HChMrvDIycQR1fBWkRIiAu61ga4KJUzr7sPN4N2Zm_oxIVLQlJb9vj1d4o3HXfb_xx0B1R_SHiw_21edsGKzvfAs3XX3_jrAjWt9VEwLZK4YTd33AkLMbzVc59clUOfDAA7C0fJgq00vYLNMUoGWc-20VNYCqu-wGyp4jqrgse7dtbqoPKDBDTGmM2RwsxCjQ0XlEYkDGJFA6NiwbjGWMvQekMq4DighmkRM2NoPeZGez4pE5Go74NKPsn1AYCKCk2kaaiQSTddLuyJzBtKMhWFikSHoOqgGU0LDYzREpWjP-rPwWYn6yWjpJveH4MttxjuzR3HJ6BiEdGnYF1-zsez9zO_hl-dF58f
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+4th+International+Conference+on+Innovative+Research+in+Applied+Science%2C+Engineering+and+Technology+%28IRASET%29&rft.atitle=Anomaly-Based+Network+Intrusion+Detection+Using+Hybrid+CNN%2C+Bi-LSTM+Deep+Learning+Techniques&rft.au=Akkepalli%2C+Srinivas&rft.au=Sagar%2C+K&rft.date=2024-05-16&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FIRASET60544.2024.10548678&rft.externalDocID=10548678