A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks

نویسندگان

چکیده

An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to network. The effectiveness of IDS highly dependent data preprocessing techniques classification models used enhance accuracy reduce model training testing time. For the purpose anomaly identification, researchers have developed several machine learning deep learning-based algorithms; nonetheless, accurate with low test train times remains challenge. Using hybrid feature selection approach neural network- (DNN-) based classifier, authors this research suggest enhanced system (IDS). In order construct subset reduced optimal features that may be classification, consists three methods, namely, chi square, ANOVA, principal component analysis (PCA), applied. These methods are referred “the big three.” On NSL-KDD dataset, suggested receives then evaluated. proposed method was successful in achieving following results: reduction input by 40%, average 99.73%, precision score 99.75%, F1 99.72%, time 138% 2.7 seconds, respectively. findings experiments demonstrate superior performance other comparison approaches.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

Feature extraction strategies in deep learning based acoustic event detection

Non-speech acoustic events are significantly different between them, and usually require access to detail rich features. That is why directly modeling a real spectrogram can provide a significant advantage, instead of using predefined features that usually compress and downsample detail as typically done in speech recognition. This paper focuses on the importance of feature extraction for deep ...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2022

ISSN: ['1530-8669', '1530-8677']

DOI: https://doi.org/10.1155/2022/2215852