Deep Neural Network Based Real-Time Intrusion Detection System

نویسندگان

چکیده

Abstract In recent years, due to the rapid growth in network technology, numerous types of intrusions have been uncovered that differ from existing ones, and conventional firewalls with specific rule sets policies are incapable identifying those real-time. Therefore, demands requirement a real-time intrusion detection system (RT-IDS). The ultimate purpose this research is construct an RT-IDS capable by analysing inbound outbound data proposed consists deep neural (DNN) trained using 28 features NSL-KDD dataset. addition, it contains machine learning (ML) pipeline sequential components for categorical encoding feature scaling, which used before transmitting DNN model make predictions. Moreover, extractor, C++ program sniffs traffic derives relevant related dataset sniffed data, deployed between gateway router local area (LAN). Together model, ML hosted server can be accessed via representational state transfer application programming interface (REST API). has revealed outstanding testing performance results achieving 81%, 96%, 70% 81% accuracy, precision, recall f1-score accordingly. This comprises comprehensive technical explanation concerning implementation functionality complete system. leveraging extensive explanations provided paper, advanced IDSs modern constructed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real-Time Network Intrusion Detection System Based on Neural Networks

Traditional Network Intrusion Detection Systems (NIDSs) use rules to detect intrusions, with these rules being updated manually by knowledgeable engineers. With today’s complex network environment, a new systematic method is desired to detect intrusions automatically. Data mining techniques can be used to add a systematic intrusion detection capability to NIDSs. Data Mining is concerned with un...

متن کامل

NSTAT: A Model-based Real-time Network Intrusion Detection System

The Reliable Software Group at UCSB has developed a new approach to representing computer penetrations. This approach models penetrations as a series of state transitions described in terms of signature actions and state assertions. State transition representations are written to correspond to the states of an actual computer system, and they form the basis of a rule-based expert system for det...

متن کامل

Fast Learning Neural Network Intrusion Detection System

Assuring the security of networks is an increasingly challenging task. The number of online services and migration of traditional services like stocktrading and online payments to the Internet is still rising. On the other side, criminals are attracted by the values of business data, money transfers, etc. Therefore, safeguarding the network infrastructure is essential. As Intrusion Detection Sy...

متن کامل

Artificial Neural Network based Intrusion Detection System: A Survey

Detecting unknown or modified attacks is one of the recent challenges in the field of IDS. Anomaly based IDS can play a very important role in this case. In the first part of this paper, we will focus on how ANN is recently used to address these issues. Number of the researchers has already shown the importance of the various Artificial Neural Network (ANN) based techniques for anomaly detectio...

متن کامل

Flow-based Anomaly Intrusion Detection System Using Neural Network

tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data vectors based on a carefully be using spiking (biologically inspired) Artificial Neural Networks (SANN). neural network is applied to intrusion detection system model in this paper. Experimental improved PSO-BP neural network algorithm flow.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SN computer science

سال: 2022

ISSN: ['2661-8907', '2662-995X']

DOI: https://doi.org/10.1007/s42979-022-01031-1