Network Anomaly Detection Using Hybrid Deep Learning Technique
نویسندگان
چکیده
Deep learning based intrusion detection system has acquired prominence in digital protection frameworks. The fundamental component of such a framework is to give an assurance the ICT foundation interruption recognition (IDS). Wise arrangements are exceptionally essential and expected control intricacy identification new assault types. smart frameworks, for example, Machine have broadly been acquainted with its advantages actually manage intricate layered information.The IDS various types known unknown attacks, however there chance improve attacks on implementing real case scenario. Thus, this paper proposes hybrid deep technique that combines convolutional neural network model Long short term memory improvise performance recognizing anomaly packets network. Experimentation carried out NSL KDD dataset performances compared traditional machine models terms common metrics as accuracy, sensitivity specificity.
منابع مشابه
A hybrid machine learning approach to network anomaly detection
Zero-day cyber attacks such as worms and spy-ware are becoming increasingly widespread and dangerous. The existing signature-based intrusion detection mechanisms are often not sufficient in detecting these types of attacks. As a result, anomaly intrusion detection methods have been developed to cope with such attacks. Among the variety of anomaly detection approaches, the Support Vector Machine...
متن کاملA Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection
Research into network anomaly detection has become crucial as a result of a significant increase in the number of computer attacks. Many approaches in network anomaly detection have been reported in the literature, but data or solutions typically are not freely available. Recently, a labeled network traffic flow dataset, Kyoto2006+, has been created and is publicly available. Most existing appr...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملConcept drift detection in business process logs using deep learning
Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in parallel computing
سال: 2022
ISSN: ['1879-808X', '0927-5452']
DOI: https://doi.org/10.3233/apc220014