Scalable Inline Network-Intrusion Detection System with Minimized Memory Requirement

نویسندگان

چکیده

Currently used network-intrusion detection systems (NIDSs) using deep learning have limitations in processing large amounts of data real time. This is because collecting flow information and creating features are time consuming require considerable memory. To solve this problem, a novel NIDS with θ(1) memory complexity for proposed study. Owing to its small requirement, the model can handle numerous concurrent flows. In addition, it uses raw packet as input models, resulting lightweight feature-creation process. For fast detection, classifies received packet, though prone false detection. weakness solved through validation research, high accuracy. Furthermore, real-time possible since intrusion be performed every Inception model. A performance comparison existing methods confirmed an effectively improved lower requirement by 73% 77% on average while maintaining Thus, overcome problems modern deep-learning-based NIDSs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Intrusion Detection System with Data Mart

Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also common to have more than one NIDS device and reporting from a consolidated multi-NIDS device. To provide a platform for multi-NIDS device reporting and analysis, this paper describes a consolidated database, or Data Mart des...

متن کامل

Building intrusion pattern miner for Snort network intrusion detection system

In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and sequential intrusion patterns from a col...

متن کامل

Network Intrusion Forensic Analysis Using Intrusion Detection System

The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...

متن کامل

Network Security Using Linux Intrusion Detection System

Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Realtime Analysis of Network Traffic) being a Linux based Intru...

متن کامل

Ensemble Classifiers for Network Intrusion Detection System

Two of the major challenges in designing anomaly intrusion detection are to maximize detection accuracy and to minimize false alarm rate. In addressing this issue, this paper proposes an ensemble of one-class classifiers where each adopts different learning paradigms. The techniques deployed in this ensemble model are; Linear Genetic Programming (LGP), Adaptive Neural Fuzzy Inference System (AN...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12092061