4.5 Article

Analysis of intrusion detection in cyber attacks using DEEP learning neural networks

Journal

PEER-TO-PEER NETWORKING AND APPLICATIONS
Volume 14, Issue 4, Pages 2565-2584

Publisher

SPRINGER
DOI: 10.1007/s12083-020-00999-y

Keywords

Autonomous networks; Wireless; Security; Trust; Detection of intrusion; Dynamic games; Detection of changes

Ask authors/readers for more resources

In the digital era, network security has become crucial, with machine learning techniques playing a key role in network intrusion detection. This study utilized supervised and unsupervised learning methods to enhance the accuracy and efficiency of intrusion detection systems. The results show that different types of attacks have varying detection rates.
In this digital period, internet has turned into an indispensable wellspring of correspondence in just about every calling. With the expanded use of system engineering, its security has developed to be exceptionally discriminating issue as the workstations in distinctive association hold very private data and touchy information. The system which helps in screening the system security is termed as Network detection. Intrusion detection is to get ambushes against a machine structure. One of the vital tests to Intrusion Detection is the issue of misjudgment, misdetection and unsuccessful deficiency of steady response to the strike. In the past years, as the second line of boundary after firewall, the Intrusion Detection (ID) strategy has got speedy progression. Two diverse Machine Learning techniques are prepared in this research work, which include both supervised and unsupervised, for Network Intrusion Detection. Naive Bayes (supervised learning) and Self Organizing Maps (unsupervised learning) are the presented techniques. Deep learning techniques such as CNN is used for feature extraction. These remain provisional chances adaptation technique and pointer variables transformation. The two machine learning procedures are prepared on both kind of transformed dataset and afterward their outcomes are looked at with respect to the correctness of intrusion detection. The best Detection Rate (DR) was for the 93.0% User to Root attack (U2R) attack type and the most horrible result was display for Denial of Service attack (DOS) attacks with 0.02%.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available