Analysis of intrusion detection in cyber attacks using DEEP learning neural networks

  • PDF / 5,052,657 Bytes
  • 20 Pages / 595.276 x 790.866 pts Page_size
  • 2 Downloads / 216 Views

DOWNLOAD

REPORT


ORIGINAL PAPER

Analysis of intrusion detection in cyber attacks using DEEP learning neural networks Parasuraman Kumar 1 & A. Anbarasa Kumar 2 & C. Sahayakingsly 3 & A. Udayakumar 2 Received: 15 July 2020 / Accepted: 2 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract In this digital period, internet has turned into an indispensable wellspring of correspondence in just about every calling. With the expanded use of system engineering, its security has developed to be exceptionally discriminating issue as the workstations in distinctive association hold very private data and touchy information. The system which helps in screening the system security is termed as Network detection. Intrusion detection is to get ambushes against a machine structure. One of the vital tests to Intrusion Detection is the issue of misjudgment, misdetection and unsuccessful deficiency of steady response to the strike. In the past years, as the second line of boundary after firewall, the Intrusion Detection (ID) strategy has got speedy progression. Two diverse Machine Learning techniques are prepared in this research work, which include both supervised and unsupervised, for Network Intrusion Detection. Naive Bayes (supervised learning) and Self Organizing Maps (unsupervised learning) are the presented techniques. Deep learning techniques such as CNN is used for feature extraction. These remain provisional chances adaptation technique and pointer variables transformation. The two machine learning procedures are prepared on both kind of transformed dataset and afterward their outcomes are looked at with respect to the correctness of intrusion detection. The best Detection Rate (DR) was for the 93.0% User to Root attack (U2R) attack type and the most horrible result was display for Denial of Service attack (DOS) attacks with 0.02%. Keywords Autonomous networks . Wireless . Security . Trust . Detection of intrusion . Dynamic games . Detection of changes

1 Introduction This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications Guest Editor: Ching-Hsien Hsu * A. Anbarasa Kumar [email protected] Parasuraman Kumar [email protected] C. Sahayakingsly [email protected] A. Udayakumar [email protected]

A Network Intrusion Detection System investigates the approaching network traffic and distinguishes the distrustful action on the system. Network Intrusion Detection is the most critical and most broadly utilized system security strategy used to recognize the susceptible attacks by observing the system performance and afterward taking fundamental movements against them. Network Intrusion Detection [1] systems are divided into crowd based and net based. This grouping relies on the information foundations that remain utilized. Host Based system utilizes the histories and information sustained by the working system. By utilizing the histories, the system can screen equipment similar framework logs; clients record archives and docum