Optimizing intrusion detection systems using parallel metric learning

被引:5
|
作者
Sudha, M. [1 ]
Reddy, V. Mahesh Kumar [2 ]
Priya, W. Deva [3 ]
Rafi, Shaik Mohammad [4 ]
Subudhi, Sharmila [5 ]
Jayachitra, S. [6 ]
机构
[1] SASTRA Deemed Univ, Srinivasa Ramanujan Ctr, Dept ECE, Kumbakonam, India
[2] Chaitanya Bharathi Inst Technol, Dept EEE, Proddatur, Andhra Prades, India
[3] SIMATs Univ, Saveetha Sch Engn, Dept Comp Sci & Engn, Chennai, India
[4] Sri Mittapall Coll Engn, Dept Comp Sci & Engn, Guntur, Andhra Pradesh, India
[5] Maharaja Sriram Chandra Bhanja Deo Univ, Dept Comp Sci, Baripada, Odisha, India
[6] PSNA Coll Engn & Technol, Dept Elect & Commun Engn, Dindigul, Tamil Nadu, India
关键词
Intrusion detection systems; Parallel long-short-term memory; False alarm rates; Performance metrics; Network; Data security;
D O I
10.1016/j.compeleceng.2023.108869
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network and data security in corporate organizations face immense threats due to increasing online vulnerabilities. Intrusion Detection Systems (IDSs) play a vital role in combating these threats, yet their effectiveness is often compromised by a high incidence of false alarms. To mitigate this issue, we propose a novel intrusion detection method, based on Parallel Long-Short Term Memory (p-LSTM). This approach harnesses the power of parallelism to process network data more efficiently and accurately. Experimental outcomes demonstrate that our p-LSTM method significantly decreases false alarm rates, enhancing the reliability of intrusion detection. Moreover, it outperforms traditional LSTM and other cutting-edge algorithms in terms of specificity, recall, and F-score, thus underscoring its superiority. The successful implementation of our p-LSTM model signals a leap forward in the evolution of IDSs, promising better protection for corporate networks against external threats.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Intrusion Detection using Local Metric Learning
    Karimi, Zohre
    Ramezani, Rohollah
    2020 6TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS), 2020,
  • [2] A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning
    Cai, Shaokang
    Han, Dezhi
    Yin, Xinming
    Li, Dun
    Chang, Chin-Chen
    CONNECTION SCIENCE, 2022, 34 (01) : 551 - 577
  • [3] USING MACHINE LEARNING FOR INTRUSION DETECTION SYSTEMS
    Quang-Vinh Dang
    COMPUTING AND INFORMATICS, 2022, 41 (01) : 12 - 33
  • [4] Optimizing cybercrime detection: A hybrid deep learning approach for enhanced intrusion detection systems
    Rima Alshaya
    Salim E. L. khediri
    Peer-to-Peer Networking and Applications, 2025, 18 (3)
  • [5] Optimizing the scalability of network intrusion detection systems using mobile agents
    Marks D.G.
    Mell P.
    Stinson M.
    Journal of Network and Systems Management, 2004, 12 (1) : 95 - 110
  • [6] An Approach for Optimizing Ensemble Intrusion Detection Systems
    Stiawan, Deris
    Heryanto, Ahmad
    Bardadi, Ali
    Rini, Dian Palupi
    Subroto, Imam Much Ibnu
    Kurniabudi
    Bin Idris, Mohd Yazid
    Abdullah, Abdul Hanan
    Kerim, Bedine
    Budiarto, Rahmat
    IEEE ACCESS, 2021, 9 (09): : 6930 - 6947
  • [7] Optimizing intrusion detection using intelligent feature selection with machine learning model
    Aljehane, Nojood O.
    Mengash, Hanan A.
    Hassine, Siwar B. H.
    Alotaibi, Faiz A.
    Salama, Ahmed S.
    Abdelbagi, Sitelbanat
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 91 : 39 - 49
  • [8] Intrusion Detection in SCADA systems using Machine Learning Techniques
    Maglaras, Leandros A.
    Jiang, Jianmin
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 626 - 631
  • [9] Improved PSO for optimizing the performance of intrusion detection systems
    Dickson, Anne
    Thomas, Ciza
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (05) : 6537 - 6547
  • [10] Deep Learning in Intrusion Detection Systems
    Karatas, Gozde
    Demir, Onder
    Sahingoz, Ozgur Koray
    2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 113 - 116