Optimizing intrusion detection systems using parallel metric learning

被引:5
|
作者
Sudha, M. [1 ]
Reddy, V. Mahesh Kumar [2 ]
Priya, W. Deva [3 ]
Rafi, Shaik Mohammad [4 ]
Subudhi, Sharmila [5 ]
Jayachitra, S. [6 ]
机构
[1] SASTRA Deemed Univ, Srinivasa Ramanujan Ctr, Dept ECE, Kumbakonam, India
[2] Chaitanya Bharathi Inst Technol, Dept EEE, Proddatur, Andhra Prades, India
[3] SIMATs Univ, Saveetha Sch Engn, Dept Comp Sci & Engn, Chennai, India
[4] Sri Mittapall Coll Engn, Dept Comp Sci & Engn, Guntur, Andhra Pradesh, India
[5] Maharaja Sriram Chandra Bhanja Deo Univ, Dept Comp Sci, Baripada, Odisha, India
[6] PSNA Coll Engn & Technol, Dept Elect & Commun Engn, Dindigul, Tamil Nadu, India
关键词
Intrusion detection systems; Parallel long-short-term memory; False alarm rates; Performance metrics; Network; Data security;
D O I
10.1016/j.compeleceng.2023.108869
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network and data security in corporate organizations face immense threats due to increasing online vulnerabilities. Intrusion Detection Systems (IDSs) play a vital role in combating these threats, yet their effectiveness is often compromised by a high incidence of false alarms. To mitigate this issue, we propose a novel intrusion detection method, based on Parallel Long-Short Term Memory (p-LSTM). This approach harnesses the power of parallelism to process network data more efficiently and accurately. Experimental outcomes demonstrate that our p-LSTM method significantly decreases false alarm rates, enhancing the reliability of intrusion detection. Moreover, it outperforms traditional LSTM and other cutting-edge algorithms in terms of specificity, recall, and F-score, thus underscoring its superiority. The successful implementation of our p-LSTM model signals a leap forward in the evolution of IDSs, promising better protection for corporate networks against external threats.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Intrusion detection with evolutionary learning classifier systems
    Shafi K.
    Kovacs T.
    Abbass H.A.
    Zhu W.
    Natural Computing, 2009, 8 (1) : 3 - 27
  • [22] Survey of learning methods in intrusion detection systems
    1600, Institute of Electrical and Electronics Engineers Inc., United States
  • [23] Extreme Learning Machines for Intrusion Detection Systems
    de Farias, Gilles Paiva M.
    de Oliveira, Adriano L. I.
    Cabral, George G.
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT IV, 2012, 7666 : 535 - 543
  • [24] Survey of learning methods in intrusion detection systems
    Aburomman, Abdulla Amin
    Reaz, Mamun Bin Ibne
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, ELECTRONIC AND SYSTEMS ENGINEERING (ICAEES), 2016, : 362 - 365
  • [25] Autoencoder-based deep metric learning for network intrusion detection
    Andresini, Giuseppina
    Appice, Annalisa
    Malerba, Donato
    INFORMATION SCIENCES, 2021, 569 (569) : 706 - 727
  • [26] Intrusion detection system using sequence and set preserving metric
    Kumar, P
    Rao, MV
    Krishna, PR
    Bapi, RS
    Laha, A
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 498 - 504
  • [27] Optimizing Feature Selection in Intrusion Detection Systems Using a Genetic Algorithm with Stochastic Universal Sampling
    Akula, Radharani
    Kumar, G. S. Naveen
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (01) : 1059 - 1068
  • [28] A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and Challenges
    Luis Gutierrez-Garcia, Jose
    Sanchez-DelaCruz, Eddy
    del Pilar Pozos-Parra, Maria
    ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 59 - 78
  • [29] A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning
    Vanin, Patrick
    Newe, Thomas
    Dhirani, Lubna Luxmi
    O'Connell, Eoin
    O'Shea, Donna
    Lee, Brian
    Rao, Muzaffar
    APPLIED SCIENCES-BASEL, 2022, 12 (22):
  • [30] Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning
    Ayub, Md Ahsan
    Johnson, William A.
    Talbert, Douglas A.
    Siraj, Ambareen
    2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 324 - 329