A Double-Layer Indemnity Enhancement Using LSTM and HASH Function Technique for Intrusion Detection System

被引:2
|
作者
Ali, Abdullah Marish [1 ]
Alqurashi, Fahad [1 ]
Alsolami, Fawaz Jaber [1 ]
Qaiyum, Sana [2 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
[2] Univ Louisiana Lafayette, Sch Comp & Informat, Lafayette, LA 70504 USA
关键词
network system; Internet of Things; malicious event identification; artificial intelligence; optimization; hash function; HEALTH-CARE; MODEL;
D O I
10.3390/math11183894
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The Intrusion Detection System (IDS) is the most widely used network security mechanism for distinguishing between normal and malicious traffic network activities. It aids network security in that it may identify unforeseen hazards in network traffic. Several techniques have been put forth by different researchers for network intrusion detection. However, because network attacks have increased dramatically, making it difficult to execute precise detection rates quickly, the demand for effectively recognizing network incursion is growing. This research proposed an improved solution that uses Long Short-Term Memory (LSTM) and hash functions to construct a revolutionary double-layer security solution for IoT Network Intrusion Detection. The presented framework utilizes standard and well-known real-time IDS datasets such as KDDCUP99 and UNSWNB-15. In the presented framework, the dataset was pre-processed, and it employed the Shuffle Shepherd Optimization (SSO) algorithm for tracking the most informative attributes from the filtered database. Further, the designed model used the LSTM algorithm for classifying the normal and malicious network traffic precisely. Finally, a secure hash function SHA3-256 was utilized for countering the attacks. The intensive experimental assessment of the presented approach with the conventional algorithms emphasized the efficiency of the proposed framework in terms of accuracy, precision, recall, etc. The analysis showed that the presented model attained attack prediction accuracy of 99.92% and 99.91% for KDDCUP99 and UNSWNB-15, respectively.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] THE DETECTION OF PITTING CORROSION IN STAINLESS-STEEL USING DOUBLE-LAYER ACTIVATION
    ASHER, J
    CARNEY, RFA
    CONLON, TW
    WILKINS, NJM
    SHAW, RD
    CORROSION SCIENCE, 1984, 24 (05) : 411 - &
  • [22] Fault Detection and Classification Using Quality-Supervised Double-Layer Method
    Song, Bing
    Shi, Hongbo
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (10) : 8163 - 8172
  • [23] Fuzzy logic switching control for electrical double-layer energy capacitor system for stability enhancement
    Hiyama, T
    Ueno, D
    Yamashiro, S
    Yamagishi, M
    Shimizu, M
    2000 IEEE POWER ENGINEERING SOCIETY SUMMER MEETING, CONFERENCE PROCEEDINGS, VOLS 1-4, 2000, : 2002 - 2007
  • [24] Implementation of application layer Intrusion Detection System using protocol analysis
    Sangeetha, S.
    Vaidehi, V.
    Srinivasan, N.
    Rajkumar, K. V.
    Pradeep, S.
    Ragavan, N.
    Lokesh, C. Sri Sai
    Subadeepak, I.
    Prashanth, V.
    ICSCN 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING COMMUNICATIONS AND NETWORKING, 2008, : 279 - 284
  • [25] INP HIGH MOBILITY ENHANCEMENT MISFETS USING ANODICALLY GROWN DOUBLE-LAYER GATE INSULATOR
    SAWADA, T
    HASEGAWA, H
    ELECTRONICS LETTERS, 1982, 18 (17) : 742 - 743
  • [26] Intrusion Detection System using Fuzzy Logic and Data Mining Technique
    Chapke, Prajkta P.
    Deshmukh, Rupali R.
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [27] Improved hybrid intelligent intrusion detection system using AI technique
    Shanmugam, Bharanidharan
    Idris, Norbik Bashah
    NEURAL NETWORK WORLD, 2007, 17 (04) : 351 - 362
  • [28] Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique
    Foroushani, Zohreh Abtahi
    Li, Yue
    PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, : 119 - 123
  • [29] Intrusion detection system using Anomaly technique in Wireless Sensor Network
    Pandey, Sushant Kumar
    Kumar, Prabhat
    Singh, Jyoti Prakash
    Singh, M. P.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 611 - 615
  • [30] Enhancement of photocurrent in GaInNAs solar cells using Ag/Cu double-layer back reflector
    Aho, Timo
    Aho, Arto
    Tukiainen, Antti
    Polojarvi, Ville
    Salminen, Turkka
    Raappana, Marianna
    Guina, Mircea
    APPLIED PHYSICS LETTERS, 2016, 109 (25)