A Double-Layer Indemnity Enhancement Using LSTM and HASH Function Technique for Intrusion Detection System

被引:2
|
作者
Ali, Abdullah Marish [1 ]
Alqurashi, Fahad [1 ]
Alsolami, Fawaz Jaber [1 ]
Qaiyum, Sana [2 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
[2] Univ Louisiana Lafayette, Sch Comp & Informat, Lafayette, LA 70504 USA
关键词
network system; Internet of Things; malicious event identification; artificial intelligence; optimization; hash function; HEALTH-CARE; MODEL;
D O I
10.3390/math11183894
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The Intrusion Detection System (IDS) is the most widely used network security mechanism for distinguishing between normal and malicious traffic network activities. It aids network security in that it may identify unforeseen hazards in network traffic. Several techniques have been put forth by different researchers for network intrusion detection. However, because network attacks have increased dramatically, making it difficult to execute precise detection rates quickly, the demand for effectively recognizing network incursion is growing. This research proposed an improved solution that uses Long Short-Term Memory (LSTM) and hash functions to construct a revolutionary double-layer security solution for IoT Network Intrusion Detection. The presented framework utilizes standard and well-known real-time IDS datasets such as KDDCUP99 and UNSWNB-15. In the presented framework, the dataset was pre-processed, and it employed the Shuffle Shepherd Optimization (SSO) algorithm for tracking the most informative attributes from the filtered database. Further, the designed model used the LSTM algorithm for classifying the normal and malicious network traffic precisely. Finally, a secure hash function SHA3-256 was utilized for countering the attacks. The intensive experimental assessment of the presented approach with the conventional algorithms emphasized the efficiency of the proposed framework in terms of accuracy, precision, recall, etc. The analysis showed that the presented model attained attack prediction accuracy of 99.92% and 99.91% for KDDCUP99 and UNSWNB-15, respectively.
引用
收藏
页数:25
相关论文
共 50 条
  • [41] Double-Layer Positional Encoding Embedding Method for Cross-Platform Binary Function Similarity Detection
    Jiang, Xunzhi
    Wang, Shen
    Yu, Xiangzhan
    Gong, Yuxin
    CHINESE JOURNAL OF ELECTRONICS, 2022, 31 (04) : 604 - 611
  • [42] A STUDY OF DESIGN AND CONSTRUCTION OF SPHERICAL DOUBLE-LAYER TRUSS DOME USING SYSTEM TRUSS
    ONO, T
    KIRIYAMA, H
    MATSUMOTO, T
    IWATA, M
    KAMIYAMA, K
    DOMES FROM ANTIQUITY TO THE PRESENT, 1988, : 527 - 536
  • [43] Optimization of double-layer absorbers on constrained sound absorption system by using genetic algorithm
    Chang, YC
    Yeh, LJ
    Chiu, MC
    INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN ENGINEERING, 2005, 62 (03) : 317 - 333
  • [44] ANIDS: Anomaly Network Intrusion Detection System Using Hierarchical Clustering Technique
    Sangve, Sunil M.
    Thool, Ravindra C.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1, 2017, 468 : 121 - 129
  • [45] A real-time intrusion detection system using data mining technique
    Leu, Fang-Yie
    Hu, Kai-Wei
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL II, 2007, : 148 - 153
  • [46] A technique for intrusion detection using multiple sequence alignment of system tall sequences
    Son, K
    Wee, K
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: II, 2003, : 168 - 172
  • [47] Efficient Intrusion Detection System using Stream Data Mining Classification Technique
    Desale, Ketan Sanjay
    Kumathekar, Chandrakant Namdev
    Chavan, Arjun Pramod
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 469 - 473
  • [48] Improved Acknowledgement Intrusion Detection System in MANETs Using Hybrid Cryptographic Technique
    Patil, Trupti
    Joshi, Bharti
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 636 - 641
  • [49] A novel intrusion detection system in cloud infrastructure using deep learning technique
    Talapula, Dharani Kumar
    Kumar, Adarsh
    Ravulakollu, Kiran Kumar
    Kumar, Manoj
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1277 - 1303
  • [50] DESIGN OF ELLIPTIC FUNCTION FILTERS USING A DOUBLE-LAYER RC-DISTRIBUTED ACTIVE CIRCUIT
    NEELAKANTAN, MN
    IEEE TRANSACTIONS ON CIRCUIT THEORY, 1972, CT19 (04): : 403 - +