Intrusion Detection Using Multilayer Perceptron and Neural Networks with Long Short-Term Memory

被引:3
|
作者
Borisenko, B. B. [1 ]
Erokhin, S. D. [1 ]
Fadeev, A. S. [1 ]
Martishin, I. D. [1 ]
机构
[1] Moscow Tech Univ Commun & Informat, Moscow, Russia
关键词
Intrusion detection systems; neural network; LSTM; multilayer perceptron; computer attack; dataset;
D O I
10.1109/SYNCHROINFO51390.2021.9488416
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The article deals with the architecture and structure of the most effective artificial neural networks (ANNs) in the tasks of network traffic classification: multilayer perceptron and LSTM (long short-term memory) network. Using one of the actual datasets CSE-CIC-IDS2018 trained ANNs and tested the effectiveness of detection of various attacks in the network traffic. An analysis of existing work has been performed. A multiclass classification was performed and the detection effectiveness of separate computer attacks was reported. The effectiveness evaluation focused on three metrics: completeness, correct response rate, and false positive rate. The test classification results were considered both in terms of comparison of numerical characteristics of recognition quality and in terms of class analysis in order to identify which computer attacks (CA) are better identified using multilayer perceptron and which are better identified using LSTM. On the basis of these results, an ANN, which is a hybrid network, is proposed as a promising Intrusion Detection System (IDS).
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Predicting Marimba Stickings Using Long Short-Term Memory Neural Networks
    Chong, Jet Kye
    Correa, Debora
    [J]. AI 2022: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, 13728 : 339 - 352
  • [22] Automated sleep apnea detection in snoring signal using long short-term memory neural networks
    Cheng, Siyi
    Wang, Chao
    Yue, Keqiang
    Li, Ruixue
    Shen, Fanlin
    Shuai, Wenjie
    Li, Wenjun
    Dai, Lili
    [J]. BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2022, 71
  • [23] Twitter Bot Detection Using Bidirectional Long Short-term Memory Neural Networks and Word Embeddings
    Wei, Feng
    Uyen Trang Nguyen
    [J]. 2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 101 - 109
  • [24] A Multilayer Feedforward Perceptron Model in Neural Networks for Predicting Stock Market Short-term Trends
    Namdari A.
    Durrani T.S.
    [J]. Operations Research Forum, 2 (3)
  • [25] Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks
    Chia-Ming Hsu
    Muhammad Zulfan Azhari
    He-Yen Hsieh
    Setya Widyawan Prakosa
    Jenq-Shiou Leu
    [J]. Mobile Networks and Applications, 2021, 26 : 1137 - 1144
  • [26] Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks
    Hsu, Chia-Ming
    Azhari, Muhammad Zulfan
    Hsieh, He-Yen
    Prakosa, Setya Widyawan
    Leu, Jenq-Shiou
    [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (03): : 1137 - 1144
  • [27] Accelerating Inference In Long Short-Term Memory Neural Networks
    Mealey, Thomas
    Taha, Tarek M.
    [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 382 - 390
  • [28] Acoustic Anomaly Detection in Additive Manufacturing with Long Short-Term Memory Neural Networks
    Becker, Pascal
    Roth, Christian
    Roennau, Arne
    Dillmann, Ruediger
    [J]. 2020 IEEE 7TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND APPLICATIONS (ICIEA 2020), 2020, : 921 - 926
  • [29] LONG SHORT-TERM MEMORY NEURAL NETWORKS FOR CLOGGING DETECTION IN THE SUBMERGED ENTRY NOZZLE
    Diniz A.P.M.
    Ciarelli P.M.
    Salles E.O.T.
    Coco K.F.
    [J]. Decision Making: Applications in Management and Engineering, 2022, 5 (01): : 154 - 168
  • [30] Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
    Bontemps, Loic
    Van Loi Cao
    McDermott, James
    Nhien-An Le-Khac
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 141 - 152